EconPapers    
Economics at your fingertips  
 

Cyber Security: A Peer-Reviewed Journal

2017 - 2025

From Henry Stewart Publications
Bibliographic data for series maintained by Henry Stewart Talks ().

Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.


Volume 4, issue 4, 2021

Editorial pp. 300-301 Downloads
Simon Beckett
A framework for quantifying cyber security risks pp. 302-316 Downloads
Reinder Wolthuis, Frank Phillipson, Hidde-Jan Jongsma and Peter Langenkamp
Open sesame: Lessons in password-based user authentication pp. 317-329 Downloads
Bahman Rashidi and Vaibhav Garg
An overview of current issues and practice relating to local government cyber security in England and Wales pp. 330-344 Downloads
Mark Brett
Cyber security for microreactors in advanced energy systems pp. 345-367 Downloads
Piyush Sabharwall, James Gibb, Christopher Ritter, Kathleen Araújo, Abhinav Gupta, Ian Ferguson, Bri Rolston, Ron Fisher, Jess Gehin and Youssef Ballout
The laws governing data breaches: An update pp. 368-379 Downloads
Behnam Dayanim and Roya Butler
Managing stakeholder communication during a cyber crisis pp. 380-387 Downloads
Caroline Sapriel

Volume 4, issue 3, 2021

Editorial pp. 200-201 Downloads
Simon Beckett
Risk is a result of human behaviour: Leveraging behavioural analytics to strengthen internal controls pp. 202-212 Downloads
Arvind Mehta
Insider threat programmes: Time to hit restart pp. 213-222 Downloads
Jadee Hanson, Todd Thorsen and Nathan Hunstad
The human problem behind credential theft and reuse pp. 223-231 Downloads
Erich Kron
Know your suppliers: A review of ICT supply chain risk management efforts by the US government and its agencies pp. 232-242 Downloads
Olatunji Osunji
International principles for boards of directors and cyber security pp. 243-250 Downloads
Larry Clinton
Cyber security for smart cities: End-to-end cyber security strategy for IoT connected services pp. 251-266 Downloads
Moh Cissé
Identifying cyber security risks in Spanish airports pp. 267-291 Downloads
Lázaro Florido-Benítez

Volume 4, issue 2, 2020

Editorial pp. 100-101 Downloads
Simon Beckett
The industrial Internet of Things: From preventive to reactive systems — redefining your cyber security game plan for the changing world pp. 102-110 Downloads
Lesley Kipling
The complexity of performing cyber audits in the space sector along the supply chain pp. 111-121 Downloads
Jose Ramon Coz Fernandez and Vicente José Pastor Pérez
Cheetahs, COVID-19 and the demand for crypto-agility pp. 122-134 Downloads
Michael Thelander
Cyber leadership across a business ecosystem pp. 135-144 Downloads
Matthew Doan
A framework for fostering a dynamic information security culture pp. 145-159 Downloads
Renay Carver
Vulnerabilities on the wire: Mitigations for insecure ICS device communication pp. 160-181 Downloads
Michael Hoffman
The landscape from above: Continuous cloud monitoring for continuous assurance pp. 182-193 Downloads
Fouad Khalil

Volume 4, issue 1, 2020

Editorial pp. 4-5 Downloads
Simon Beckett
Taking risk to the edge of acceptable pp. 6-13 Downloads
Steve Williamson
Consider the consequences: Understanding and limiting physical impacts caused by an ICS cyberattack pp. 14-28 Downloads
Richard Wyman
Effectively integrating physical security technology into the operational technology domain pp. 29-39 Downloads
Matthew Wharton
Users are an intelligence source: Are you leveraging them in your detection strategy? pp. 40-47 Downloads
Tonia Dudley
Think like a hacker: Reducing cyber security risk by improving API design and protection pp. 48-57 Downloads
Gerhard Giese
The challenge of assessing strategic cyber security risk in organisations and critical infrastructure pp. 58-69 Downloads
Charles Harry
What the market is not telling you about the cyber security skills shortage pp. 70-76 Downloads
Karla Reffold
Non-traditional cyber adversaries: Combatting human trafficking through data science pp. 77-90 Downloads
Danielle Borrelli and Sherrie Caltagirone

Volume 3, issue 4, 2020

Editorial pp. 292-293 Downloads
Simon Beckett
Moving target defence: Economics and asymmetry pp. 294-307 Downloads
Don Maclean
1-10-60: Measuring the speed of incident response pp. 308-314 Downloads
Ronald Pool
What lawyers mean by ‘reasonable’ cyber security controls pp. 315-329 Downloads
Chris Cronin
The three Ps of third-party risk pp. 330-338 Downloads
Mark Sangster
Cyber incident response approach framework for local government pp. 339-350 Downloads
Mark Brett, Joshua Wood and Jamie Parker
Hacking humans: A case study and analysis of vulnerabilities in the advancing medical device landscape pp. 351-362 Downloads
Gabrielle Hempel, Diane Brady Janosek and Donna Brady Raziano
The role of information about opponent’s actions and intrusion-detection alerts on cyber decisions in cyber security games pp. 363-378 Downloads
Palvi Aggarwal and Varun Dutt

Volume 3, issue 3, 2020

Editorial pp. 193-194 Downloads
Simon Beckett
Security and privacy risks in the blockchain ecosystem pp. 195-207 Downloads
Ivana Bartoletti, Samuel Plantié and Arun Sambodaran
IT modernisation in the energy sector: Preventing cyberthreats to critical infrastructure pp. 208-219 Downloads
Pamela K. Isom
The European Commission goes ‘cloud first’: A roadmap towards trusted cloud adoption to seize the opportunities of digital transformation for EU institutions and agencies pp. 220-232 Downloads
Ken Ducatel, Thomas Michlmayr, Philippe Merle, Dalibor Baskovc and François Mestre
ADDRR: A counter kill chain cyber security model pp. 233-255 Downloads
Alex Henneberg
Zero trust in an all too trusting world pp. 256-264 Downloads
Gerald Caron
Security monitoring strategies for your OT infrastructure pp. 265-274 Downloads
Mohammad Jbair
Evaluating cyber risk reporting in US financial reports pp. 275-286 Downloads
Ron Fisher, Justin Wood, Celia Porod and Lydia Greco

Volume 3, issue 2, 2019

Call to arms: A holistic security approach for a changing threat landscape pp. 100-102 Downloads
Richard P. Grassie
Third-party risk management: Strategy to mitigate ‘on-premise’ and ‘cloud’ cyber security risks pp. 103-115 Downloads
Moh Cissé
Digital twins, the industrial Internet of Things and cyber security threats in connected industry pp. 116-123 Downloads
Mark Hearn
A strategic approach to cyber security risk reduction for FX in the cloud using people, processes and technology pp. 124-133 Downloads
Rupert Lee-Browne
Managing the hypercomplexity of cyber security regulation: In search of a regulatory Rosetta Stone pp. 134-144 Downloads
F. Paul Greene
Healthcare cyber security and HIPAA assurance with business associates pp. 145-158 Downloads
Janice Ahlstrom, Christopher Tait and Kenneth Zoline
Preventing cybercrime: A framework for understanding the role of human vulnerabilities pp. 159-174 Downloads
Christopher S. Kayser, Mary Ellen Mastrorilli and Robert Cadigan
The nature of society: Are certain cultures less predisposed to cyberthreats than others? An examination using the example of Germany pp. 175-185 Downloads
Jochen Werne

Volume 3, issue 1, 2019

Call for papers pp. 4-5 Downloads
Simon Beckett
Impersonation fraud scenarios: How to protect, detect and respond pp. 6-13 Downloads
Mario Bruno
Doing risk management correctly pp. 14-24 Downloads
Randall Frietzsche
Examining the relationship between formal RMF training and perceptions of RMF effectiveness, sustainability and commitment in RMF practitioners pp. 25-36 Downloads
Philip D. Schall and Oludotun Oni
Surviving ransom driven DDoS extortion campaigns pp. 37-43 Downloads
Sean Newman
Resilience to combined attacks pp. 44-56 Downloads
David Winks
A data privacy approach for cyber-physical systems pp. 57-72 Downloads
Jan Weldert, Jana Karina Von Wedel and Christian Beul
Cyber security and human resource development implications for the enterprise pp. 73-92 Downloads
Andrew R. Gillam
Page updated 2025-04-21