Journal: J. Cybersecurity

Volume 3, Issue 3

145 -- 158Victoria Wang, John V. Tucker. Surveillance and identity: conceptual framework and formal models
159 -- 171Kenneth D. Nguyen, Heather Rosoff, Richard S. John. Valuing information security from a phishing attack
173 -- 183Steven Weber. Coercion in cybersecurity: What public health models reveal
185 -- 197Jonathan M. Spring, Eric Hatleback. Thinking about intrusion kill chains as mechanisms
199 -- 0. Corrigendum to: Introduction to the special issue on strategic dimensions of offensive cyber operations

Volume 3, Issue 2

81 -- 90Thomas Maillart, Mingyi Zhao, Jens Grossklags, John Chuang. Given enough eyeballs, all bugs are shallow? Revisiting Eric Raymond with bug bounty programs
91 -- 108Sébastien Gay. Strategic news bundling and privacy breach disclosures
109 -- 125Ingolf Becker, Alice Hutchings, Ruba Abu-Salma, Ross J. Anderson, Nicholas Bohm, Steven J. Murdoch, M. Angela Sasse, Gianluca Stringhini. International comparison of bank fraud reimbursement: customer perceptions and contractual terms
127 -- 135Malte Möser, Rainer Böhme. The price of anonymity: empirical evidence from a market for Bitcoin anonymization
137 -- 144Amir Feder, Neil Gandal, J. T. Hamrick, Tyler Moore. The impact of DDoS and other security shocks on Bitcoin currency exchanges: evidence from Mt. Gox

Volume 3, Issue 1

0 -- 0C. Robert Kehler, Herbert Lin, Michael Sulmeyer. Rules of engagement for cyberspace operations: a view from the USA
1 -- 5Herbert Lin, Amy Zegart. Introduction to the special issue on strategic dimensions of offensive cyber operations
7 -- 17Henry Farrell, Charles L. Glaser. The role of effects, saliencies and norms in US Cyberwar doctrine
19 -- 28Austin Long. A cyber SIOP? Operational considerations for strategic offensive cyber planning
29 -- 35Martin Libicki. Second acts in cyberspace
37 -- 48Erik Gartzke, Jon R. Lindsay. Thermonuclear cyberwar
49 -- 58Michael Gross, Daphna Canetti, Dana Randall. Cyberterrorism: its effects on psychological well-being, public confidence and political attitudes
59 -- 68Steven M. Bellovin, Susan Landau 0001, Herbert S. Lin. Limiting the undesired impact of cyber weapons: technical requirements and policy implications