Cyber Security: A Peer-Reviewed Journal
2017 - 2025
From Henry Stewart Publications Bibliographic data for series maintained by Henry Stewart Talks (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 2, issue 4, 2019
- Editorial pp. 292-293

- Simon Beckett
- The Eurosystem’s cyber resilience strategy for financial market infrastructures pp. 294-302

- Marc Bayle De Jessé
- Why do cyber security programmes fail? pp. 303-309

- Chris Moschovitis
- Cyber risk: Leveraging a multidisciplinary approach pp. 310-320

- Charlotte Branfield
- Thwarting a cyber physical attack in the Internet of Things era pp. 321-335

- Bharat Mistry and William (Bill) Malik
- Leadership in the cyber warfare era: Formulating a data breach reporting and management strategy pp. 336-345

- Garikai Chimuka
- An ISO 27001 compliance project for a cyber security service team pp. 346-359

- Moh Cissé
- Civil liberties vs national security in the encryption debate: Exceptional access and the trust deficit pp. 360-386

- Brittany Bieber, Ahmad Sultan, Michael Nacht and Sabhanaz Rashid Diya
Volume 2, issue 3, 2018
- Editorial pp. 200-201

- Simon Beckett
- Framing cyber security as a business risk pp. 202-210

- Evan Wheeler
- Insider threat detection: Where and how data science applies pp. 211-218

- Derek Lin
- DevOps security improvements through effective use of container technology pp. 219-227

- Murray Goldschmidt
- How can we effectively regulate grid security? pp. 228-237

- Tom Alrich
- Strategic trends in the global cyber conflict pp. 238-250

- Gil Baram, Daniel Cohen, Zeev Shapira, Omree Wechsler, Nir Hight and Isaac Ben-Israel
- SOC 2030: Security Operations centres are broken, let’s fix them pp. 251-261

- Kerry Matre
- Preventing cryptocurrency theft: Learning from the past to secure the future pp. 262-269

- Amos Kater and Andrew Jamieson
- Risk perceptions of electronic health records pp. 270-285

- Patricia Le, Michael Tsiang, Natan Hekmatjah and Peter Katona
Volume 2, issue 2, 2018
- Editorial pp. 104-105

- Simon Beckett
- The cyberthreat facing the financial services industry pp. 106-113

- Pat Antonacci
- Best practices in creating a vulnerability assessment programme: Measure twice and cut once, avoiding costly mistakes pp. 114-121

- Christopher Cowen
- Emerging trends in insurance coverage: Massive encryption attacks create urgent need for business interruption and cyber coverage pp. 122-130

- Sean Hoar and Peter M. Marchel
- Risky travel: The missing piece for holistic cyber security risk management pp. 131-142

- Moh Cissé
- The impact of GDPR on WHOIS: Implications for businesses facing cybercrime pp. 143-148

- Anthony J. Ferrante
- One way to better cyber resilience in the financial sector: The Danish approach pp. 149-162

- René Thomsen and Gustav Kaas-Jacobsen
- Small and medium enterprises: Analysing the cyber challenge pp. 163-172

- Gianluca Riglietti, Patrick Alcantara and Lucila Aguada
- Staying one step ahead of the GDPR: Embed privacy and security by design pp. 173-180

- Ann Cavoukian
- Measurement of organisational variables associated with cyber security preparedness in Turkey pp. 181-192

- S. Hakan Can, Gokhan Ikitemur and Helen M. Hendy
Volume 2, issue 1, 2018
- Editorial pp. 4-5

- Bonnie Butlin
- Banking phishing: The case of Brazil pp. 6-16

- Beatriz Silveira Brasil and Karina Correia Figueiredo Campelo
- From panic to pragmatism: De-escalating and managing commercial data breaches pp. 17-22

- Liisa Thomas and Amber C. Thomson
- GDPR and employee data protection: Cyber security data example pp. 23-30

- Deborah Watson and Ryan Millerick
- Reflections on CIO research: The essential qualities sought after when hiring today’s cyber security leaders pp. 31-37

- Claire Pales
- #SafeCard: Ukraine’s answer to cyberthreats targeting cardholders pp. 38-50

- Olesya Danylchenko
- An effective approach to addressing human security vulnerability in an organisation pp. 51-65

- Masha Sedova
- Staying safe in an increasingly interconnected world: IOT and Cybersecurity pp. 66-72

- Theresa Payton
- PCI DSS and card brands: Standards, compliance and enforcement pp. 73-82

- Donna Wilson, Ethan Roman and Ingrid Beierly
- Purchasing and understanding cyber insurance coverage pp. 83-89

- Judy Selby
- ‘Reasonable security’: A moving target pp. 90-97

- Elizabeth E. Mcginn, James Shreve and Margo H. K. Tank
Volume 1, issue 4, 2018
- Editorial pp. 292-293

- Simon Beckett
- Should cyber security be included in compliance training? pp. 294-300

- Piotr Chmiel
- Data breach litigation and regulatory enforcement: A survey of our present and how to prepare for the future pp. 301-315

- Behnam Dayanim and Edward George
- Identity crisis: Detecting account opening fraud in the age of identity commoditisation pp. 316-325

- Uri Rivner
- The human factor in cyber security pp. 326-330

- Nicola Sotira
- Normative restraints on cyber conflict pp. 331-342

- Joseph S. Nye
- Effective foundational security principles pp. 343-350

- Erich Kron
- Human aspects of cyber security: Behaviour or culture change? pp. 351-360

- Adam Joinson and Tommy Van Steen
- Chief Information Security Officer best practices for 2018: Proactive cyber security pp. 361-367

- Travis Rosiek
- Cyberattacks survival guide pp. 368-376

- Gadi Naveh
Volume 1, issue 3, 2017
- Editorial pp. 197-198

- Mike Carpenter
- Memory protection challenges: Attacks on memory encryption pp. 199-206

- Rodrigo Rubira Branco and Shay Gueron
- The NIST Risk Management Framework: Problems and recommendations pp. 207-217

- Don Maclean
- Strategic decision making in cyber security: Lessons learned pp. 218-226

- Helmut Habermayer
- Cyber defence capability development for common security and defence policy of the European Union: A critical look back and ahead pp. 227-240

- Wolfgang Röhrig
- Successfully tackling cybercrime at the local level pp. 241-250

- Andy Haslam
- Cyber insurance comes of age pp. 251-258

- Gareth Tungatt
- Protocol analysis and vulnerabilities of Cisco’s autonomic network pp. 259-272

- Omar Eissa
- ‘Imagine if …’: The power of storytelling in building business resilience pp. 273-284

- Nick Wilding
Volume 1, issue 2, 2017
- Editorial pp. 100-101

- Simon Beckett
- Cyber incidents: How best to work with law enforcement pp. 102-115

- David H. Laufman, Sean Newell, Stephen Reynolds and Mike Buchwald
- Is your information security ecosystem consuming poisonous information and putting your enterprise at risk? pp. 116-126

- Gordon Mackay
- How machine learning is catching up with the insider threat pp. 127-133

- Jamie Graves
- Cyber resilience: Leadership matters pp. 134-146

- Cathie Armour
- Protecting the crown jewels of the government through infrastructure resilience and the DHS Continuous Diagnostics and Mitigation programme pp. 147-155

- Kevin Cox and Mark Kneidinger
- Cyber security talks: A content analysis of online discussions on ransomware pp. 156-164

- Gianluca Riglietti
- NATO: Stepping up its game in cyber defence pp. 165-174

- Jamie Shea
- Node.js Security pp. 175-186

- Ilya Verbitskiy
Volume 1, issue 1, 2017
- Editorial pp. 4-5

- Unknown
- A security evolution driven by the Internet of Intelligent Things pp. 6-15

- Steve P. Williamson
- Changing the rules of the game: How can law enforcement deter criminals by increasing the risks of conducting cybercrime? pp. 16-27

- Philipp Amann, Aglika Klayn and Grégory Mounier
- Consider the consequences: A powerful approach for reducing ICS cyber risk pp. 28-43

- Richard Wyman
- The fight within encryption pp. 44-47

- Sammy Basu
- Cyber as NATO’s newest operational domain: The pathway to implementation pp. 48-60

- Christos Athanasiadis and Rizwan Ali
- Industry 4.0: Security imperatives for IoT — converging networks, increasing risks pp. 61-68

- Shaun Bligh-Wall
- Partner or perish: Research collaboration to secure cyberspace pp. 69-79

- Gareth Parker and Alex Zelinsky
- Multi-vector threats and the argument for greater convergence pp. 80-91

- Ron Chandler, Brent Hambly, Jason Holcomb, George Ressopoulos and Matthew Wharton
- Cyber risk valuation: Show me the money pp. 92-94

- John B. Sapp
| |