EconPapers    
Economics at your fingertips  
 

Cyber Security: A Peer-Reviewed Journal

2017 - 2025

From Henry Stewart Publications
Bibliographic data for series maintained by Henry Stewart Talks ().

Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.


Volume 7, issue 4, 2024

Editorial pp. 288-289 Downloads
Simon Beckett
A guide to evaluating AI vendors: Key questions to mitigate security risks pp. 290-306 Downloads
Davi Ottenheimer
Understanding and prioritising cyberattack paths amid growing organisational complexity pp. 307-322 Downloads
Elliott Went
Red Team testing: Essential KPIs and metrics pp. 323-332 Downloads
Richard Hollis
Bridging the gap between IT and OT to improve industrial cyber security pp. 333-341 Downloads
Dino Busalachi
Analysing and managing risk from third-party OAuth application access pp. 342-362 Downloads
Jenko Hwong
Security testing as part of a digital assurance toolkit pp. 363-370 Downloads
Graeme Huddy
The challenge of securing electric vehicle charger infrastructure pp. 371-382 Downloads
Thomas Caldwell

Volume 7, issue 3, 2024

Editorial pp. 197-198 Downloads
Simon Beckett
Consequence is not enough: The role of cyber intelligence in improving cyberattack estimates pp. 199-206 Downloads
Sarah Freeman and Mark Bristow
Purple Teaming: A comprehensive and collaborative approach to cyber security pp. 207-216 Downloads
Erik Van Buggenhout
Improving likelihood calculation by mapping MITRE ATT&CK to existing controls pp. 217-228 Downloads
Gerald Beuchelt and Sonal Agrawal
The EU Cybersecurity Skills Academy: A silver bullet to address the cyber security skills gap in the European Union? pp. 229-236 Downloads
Despina Spanou
Issues to consider relating to information governance and artificial intelligence pp. 237-252 Downloads
Mark Brett
How can national policies support the development and implementation of coordinated vulnerability disclosure? pp. 253-261 Downloads
Valéry Vander Geeten
Online Potemkin villages: Discovering a Russian influence operation on social media pp. 262-272 Downloads
Patricia Bailey
Caught in the web: Pitfalls of electronic communications pp. 273-278 Downloads
E. J. Yerzak

Volume 7, issue 2, 2023

Editorial pp. 100-101 Downloads
Simon Beckett
How processes affect IT-systems and business complexity, and what correlations are present pp. 102-109 Downloads
Reidar J. Boldevin
Reducing complexity in cyber security architecture: A practical model for security classifications pp. 110-119 Downloads
Eleni Richter
How to get your board and executive team cyber-ready and achieve a culture of cyber security from the board down: The CEO Method™ for breach prevention pp. 120-144 Downloads
Andrzej Cetnarski
The post-breach threat landscape and the need for an ‘effective’ compliance programme pp. 145-153 Downloads
Brian Mitchell Warshawsky
Cyber security culture as a strategic asset pp. 154-162 Downloads
Glendon Schmitz
A case for public support for vulnerability disclosure policies pp. 163-171 Downloads
Francesco Bordone
Why policy-based authorisation is critical for identity-first security pp. 172-180 Downloads
Gal Helemski
The vital importance of a successful threat intelligence programme pp. 181-187 Downloads
Yochai Corem

Volume 7, issue 1, 2023

Editorial pp. 4-5 Downloads
Simon Beckett
Beyond detection: Uncovering unknown threats pp. 6-15 Downloads
George Chen
Legacy apps to cloud: A risk-based approach pp. 16-23 Downloads
Naresh Sharma
Exploring the practicalities and quality of pentesting at scale: Globally, pentest coverage is increasing but remains insufficient pp. 24-32 Downloads
Caroline Wong
CIO and CISO collaboration for a shared vision that enables a cyber-resilient future pp. 33-43 Downloads
Nastassja Van Den Heever
When push comes to shove: Managing strong personalities in a cyber incident pp. 44-51 Downloads
Mark Sangster
Approaches to cyber security in small and medium-sized enterprises: Why it needs to change pp. 52-62 Downloads
Simon Newman
From stress to success: Neuroscience-informed training for cyber security first responders pp. 63-72 Downloads
Carol Barkes and Colby Jones
Cryptography works, but needs a system-wide view pp. 73-81 Downloads
Keith Martin
European cyber security law in 2023: A review of the advances in the Network and Information Security 2 Directive 2022/2555 pp. 82-92 Downloads
Charanjit Singh

Volume 6, issue 4, 2023

Editorial pp. 292-293 Downloads
Simon Beckett
How CISOs can truly align with the business pp. 294-300 Downloads
Candy Alexander
Machine learning or behaviour heuristics? The synergy of approaches to defeat advanced ransomware threats pp. 301-310 Downloads
Vladimir Strogov and Sergey Ulasen
The curse of knowledge can damage awareness programmes: Here's how to defeat it pp. 311-319 Downloads
Kerry Tomlinson
Privacy threats and vulnerabilities: Reinvent your privacy engineering practices and win pp. 320-333 Downloads
Smitha Sriharsha
Analysis of software bill of materials tools pp. 334-355 Downloads
Arushi Arora and Christina Garman
The human side of cybercrime pp. 356-365 Downloads
Kylie Watson and Tayla Payne
A strong story to tell: Top ten mistakes by administrators pp. 366-372 Downloads
Paula Januszkiewicz
An approach to establishing a multi-organisational public sector security operations centre pp. 373-383 Downloads
Mark Brett

Volume 6, issue 3, 2023

Editorial pp. 196-197 Downloads
Simon Beckett
Building a high-performing data ethics programme from the ground up pp. 198-210 Downloads
Alexandra Ross, Ilana Golbin and Bret S. Cohen
Dangers of succumbing to bias in cyber security: An evaluation of the impact of cognitive biases on threat assessments and cyber security strategies pp. 211-219 Downloads
Hanah-Marie Darley
The Zoom effect: A framework for security programme transformation pp. 220-229 Downloads
Heather Ceylan and Ariel Chavan
Users are not stupid: Six cyber security pitfalls overturned pp. 230-241 Downloads
Julie Haney
Improving your Active Directory security posture: AdminSDHolder to the rescue pp. 242-260 Downloads
Guido Grillenmeier
The psychology of social engineering pp. 261-274 Downloads
Barry Coatesworth
OTP bots and crypto: A tactic to disrupt pp. 275-284 Downloads
Kristen Spaeth

Volume 6, issue 2, 2022

Editorial pp. 100-101 Downloads
Simon Beckett
Social engineering and the use of persuasion to commit cyber fraud pp. 102-110 Downloads
Lance Wantenaar
Threat intelligence meets risk management for operational resilience pp. 111-118 Downloads
Teresa T. Walsh
Think beyond IT security — cyber resilience to build future-ready world: OT and ICS, critical infrastructure and beyond pp. 119-131 Downloads
Sanam Makadia
The how and why of cyber security policy: Create behavioural and technical rules to mitigate risk pp. 132-140 Downloads
Jael Lewis and Cara E. Turbyfill
Browser isolation as an enterprise security control pp. 141-147 Downloads
Henry Harrison
Why deep learning holds the key to preventing cyberattacks before they can strike pp. 148-153 Downloads
Karen Crowley
Exploring phronesis in cyber security, management and resilience pp. 154-167 Downloads
Mark Brett
Mitigating challenges in an evolving cyber threat landscape pp. 168-177 Downloads
Benjamin Ang
Malware development threats with modern technologies pp. 178-187 Downloads
Lawrence Amer

Volume 6, issue 1, 2022

Editorial pp. 4-5 Downloads
Simon Beckett
Securing decentralised organisations pp. 6-13 Downloads
Damir Rajnović
Anomaly-based threat detection: Behavioural fingerprinting versus self-learning AI pp. 14-25 Downloads
Jeff Cornelius, Simon Fellows, Oakley Cox and Sam Lister
A security concept for a global factory network: Practical considerations in implementation pp. 26-33 Downloads
Michael Voeth, Clare Patterson and Jannis Stemmann
The insider threat to financial services: Why a shift in mindset is required to combat this silent risk pp. 34-40 Downloads
Dave Harvey
Active Directory security: Why we fail and what auditors miss pp. 41-51 Downloads
Sylvain Cortes
Integration versus convergence: A battle of the buzzwords? pp. 52-61 Downloads
Rodman Ramezanian
The PIVO process for identifying vulnerabilities impact for organisation risks: An automated solution pp. 62-78 Downloads
Jean-Luc Simoni, Alexis Ulliac, Thomas Massip and Thomas Devaux
Financial services security risks and remediations pp. 79-89 Downloads
Lior Arbel
`Cybercrime through social engineering: The new global crisis` by Chris Kayser pp. 90-91 Downloads
Lance Wantenaar
Page updated 2026-01-02