Journal: J. Cybersecurity

Volume 2, Issue 2

119 -- 120Tyler Moore, David J. Pym. Editorial
121 -- 135Sasha Romanosky. Examining the costs and causes of cyber incidents
137 -- 145Thomas J. Holt, Olga Smirnova, Alice Hutchings. Examining signals of trust in criminal markets online
147 -- 163Hanan Hibshi, Travis D. Breaux, Maria Riaz, Laurie Williams. A grounded analysis of experts' decision-making during security assessments

Volume 2, Issue 1

1 -- 2Tyler Moore, David J. Pym, Michel van Eeten. Introduction
3 -- 14Benjamin Edwards, Steven A. Hofmeyr, Stephanie Forrest. Hype and heavy tails: A closer look at data breaches
15 -- 28Armin Sarabi, Parinaz Naghizadeh, Yang Liu 0018, Mingyan Liu. Risky business: Fine-grained data breach prediction using business profiles
29 -- 41Stefan Laube, Rainer Böhme. The economics of mandatory security breach reporting to authorities
43 -- 56Chad Heitzenrater, Andrew C. Simpson. Policy, statistics and questions: Reflections on UK cyber security disclosures
57 -- 70Konstantinos Mersinas, Bjoern Hartig, Keith M. Martin, Andrew Seltzer. Are information security professionals expected value maximizers?: An experiment and survey-based test
71 -- 81Peter Snyder, Chris Kanich. Characterizing fraud and its ramifications in affiliate marketing networks
83 -- 98Orçun Çetin, Mohammad Hanif Jhaveri, Carlos Gañán, Michel van Eeten, Tyler Moore. Understanding the role of sender reputation in abuse reporting and cleanup
99 -- 118Shu He, Gene Moo Lee, Sukjin Han, Andrew B. Whinston. How would information disclosure influence organizations' outbound spam volume? Evidence from a field experiment