EconPapers    
Economics at your fingertips  
 

Cyber Security: A Peer-Reviewed Journal

2017 - 2025

From Henry Stewart Publications
Bibliographic data for series maintained by Henry Stewart Talks ().

Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.


Volume 9, issue 2, 2025

Editorial pp. 112-113 Downloads
Simon Beckett
Integrating identity and access management and privileged access management for enhanced identity security in financial institutions: A zero-trust approach pp. 114-129 Downloads
Felix Behringer and Patrick Baumann
AI with humans in mind: The importance of human behavioural considerations in AI design and adoption pp. 130-138 Downloads
Hanah-Marie Darley
Securing identities in software development life cycles pp. 139-148 Downloads
Maya Neelakandhan, Guruprasad Ramprakash and Deepika Gautam
Creating an effective cyber security culture in regulated financial services companies pp. 149-158 Downloads
Rupert Lee-Browne
Practical cyber security architecture: Introducing a practical model for resilience pp. 159-171 Downloads
Eleni Richter
A holistic approach to cyber security in local government: A practice-based perspective pp. 172-187 Downloads
Mark Brett
Examining generational impacts of machine learning, artificial intelligence, generative AI and deepfake-based social engineering cybercrime pp. 188-202 Downloads
Christopher S. Kayser

Volume 9, issue 1, 2025

Editorial pp. 4-5 Downloads
Simon Beckett
Is it time to consider a radical change in the way we organise and manage the response to cybercrime? pp. 6-17 Downloads
Simon Newman
Rethinking user password management pp. 18-26 Downloads
Bryan Christ
Developing cyber resilience through cyber incident response capability improvement: Presenting the cyber incident response capability development life cycle model pp. 27-39 Downloads
Murray Goldschmidt
SPOT: A data-driven threat detection framework with knowledge-enhanced scoring pp. 40-48 Downloads
Derek Lin
Govern once/comply many: Leveraging cyber security framework experience to support AI governance pp. 49-60 Downloads
F. Paul Greene
The art of cyber war: Sun Tzu’s ancient wisdom in modern threat intelligence pp. 61-71 Downloads
Lior Arbel
Security audits on artificial intelligence systems pp. 72-78 Downloads
Robert Kemp
Why failure to comply with state contract cyber security and privacy requirements is increasingly likely to result in State Attorneys General enforcement pp. 79-87 Downloads
Ashley L. Taylor, Gene Fishel and Dan Waltz
The artificial intelligence security zugzwang pp. 88-106 Downloads
Lampis Alevizos

Volume 8, issue 4, 2025

Editorial pp. 304-305 Downloads
Simon Beckett
Intelligence led risk: Leveraging threat operations to deliver effective risk management pp. 306-320 Downloads
Keith Nicholson
Navigating the GenAI frontier: The role of the CISO in GenAI governance pp. 321-336 Downloads
James Christiansen
Enhancing cybercrime investigations: Orchestration of automation and public–private collaboration to combat online payment fraud in Ukraine pp. 337-347 Downloads
Olesya Danylchenko
Defence from an attacker’s view: Rethinking traditional approaches to cyber security pp. 348-360 Downloads
Jonathan Freedman
Shifting from operational to risk-based response to vulnerabilities and exposures pp. 361-374 Downloads
Chris Goettl
The financial impact of cyberattacks: Comparative study of the manufacturing and service industry pp. 375-391 Downloads
Joseph Squillace, Justice Cappella and Ahmet Doğuhan Altaş
Leveraging generative AI for dynamic file honeypots: Insights and implementation pp. 392-400 Downloads
Vladimir Strogov and Sergey Ulasen

Volume 8, issue 3, 2025

Editorial pp. 196-197 Downloads
Simon Beckett
AI in cyber security: A dual perspective on hacker tactics and defensive strategies pp. 198-213 Downloads
Lawrence Amer
Applying forensic engineering to cyber security incidents pp. 214-221 Downloads
Jason Jordaan
Preparing for the implementation of reporting requirements from new EU and UK product and cyber security legislation pp. 222-231 Downloads
Gaus Rajnović
How to secure development environments pp. 232-242 Downloads
Gerd Giese and Frank Bartel
Data minimisation: A crucial pillar of cyber security pp. 243-254 Downloads
Paul Luehr and Brandon Reilly
Seeking harmony: CISA’s proposed cyber reporting rules for critical infrastructure are an ambitious work in progress pp. 255-263 Downloads
Joseph C. Folio Iii, Alexandra Ross, Ian Wolfe and Nicholas A. Weigel
Cyber threat intelligence in practice: Implications of the blurred lines between public and private intelligence activity pp. 264-272 Downloads
Neil Ashdown and Keith Martin
Fast-changing cyber threat landscape and a new reality of cyber security pp. 273-280 Downloads
Antanas Kedys
Differences between traditional network security and security in the cloud pp. 281-298 Downloads
Ilya Verbitskiy

Volume 8, issue 2, 2024

Editorial pp. 100-101 Downloads
Simon Beckett
Three approaches to foster organisational cohesion and reduce friction for cyber and security teams pp. 102-109 Downloads
Elizabeth Wanic and Bradley Smith
From compliance to impact: Tracing the transformation of an organisational security awareness programme pp. 110-130 Downloads
Julie Haney and Wayne Lutters
How to mitigate ransomware risk through data and risk quantification pp. 131-149 Downloads
Erik Sørup Andersen
Crumbling bridges: The failed economics of software maintenance pp. 150-159 Downloads
Jc Herz
Why crisis leadership competencies matter in the effective management of a cyber crisis pp. 160-168 Downloads
Caroline Sapriel
Guidelines for non-profit organisation governance in cyber resilience pp. 169-176 Downloads
Margaret Mavins Johnson
Your decision: Senior professionals’ decision making during a simulated ransomware attack pp. 177-188 Downloads
Fabian Muhly and Philipp Leo

Volume 8, issue 1, 2024

Editorial pp. 4-5 Downloads
Simon Beckett
Common pitfalls when mitigating cyber risk: Addressing socio-behavioural factors pp. 6-23 Downloads
Öykü Işik, Yanya Viskovich and Si Pavitt
Improving cyber risk governance through storytelling pp. 24-37 Downloads
Levi Gundert
AI detection of malicious push notifications in augmented reality in the workplace pp. 38-47 Downloads
Sarah Katz
Obstacles and countermeasures for protecting Internet of Things devices from emerging security risks pp. 48-62 Downloads
Chahak Mittal
Identifying and classifying cyberattacks on airports pp. 63-79 Downloads
Lázaro Florido-Benítez
Strong reasons make strong actions: What Shakespeare’s ‘King John’ can teach us about the Internet of Things pp. 80-90 Downloads
Hanane Taidi
Page updated 2026-01-01