Journal: J. Cybersecurity

Volume 11, Issue 1

0 -- 0Sam Whitt, Vitali Shkliarov, Vera Mironova. Going public about cyber attacks: public threat sensitivity and support for escalation in the United States and Russia
0 -- 0Daniel W. Woods, Josephine Wolff. A history of cyber risk transfer
0 -- 0Karl Grindal, Milton Mueller, Vagisha Srivastava. Non-governmental governance of trust on the internet: WebPKI as public good
0 -- 0Ammar Zafar. Reconciling blockchain technology and data protection laws: regulatory challenges, technical solutions, and practical pathways
0 -- 0Ben Collier, Richard Clayton 0001. Peer(ing) pressure: a cybersecurity intervention at global scale in the internet infrastructure
0 -- 0Hala Assal, Srivathsan G. Morkonda, Muhammad Zaid Arif, Sonia Chiasson. Software security in practice: knowledge and motivation
0 -- 0Yaniv Harel, Abraham Carmeli. A strategic cybersecurity oversight framework: a board's imperative
0 -- 0Junli Jiang, Pavel Naumov. De re/de dicto distinction: a logicians' perspective on data anonymity
0 -- 0Fran Casino, Darren Hurley-Smith, Julio César Hernández Castro, Constantinos Patsakis. Not on my watch: ransomware detection through classification of high-entropy file segments
0 -- 0Francesco Casaril, Letterio Galletta. Space cybersecurity governance: assessing policies and frameworks in view of the future European space legislation
0 -- 0Catherine Carpentier-Desjardins, Masarah Paquet-Clouston, Stefan Kitzler, Bernhard Haslhofer. Mapping the DeFi crime landscape: an evidence-based picture
0 -- 0Veerle van Harten, Carlos Hernandez Gañán, Michel van Eeten, Simon Parkin. Unfit for purpose? Assessing the applicability of country-level IoT security advice
0 -- 0Rachiyta Jain, Temima Hrle, Daniel W. Woods. Insurance versus digital harm: a content analysis of home and cyber insurance policies in the USA and UK
0 -- 0Marte Marjorie Søgnen, Adam Szekeres, Einar Arthur Snekkenes. Implementing information security controls: now or later? Delay discounting of losses and gains
0 -- 0Freya Gassmann, Janina Beck, Nora Gourmelon, Zinaida Benenson. Valuation of confidentiality and availability in a personal ransomware attack scenario
0 -- 0Harry Halpin. The adversary: the philosophy of cryptography
0 -- 0Anna Oriishi. What has the U.S. Government gained by formalizing Team Telecom?: Team Telecom and the FCC's dual security approach
0 -- 0Marc K. Peter, Khondker Mohammad Zobair, Johan P. Lindeque, Karin Mändli lerch, Luke Houghton. How much more will it need? Determinants of risk-driven cybersecurity adoption in Swiss SMEs: a structural equation modelling approach
0 -- 0Marina Liu, Malcolm Shore, William Yeoh 0002, Frank Jiang 0001, Sherali Zeadally. Toward effective cybersecurity management: a hierarchical process model with performance assessment
0 -- 0Gregor Petric, John N. Just. Information security culture and phishing-reporting model: structural equivalence across Germany, UK, and USA
0 -- 0Edwin J. Beggs, John V. Tucker, Victoria Wang. On human-centred security: a new systems model based on modes and mode transitions
0 -- 0Edward Yellakuor Baagyere, Emmanuel B. Batowise, Peter Awon-Natemi Agbedemnab, Gideon E. Wenya, Regina Esi Turkson. An RNS-based all-or-nothing transform for CP-ABE in IoT distributed systems
0 -- 0Eman Salem Alashwali, Joanne C. Peca, Mandy Lanyon, Lorrie Faith Cranor. Work from home and privacy challenges: what do workers face and what are they doing about it?
0 -- 0Dominika Kuznicka-Blaszkowska, Nadiya Kostyuk. Emerging need to regulate deepfakes in international law: the Russo-Ukrainian war as an example
0 -- 0Syed Shubeena Yaqoob, Aasif Hussain Sheikh. Unmasking the silent threat: understanding cybercrimes targeting female students of Kashmir university - a mixed-method analysis
0 -- 0Chon Abraham, France Bélanger, Sally Daultrey. Promoting research on cyber threat intelligence sharing in ecosystems
0 -- 0Laura D. Osburn. Telling stories about vendors: narrative practices to negotiate risk and establish an organizational cybersecurity culture
0 -- 0Nico Ebert, Thierry Schaltegger, Benjamin Ambuehl, Tim Geppert, Ariane Trammell, Melanie Knieps, Verena Zimmermann. Learning from safety science: designing incident reporting systems in cybersecurity
0 -- 0Charles Harry, Ido Sivan Sevilla, Mark McDermott. Measuring the size and severity of the integrated cyber attack surface across US county governments
0 -- 0Miroslaw Kutylowski, Gabriel Wechta. Pseudonymization and reporters' protection by design in the EU whistleblower directive
0 -- 0Sadra Fathenojavan, Ali Moeini, Hamid Haj Seyyed Javadi. A post-quantum lattice-based lightweight anonymous authentication scheme for IoT
0 -- 0Mazaher Kianpour, Ulrik Franke. The use of simulations in economic cybersecurity decision-making
0 -- 0Marius-Constantin Ilau, Tristan Caulfield, David J. Pym. Co-designing heterogeneous models: a distributed systems approach