Journal: J. Cybersecurity

Volume 9, Issue 1

0 -- 0Sandra Schmitz-Berndt. Defining the reporting threshold for a cybersecurity incident under the NIS Directive and the NIS 2 Directive
0 -- 0Ugochukwu O. Etudo, Christopher Whyte, Victoria Y. Yoon, Niam Yaraghi. From Russia with fear: fear appeals and the patterns of cyber-enabled influence operations
0 -- 0Erica D. Lonergan, Jacquelyn Schneider. The Power of Beliefs in US Cyber Strategy: The Evolving Role of Deterrence, Norms, and Escalation
0 -- 0Pavel V. Shevchenko, Jiwook Jang, Matteo Malavasi, Gareth W. Peters, Georgy Sofronov, Stefan Trück. The nature of losses from cyber-related events: risk categories and business sectors
0 -- 0Koen Schoenmakers, Daniel Greene, Sarah Stutterheim, Herbert Lin, Megan J. Palmer. The security mindset: characteristics, development, and consequences
0 -- 0David Barrera 0003, Christopher Bellman, Paul C. van Oorschot. A close look at a systematic method for analyzing sets of security advice
0 -- 0Josiah Dykstra, Lawrence A. Gordon, Martin P. Loeb, Lei Zhou. Maximizing the benefits from sharing cyber threat intelligence by government agencies and departments
0 -- 0Baptiste Prébot, Yinuo Du, Cleotilde Gonzalez. Learning about simulated adversaries from human defenders using interactive cyber-defense games
0 -- 0Simon Parkin, Kristen Kuhn, Siraj Ahmed Shaikh. Executive decision-makers: a scenario-based approach to assessing organizational cyber-risk perception
0 -- 0Redowan Mahmud, Joshua D. Scarsbrook, Ryan K. L. Ko, Omar Jarkas, Josh Hall, Stuart Smith, Jonathan Marshall. Realizing credible remote agricultural auditing with trusted video technology
0 -- 0Jing Rong Goh, Shaun S. Wang, Yaniv Harel, Gabriel Toh. Predictive Taxonomy Analytics (LASSO): Predicting Outcome Types of Cyber Breach
0 -- 0Sébastien Gillard, Dimitri Percia David, Alain Mermoud, Thomas Maillart. Efficient collective action for tackling time-critical cybersecurity threats
0 -- 0Piers Fleming, S. Gareth Edwards, Andrew P. Bayliss, Charles R. Seger. Tell me more, tell me more: repeated personal data requests increase disclosure
0 -- 0Ruth Ikwu, Luca Giommoni, Amir Javed, Pete Burnap, Matthew L. Williams. Digital fingerprinting for identifying malicious collusive groups on Twitter
0 -- 0Mardianto Mardianto, Niken Hartati, Farah Aulia, Zulian Fikry, Rahayu Hardianti Utami, Elrisfa Magistarina. Contribution Threat Perception, School Climate and Prejudice as Mediator to Student's Cyber Aggression
0 -- 0Jack Cable, Andrés Fábrega, Sunoo Park, Michael A. Specter. A systematization of voter registration security
0 -- 0Liudmyla Kormych, Yuliia Zavhorodnia. The concept of modern political confrontation in cyber space
0 -- 0Anna Piazza, Srinidhi Vasudevan, Madeline Carr. Cybersecurity in UK Universities: mapping (or managing) threat intelligence sharing within the higher education sector
0 -- 0Sergi D. Bray, Shane D. Johnson, Bennett Kleinberg. Testing human ability to detect 'deepfake' images of human faces
0 -- 0Anne E. Boustead, Matthew B. Kugler. Juror interpretations of metadata and content information: implications for the going dark debate
0 -- 0Kristen Csenkey, Nina Bindel. Post-quantum cryptographic assemblages and the governance of the quantum threat
0 -- 0Innocent Mbona, Jan H. P. Eloff. Classifying social media bots as malicious or benign using semi-supervised machine learning
0 -- 0Timothy C. Haas. Adapting cybersecurity practice to reduce wildlife cybercrime
0 -- 0Adam N. Joinson, Matt Dixon, Lynne M. Coventry, Pam Briggs. Development of a new 'human cyber-resilience scale'