EconPapers    
Economics at your fingertips  
 

Cyber Security: A Peer-Reviewed Journal

2017 - 2025

From Henry Stewart Publications
Bibliographic data for series maintained by Henry Stewart Talks ().

Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.


Volume 8, issue 3, 2025

Editorial pp. 196-197 Downloads
Simon Beckett
AI in cyber security: A dual perspective on hacker tactics and defensive strategies pp. 198-213 Downloads
Lawrence Amer
Applying forensic engineering to cyber security incidents pp. 214-221 Downloads
Jason Jordaan
Preparing for the implementation of reporting requirements from new EU and UK product and cyber security legislation pp. 222-231 Downloads
Gaus Rajnović
How to secure development environments pp. 232-242 Downloads
Gerd Giese and Frank Bartel
Data minimisation: A crucial pillar of cyber security pp. 243-254 Downloads
Paul Luehr and Brandon Reilly
Seeking harmony: CISA’s proposed cyber reporting rules for critical infrastructure are an ambitious work in progress pp. 255-263 Downloads
Joseph C. Folio Iii, Alexandra Ross, Ian Wolfe and Nicholas A. Weigel
Cyber threat intelligence in practice: Implications of the blurred lines between public and private intelligence activity pp. 264-272 Downloads
Neil Ashdown and Keith Martin
Fast-changing cyber threat landscape and a new reality of cyber security pp. 273-280 Downloads
Antanas Kedys
Differences between traditional network security and security in the cloud pp. 281-298 Downloads
Ilya Verbitskiy

Volume 8, issue 2, 2024

Editorial pp. 100-101 Downloads
Simon Beckett
Three approaches to foster organisational cohesion and reduce friction for cyber and security teams pp. 102-109 Downloads
Elizabeth Wanic and Bradley Smith
From compliance to impact: Tracing the transformation of an organisational security awareness programme pp. 110-130 Downloads
Julie Haney and Wayne Lutters
How to mitigate ransomware risk through data and risk quantification pp. 131-149 Downloads
Erik Sørup Andersen
Crumbling bridges: The failed economics of software maintenance pp. 150-159 Downloads
Jc Herz
Why crisis leadership competencies matter in the effective management of a cyber crisis pp. 160-168 Downloads
Caroline Sapriel
Guidelines for non-profit organisation governance in cyber resilience pp. 169-176 Downloads
Margaret Mavins Johnson
Your decision: Senior professionals’ decision making during a simulated ransomware attack pp. 177-188 Downloads
Fabian Muhly and Philipp Leo

Volume 8, issue 1, 2024

Editorial pp. 4-5 Downloads
Simon Beckett
Common pitfalls when mitigating cyber risk: Addressing socio-behavioural factors pp. 6-23 Downloads
Öykü Işik, Yanya Viskovich and Si Pavitt
Improving cyber risk governance through storytelling pp. 24-37 Downloads
Levi Gundert
AI detection of malicious push notifications in augmented reality in the workplace pp. 38-47 Downloads
Sarah Katz
Obstacles and countermeasures for protecting Internet of Things devices from emerging security risks pp. 48-62 Downloads
Chahak Mittal
Identifying and classifying cyberattacks on airports pp. 63-79 Downloads
Lázaro Florido-Benítez
Strong reasons make strong actions: What Shakespeare’s ‘King John’ can teach us about the Internet of Things pp. 80-90 Downloads
Hanane Taidi

Volume 7, issue 4, 2024

Editorial pp. 288-289 Downloads
Simon Beckett
A guide to evaluating AI vendors: Key questions to mitigate security risks pp. 290-306 Downloads
Davi Ottenheimer
Understanding and prioritising cyberattack paths amid growing organisational complexity pp. 307-322 Downloads
Elliott Went
Red Team testing: Essential KPIs and metrics pp. 323-332 Downloads
Richard Hollis
Bridging the gap between IT and OT to improve industrial cyber security pp. 333-341 Downloads
Dino Busalachi
Analysing and managing risk from third-party OAuth application access pp. 342-362 Downloads
Jenko Hwong
Security testing as part of a digital assurance toolkit pp. 363-370 Downloads
Graeme Huddy
The challenge of securing electric vehicle charger infrastructure pp. 371-382 Downloads
Thomas Caldwell

Volume 7, issue 3, 2024

Editorial pp. 197-198 Downloads
Simon Beckett
Consequence is not enough: The role of cyber intelligence in improving cyberattack estimates pp. 199-206 Downloads
Sarah Freeman and Mark Bristow
Purple Teaming: A comprehensive and collaborative approach to cyber security pp. 207-216 Downloads
Erik Van Buggenhout
Improving likelihood calculation by mapping MITRE ATT&CK to existing controls pp. 217-228 Downloads
Gerald Beuchelt and Sonal Agrawal
The EU Cybersecurity Skills Academy: A silver bullet to address the cyber security skills gap in the European Union? pp. 229-236 Downloads
Despina Spanou
Issues to consider relating to information governance and artificial intelligence pp. 237-252 Downloads
Mark Brett
How can national policies support the development and implementation of coordinated vulnerability disclosure? pp. 253-261 Downloads
Valéry Vander Geeten
Online Potemkin villages: Discovering a Russian influence operation on social media pp. 262-272 Downloads
Patricia Bailey
Caught in the web: Pitfalls of electronic communications pp. 273-278 Downloads
E. J. Yerzak

Volume 7, issue 2, 2023

Editorial pp. 100-101 Downloads
Simon Beckett
How processes affect IT-systems and business complexity, and what correlations are present pp. 102-109 Downloads
Reidar J. Boldevin
Reducing complexity in cyber security architecture: A practical model for security classifications pp. 110-119 Downloads
Eleni Richter
How to get your board and executive team cyber-ready and achieve a culture of cyber security from the board down: The CEO Method™ for breach prevention pp. 120-144 Downloads
Andrzej Cetnarski
The post-breach threat landscape and the need for an ‘effective’ compliance programme pp. 145-153 Downloads
Brian Mitchell Warshawsky
Cyber security culture as a strategic asset pp. 154-162 Downloads
Glendon Schmitz
A case for public support for vulnerability disclosure policies pp. 163-171 Downloads
Francesco Bordone
Why policy-based authorisation is critical for identity-first security pp. 172-180 Downloads
Gal Helemski
The vital importance of a successful threat intelligence programme pp. 181-187 Downloads
Yochai Corem

Volume 7, issue 1, 2023

Editorial pp. 4-5 Downloads
Simon Beckett
Beyond detection: Uncovering unknown threats pp. 6-15 Downloads
George Chen
Legacy apps to cloud: A risk-based approach pp. 16-23 Downloads
Naresh Sharma
Exploring the practicalities and quality of pentesting at scale: Globally, pentest coverage is increasing but remains insufficient pp. 24-32 Downloads
Caroline Wong
CIO and CISO collaboration for a shared vision that enables a cyber-resilient future pp. 33-43 Downloads
Nastassja Van Den Heever
When push comes to shove: Managing strong personalities in a cyber incident pp. 44-51 Downloads
Mark Sangster
Approaches to cyber security in small and medium-sized enterprises: Why it needs to change pp. 52-62 Downloads
Simon Newman
From stress to success: Neuroscience-informed training for cyber security first responders pp. 63-72 Downloads
Carol Barkes and Colby Jones
Cryptography works, but needs a system-wide view pp. 73-81 Downloads
Keith Martin
European cyber security law in 2023: A review of the advances in the Network and Information Security 2 Directive 2022/2555 pp. 82-92 Downloads
Charanjit Singh
Page updated 2025-04-21