Cyber Security: A Peer-Reviewed Journal
2017 - 2025
From Henry Stewart Publications Bibliographic data for series maintained by Henry Stewart Talks (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 4, issue 4, 2021
- Editorial pp. 300-301

- Simon Beckett
- A framework for quantifying cyber security risks pp. 302-316

- Reinder Wolthuis, Frank Phillipson, Hidde-Jan Jongsma and Peter Langenkamp
- Open sesame: Lessons in password-based user authentication pp. 317-329

- Bahman Rashidi and Vaibhav Garg
- An overview of current issues and practice relating to local government cyber security in England and Wales pp. 330-344

- Mark Brett
- Cyber security for microreactors in advanced energy systems pp. 345-367

- Piyush Sabharwall, James Gibb, Christopher Ritter, Kathleen Araújo, Abhinav Gupta, Ian Ferguson, Bri Rolston, Ron Fisher, Jess Gehin and Youssef Ballout
- The laws governing data breaches: An update pp. 368-379

- Behnam Dayanim and Roya Butler
- Managing stakeholder communication during a cyber crisis pp. 380-387

- Caroline Sapriel
Volume 4, issue 3, 2021
- Editorial pp. 200-201

- Simon Beckett
- Risk is a result of human behaviour: Leveraging behavioural analytics to strengthen internal controls pp. 202-212

- Arvind Mehta
- Insider threat programmes: Time to hit restart pp. 213-222

- Jadee Hanson, Todd Thorsen and Nathan Hunstad
- The human problem behind credential theft and reuse pp. 223-231

- Erich Kron
- Know your suppliers: A review of ICT supply chain risk management efforts by the US government and its agencies pp. 232-242

- Olatunji Osunji
- International principles for boards of directors and cyber security pp. 243-250

- Larry Clinton
- Cyber security for smart cities: End-to-end cyber security strategy for IoT connected services pp. 251-266

- Moh Cissé
- Identifying cyber security risks in Spanish airports pp. 267-291

- Lázaro Florido-Benítez
Volume 4, issue 2, 2020
- Editorial pp. 100-101

- Simon Beckett
- The industrial Internet of Things: From preventive to reactive systems — redefining your cyber security game plan for the changing world pp. 102-110

- Lesley Kipling
- The complexity of performing cyber audits in the space sector along the supply chain pp. 111-121

- Jose Ramon Coz Fernandez and Vicente José Pastor Pérez
- Cheetahs, COVID-19 and the demand for crypto-agility pp. 122-134

- Michael Thelander
- Cyber leadership across a business ecosystem pp. 135-144

- Matthew Doan
- A framework for fostering a dynamic information security culture pp. 145-159

- Renay Carver
- Vulnerabilities on the wire: Mitigations for insecure ICS device communication pp. 160-181

- Michael Hoffman
- The landscape from above: Continuous cloud monitoring for continuous assurance pp. 182-193

- Fouad Khalil
Volume 4, issue 1, 2020
- Editorial pp. 4-5

- Simon Beckett
- Taking risk to the edge of acceptable pp. 6-13

- Steve Williamson
- Consider the consequences: Understanding and limiting physical impacts caused by an ICS cyberattack pp. 14-28

- Richard Wyman
- Effectively integrating physical security technology into the operational technology domain pp. 29-39

- Matthew Wharton
- Users are an intelligence source: Are you leveraging them in your detection strategy? pp. 40-47

- Tonia Dudley
- Think like a hacker: Reducing cyber security risk by improving API design and protection pp. 48-57

- Gerhard Giese
- The challenge of assessing strategic cyber security risk in organisations and critical infrastructure pp. 58-69

- Charles Harry
- What the market is not telling you about the cyber security skills shortage pp. 70-76

- Karla Reffold
- Non-traditional cyber adversaries: Combatting human trafficking through data science pp. 77-90

- Danielle Borrelli and Sherrie Caltagirone
Volume 3, issue 4, 2020
- Editorial pp. 292-293

- Simon Beckett
- Moving target defence: Economics and asymmetry pp. 294-307

- Don Maclean
- 1-10-60: Measuring the speed of incident response pp. 308-314

- Ronald Pool
- What lawyers mean by ‘reasonable’ cyber security controls pp. 315-329

- Chris Cronin
- The three Ps of third-party risk pp. 330-338

- Mark Sangster
- Cyber incident response approach framework for local government pp. 339-350

- Mark Brett, Joshua Wood and Jamie Parker
- Hacking humans: A case study and analysis of vulnerabilities in the advancing medical device landscape pp. 351-362

- Gabrielle Hempel, Diane Brady Janosek and Donna Brady Raziano
- The role of information about opponent’s actions and intrusion-detection alerts on cyber decisions in cyber security games pp. 363-378

- Palvi Aggarwal and Varun Dutt
Volume 3, issue 3, 2020
- Editorial pp. 193-194

- Simon Beckett
- Security and privacy risks in the blockchain ecosystem pp. 195-207

- Ivana Bartoletti, Samuel Plantié and Arun Sambodaran
- IT modernisation in the energy sector: Preventing cyberthreats to critical infrastructure pp. 208-219

- Pamela K. Isom
- The European Commission goes ‘cloud first’: A roadmap towards trusted cloud adoption to seize the opportunities of digital transformation for EU institutions and agencies pp. 220-232

- Ken Ducatel, Thomas Michlmayr, Philippe Merle, Dalibor Baskovc and François Mestre
- ADDRR: A counter kill chain cyber security model pp. 233-255

- Alex Henneberg
- Zero trust in an all too trusting world pp. 256-264

- Gerald Caron
- Security monitoring strategies for your OT infrastructure pp. 265-274

- Mohammad Jbair
- Evaluating cyber risk reporting in US financial reports pp. 275-286

- Ron Fisher, Justin Wood, Celia Porod and Lydia Greco
Volume 3, issue 2, 2019
- Call to arms: A holistic security approach for a changing threat landscape pp. 100-102

- Richard P. Grassie
- Third-party risk management: Strategy to mitigate ‘on-premise’ and ‘cloud’ cyber security risks pp. 103-115

- Moh Cissé
- Digital twins, the industrial Internet of Things and cyber security threats in connected industry pp. 116-123

- Mark Hearn
- A strategic approach to cyber security risk reduction for FX in the cloud using people, processes and technology pp. 124-133

- Rupert Lee-Browne
- Managing the hypercomplexity of cyber security regulation: In search of a regulatory Rosetta Stone pp. 134-144

- F. Paul Greene
- Healthcare cyber security and HIPAA assurance with business associates pp. 145-158

- Janice Ahlstrom, Christopher Tait and Kenneth Zoline
- Preventing cybercrime: A framework for understanding the role of human vulnerabilities pp. 159-174

- Christopher S. Kayser, Mary Ellen Mastrorilli and Robert Cadigan
- The nature of society: Are certain cultures less predisposed to cyberthreats than others? An examination using the example of Germany pp. 175-185

- Jochen Werne
Volume 3, issue 1, 2019
- Call for papers pp. 4-5

- Simon Beckett
- Impersonation fraud scenarios: How to protect, detect and respond pp. 6-13

- Mario Bruno
- Doing risk management correctly pp. 14-24

- Randall Frietzsche
- Examining the relationship between formal RMF training and perceptions of RMF effectiveness, sustainability and commitment in RMF practitioners pp. 25-36

- Philip D. Schall and Oludotun Oni
- Surviving ransom driven DDoS extortion campaigns pp. 37-43

- Sean Newman
- Resilience to combined attacks pp. 44-56

- David Winks
- A data privacy approach for cyber-physical systems pp. 57-72

- Jan Weldert, Jana Karina Von Wedel and Christian Beul
- Cyber security and human resource development implications for the enterprise pp. 73-92

- Andrew R. Gillam
| |