EconPapers    
Economics at your fingertips  
 

Cyber Security: A Peer-Reviewed Journal

2017 - 2025

From Henry Stewart Publications
Bibliographic data for series maintained by Henry Stewart Talks ().

Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.


Volume 3, issue 4, 2020

Editorial pp. 292-293 Downloads
Simon Beckett
Moving target defence: Economics and asymmetry pp. 294-307 Downloads
Don Maclean
1-10-60: Measuring the speed of incident response pp. 308-314 Downloads
Ronald Pool
What lawyers mean by ‘reasonable’ cyber security controls pp. 315-329 Downloads
Chris Cronin
The three Ps of third-party risk pp. 330-338 Downloads
Mark Sangster
Cyber incident response approach framework for local government pp. 339-350 Downloads
Mark Brett, Joshua Wood and Jamie Parker
Hacking humans: A case study and analysis of vulnerabilities in the advancing medical device landscape pp. 351-362 Downloads
Gabrielle Hempel, Diane Brady Janosek and Donna Brady Raziano
The role of information about opponent’s actions and intrusion-detection alerts on cyber decisions in cyber security games pp. 363-378 Downloads
Palvi Aggarwal and Varun Dutt

Volume 3, issue 3, 2020

Editorial pp. 193-194 Downloads
Simon Beckett
Security and privacy risks in the blockchain ecosystem pp. 195-207 Downloads
Ivana Bartoletti, Samuel Plantié and Arun Sambodaran
IT modernisation in the energy sector: Preventing cyberthreats to critical infrastructure pp. 208-219 Downloads
Pamela K. Isom
The European Commission goes ‘cloud first’: A roadmap towards trusted cloud adoption to seize the opportunities of digital transformation for EU institutions and agencies pp. 220-232 Downloads
Ken Ducatel, Thomas Michlmayr, Philippe Merle, Dalibor Baskovc and François Mestre
ADDRR: A counter kill chain cyber security model pp. 233-255 Downloads
Alex Henneberg
Zero trust in an all too trusting world pp. 256-264 Downloads
Gerald Caron
Security monitoring strategies for your OT infrastructure pp. 265-274 Downloads
Mohammad Jbair
Evaluating cyber risk reporting in US financial reports pp. 275-286 Downloads
Ron Fisher, Justin Wood, Celia Porod and Lydia Greco

Volume 3, issue 2, 2019

Call to arms: A holistic security approach for a changing threat landscape pp. 100-102 Downloads
Richard P. Grassie
Third-party risk management: Strategy to mitigate ‘on-premise’ and ‘cloud’ cyber security risks pp. 103-115 Downloads
Moh Cissé
Digital twins, the industrial Internet of Things and cyber security threats in connected industry pp. 116-123 Downloads
Mark Hearn
A strategic approach to cyber security risk reduction for FX in the cloud using people, processes and technology pp. 124-133 Downloads
Rupert Lee-Browne
Managing the hypercomplexity of cyber security regulation: In search of a regulatory Rosetta Stone pp. 134-144 Downloads
F. Paul Greene
Healthcare cyber security and HIPAA assurance with business associates pp. 145-158 Downloads
Janice Ahlstrom, Christopher Tait and Kenneth Zoline
Preventing cybercrime: A framework for understanding the role of human vulnerabilities pp. 159-174 Downloads
Christopher S. Kayser, Mary Ellen Mastrorilli and Robert Cadigan
The nature of society: Are certain cultures less predisposed to cyberthreats than others? An examination using the example of Germany pp. 175-185 Downloads
Jochen Werne

Volume 3, issue 1, 2019

Call for papers pp. 4-5 Downloads
Simon Beckett
Impersonation fraud scenarios: How to protect, detect and respond pp. 6-13 Downloads
Mario Bruno
Doing risk management correctly pp. 14-24 Downloads
Randall Frietzsche
Examining the relationship between formal RMF training and perceptions of RMF effectiveness, sustainability and commitment in RMF practitioners pp. 25-36 Downloads
Philip D. Schall and Oludotun Oni
Surviving ransom driven DDoS extortion campaigns pp. 37-43 Downloads
Sean Newman
Resilience to combined attacks pp. 44-56 Downloads
David Winks
A data privacy approach for cyber-physical systems pp. 57-72 Downloads
Jan Weldert, Jana Karina Von Wedel and Christian Beul
Cyber security and human resource development implications for the enterprise pp. 73-92 Downloads
Andrew R. Gillam

Volume 2, issue 4, 2019

Editorial pp. 292-293 Downloads
Simon Beckett
The Eurosystem’s cyber resilience strategy for financial market infrastructures pp. 294-302 Downloads
Marc Bayle De Jessé
Why do cyber security programmes fail? pp. 303-309 Downloads
Chris Moschovitis
Cyber risk: Leveraging a multidisciplinary approach pp. 310-320 Downloads
Charlotte Branfield
Thwarting a cyber physical attack in the Internet of Things era pp. 321-335 Downloads
Bharat Mistry and William (Bill) Malik
Leadership in the cyber warfare era: Formulating a data breach reporting and management strategy pp. 336-345 Downloads
Garikai Chimuka
An ISO 27001 compliance project for a cyber security service team pp. 346-359 Downloads
Moh Cissé
Civil liberties vs national security in the encryption debate: Exceptional access and the trust deficit pp. 360-386 Downloads
Brittany Bieber, Ahmad Sultan, Michael Nacht and Sabhanaz Rashid Diya

Volume 2, issue 3, 2018

Editorial pp. 200-201 Downloads
Simon Beckett
Framing cyber security as a business risk pp. 202-210 Downloads
Evan Wheeler
Insider threat detection: Where and how data science applies pp. 211-218 Downloads
Derek Lin
DevOps security improvements through effective use of container technology pp. 219-227 Downloads
Murray Goldschmidt
How can we effectively regulate grid security? pp. 228-237 Downloads
Tom Alrich
Strategic trends in the global cyber conflict pp. 238-250 Downloads
Gil Baram, Daniel Cohen, Zeev Shapira, Omree Wechsler, Nir Hight and Isaac Ben-Israel
SOC 2030: Security Operations centres are broken, let’s fix them pp. 251-261 Downloads
Kerry Matre
Preventing cryptocurrency theft: Learning from the past to secure the future pp. 262-269 Downloads
Amos Kater and Andrew Jamieson
Risk perceptions of electronic health records pp. 270-285 Downloads
Patricia Le, Michael Tsiang, Natan Hekmatjah and Peter Katona

Volume 2, issue 2, 2018

Editorial pp. 104-105 Downloads
Simon Beckett
The cyberthreat facing the financial services industry pp. 106-113 Downloads
Pat Antonacci
Best practices in creating a vulnerability assessment programme: Measure twice and cut once, avoiding costly mistakes pp. 114-121 Downloads
Christopher Cowen
Emerging trends in insurance coverage: Massive encryption attacks create urgent need for business interruption and cyber coverage pp. 122-130 Downloads
Sean Hoar and Peter M. Marchel
Risky travel: The missing piece for holistic cyber security risk management pp. 131-142 Downloads
Moh Cissé
The impact of GDPR on WHOIS: Implications for businesses facing cybercrime pp. 143-148 Downloads
Anthony J. Ferrante
One way to better cyber resilience in the financial sector: The Danish approach pp. 149-162 Downloads
René Thomsen and Gustav Kaas-Jacobsen
Small and medium enterprises: Analysing the cyber challenge pp. 163-172 Downloads
Gianluca Riglietti, Patrick Alcantara and Lucila Aguada
Staying one step ahead of the GDPR: Embed privacy and security by design pp. 173-180 Downloads
Ann Cavoukian
Measurement of organisational variables associated with cyber security preparedness in Turkey pp. 181-192 Downloads
S. Hakan Can, Gokhan Ikitemur and Helen M. Hendy

Volume 2, issue 1, 2018

Editorial pp. 4-5 Downloads
Bonnie Butlin
Banking phishing: The case of Brazil pp. 6-16 Downloads
Beatriz Silveira Brasil and Karina Correia Figueiredo Campelo
From panic to pragmatism: De-escalating and managing commercial data breaches pp. 17-22 Downloads
Liisa Thomas and Amber C. Thomson
GDPR and employee data protection: Cyber security data example pp. 23-30 Downloads
Deborah Watson and Ryan Millerick
Reflections on CIO research: The essential qualities sought after when hiring today’s cyber security leaders pp. 31-37 Downloads
Claire Pales
#SafeCard: Ukraine’s answer to cyberthreats targeting cardholders pp. 38-50 Downloads
Olesya Danylchenko
An effective approach to addressing human security vulnerability in an organisation pp. 51-65 Downloads
Masha Sedova
Staying safe in an increasingly interconnected world: IOT and Cybersecurity pp. 66-72 Downloads
Theresa Payton
PCI DSS and card brands: Standards, compliance and enforcement pp. 73-82 Downloads
Donna Wilson, Ethan Roman and Ingrid Beierly
Purchasing and understanding cyber insurance coverage pp. 83-89 Downloads
Judy Selby
‘Reasonable security’: A moving target pp. 90-97 Downloads
Elizabeth E. Mcginn, James Shreve and Margo H. K. Tank
Page updated 2026-01-02