EconPapers    
Economics at your fingertips  
 

Cyber Security: A Peer-Reviewed Journal

2017 - 2025

From Henry Stewart Publications
Bibliographic data for series maintained by Henry Stewart Talks ().

Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.


Volume 2, issue 4, 2019

Editorial pp. 292-293 Downloads
Simon Beckett
The Eurosystem’s cyber resilience strategy for financial market infrastructures pp. 294-302 Downloads
Marc Bayle De Jessé
Why do cyber security programmes fail? pp. 303-309 Downloads
Chris Moschovitis
Cyber risk: Leveraging a multidisciplinary approach pp. 310-320 Downloads
Charlotte Branfield
Thwarting a cyber physical attack in the Internet of Things era pp. 321-335 Downloads
Bharat Mistry and William (Bill) Malik
Leadership in the cyber warfare era: Formulating a data breach reporting and management strategy pp. 336-345 Downloads
Garikai Chimuka
An ISO 27001 compliance project for a cyber security service team pp. 346-359 Downloads
Moh Cissé
Civil liberties vs national security in the encryption debate: Exceptional access and the trust deficit pp. 360-386 Downloads
Brittany Bieber, Ahmad Sultan, Michael Nacht and Sabhanaz Rashid Diya

Volume 2, issue 3, 2018

Editorial pp. 200-201 Downloads
Simon Beckett
Framing cyber security as a business risk pp. 202-210 Downloads
Evan Wheeler
Insider threat detection: Where and how data science applies pp. 211-218 Downloads
Derek Lin
DevOps security improvements through effective use of container technology pp. 219-227 Downloads
Murray Goldschmidt
How can we effectively regulate grid security? pp. 228-237 Downloads
Tom Alrich
Strategic trends in the global cyber conflict pp. 238-250 Downloads
Gil Baram, Daniel Cohen, Zeev Shapira, Omree Wechsler, Nir Hight and Isaac Ben-Israel
SOC 2030: Security Operations centres are broken, let’s fix them pp. 251-261 Downloads
Kerry Matre
Preventing cryptocurrency theft: Learning from the past to secure the future pp. 262-269 Downloads
Amos Kater and Andrew Jamieson
Risk perceptions of electronic health records pp. 270-285 Downloads
Patricia Le, Michael Tsiang, Natan Hekmatjah and Peter Katona

Volume 2, issue 2, 2018

Editorial pp. 104-105 Downloads
Simon Beckett
The cyberthreat facing the financial services industry pp. 106-113 Downloads
Pat Antonacci
Best practices in creating a vulnerability assessment programme: Measure twice and cut once, avoiding costly mistakes pp. 114-121 Downloads
Christopher Cowen
Emerging trends in insurance coverage: Massive encryption attacks create urgent need for business interruption and cyber coverage pp. 122-130 Downloads
Sean Hoar and Peter M. Marchel
Risky travel: The missing piece for holistic cyber security risk management pp. 131-142 Downloads
Moh Cissé
The impact of GDPR on WHOIS: Implications for businesses facing cybercrime pp. 143-148 Downloads
Anthony J. Ferrante
One way to better cyber resilience in the financial sector: The Danish approach pp. 149-162 Downloads
René Thomsen and Gustav Kaas-Jacobsen
Small and medium enterprises: Analysing the cyber challenge pp. 163-172 Downloads
Gianluca Riglietti, Patrick Alcantara and Lucila Aguada
Staying one step ahead of the GDPR: Embed privacy and security by design pp. 173-180 Downloads
Ann Cavoukian
Measurement of organisational variables associated with cyber security preparedness in Turkey pp. 181-192 Downloads
S. Hakan Can, Gokhan Ikitemur and Helen M. Hendy

Volume 2, issue 1, 2018

Editorial pp. 4-5 Downloads
Bonnie Butlin
Banking phishing: The case of Brazil pp. 6-16 Downloads
Beatriz Silveira Brasil and Karina Correia Figueiredo Campelo
From panic to pragmatism: De-escalating and managing commercial data breaches pp. 17-22 Downloads
Liisa Thomas and Amber C. Thomson
GDPR and employee data protection: Cyber security data example pp. 23-30 Downloads
Deborah Watson and Ryan Millerick
Reflections on CIO research: The essential qualities sought after when hiring today’s cyber security leaders pp. 31-37 Downloads
Claire Pales
#SafeCard: Ukraine’s answer to cyberthreats targeting cardholders pp. 38-50 Downloads
Olesya Danylchenko
An effective approach to addressing human security vulnerability in an organisation pp. 51-65 Downloads
Masha Sedova
Staying safe in an increasingly interconnected world: IOT and Cybersecurity pp. 66-72 Downloads
Theresa Payton
PCI DSS and card brands: Standards, compliance and enforcement pp. 73-82 Downloads
Donna Wilson, Ethan Roman and Ingrid Beierly
Purchasing and understanding cyber insurance coverage pp. 83-89 Downloads
Judy Selby
‘Reasonable security’: A moving target pp. 90-97 Downloads
Elizabeth E. Mcginn, James Shreve and Margo H. K. Tank

Volume 1, issue 4, 2018

Editorial pp. 292-293 Downloads
Simon Beckett
Should cyber security be included in compliance training? pp. 294-300 Downloads
Piotr Chmiel
Data breach litigation and regulatory enforcement: A survey of our present and how to prepare for the future pp. 301-315 Downloads
Behnam Dayanim and Edward George
Identity crisis: Detecting account opening fraud in the age of identity commoditisation pp. 316-325 Downloads
Uri Rivner
The human factor in cyber security pp. 326-330 Downloads
Nicola Sotira
Normative restraints on cyber conflict pp. 331-342 Downloads
Joseph S. Nye
Effective foundational security principles pp. 343-350 Downloads
Erich Kron
Human aspects of cyber security: Behaviour or culture change? pp. 351-360 Downloads
Adam Joinson and Tommy Van Steen
Chief Information Security Officer best practices for 2018: Proactive cyber security pp. 361-367 Downloads
Travis Rosiek
Cyberattacks survival guide pp. 368-376 Downloads
Gadi Naveh

Volume 1, issue 3, 2017

Editorial pp. 197-198 Downloads
Mike Carpenter
Memory protection challenges: Attacks on memory encryption pp. 199-206 Downloads
Rodrigo Rubira Branco and Shay Gueron
The NIST Risk Management Framework: Problems and recommendations pp. 207-217 Downloads
Don Maclean
Strategic decision making in cyber security: Lessons learned pp. 218-226 Downloads
Helmut Habermayer
Cyber defence capability development for common security and defence policy of the European Union: A critical look back and ahead pp. 227-240 Downloads
Wolfgang Röhrig
Successfully tackling cybercrime at the local level pp. 241-250 Downloads
Andy Haslam
Cyber insurance comes of age pp. 251-258 Downloads
Gareth Tungatt
Protocol analysis and vulnerabilities of Cisco’s autonomic network pp. 259-272 Downloads
Omar Eissa
‘Imagine if …’: The power of storytelling in building business resilience pp. 273-284 Downloads
Nick Wilding

Volume 1, issue 2, 2017

Editorial pp. 100-101 Downloads
Simon Beckett
Cyber incidents: How best to work with law enforcement pp. 102-115 Downloads
David H. Laufman, Sean Newell, Stephen Reynolds and Mike Buchwald
Is your information security ecosystem consuming poisonous information and putting your enterprise at risk? pp. 116-126 Downloads
Gordon Mackay
How machine learning is catching up with the insider threat pp. 127-133 Downloads
Jamie Graves
Cyber resilience: Leadership matters pp. 134-146 Downloads
Cathie Armour
Protecting the crown jewels of the government through infrastructure resilience and the DHS Continuous Diagnostics and Mitigation programme pp. 147-155 Downloads
Kevin Cox and Mark Kneidinger
Cyber security talks: A content analysis of online discussions on ransomware pp. 156-164 Downloads
Gianluca Riglietti
NATO: Stepping up its game in cyber defence pp. 165-174 Downloads
Jamie Shea
Node.js Security pp. 175-186 Downloads
Ilya Verbitskiy

Volume 1, issue 1, 2017

Editorial pp. 4-5 Downloads
Unknown
A security evolution driven by the Internet of Intelligent Things pp. 6-15 Downloads
Steve P. Williamson
Changing the rules of the game: How can law enforcement deter criminals by increasing the risks of conducting cybercrime? pp. 16-27 Downloads
Philipp Amann, Aglika Klayn and Grégory Mounier
Consider the consequences: A powerful approach for reducing ICS cyber risk pp. 28-43 Downloads
Richard Wyman
The fight within encryption pp. 44-47 Downloads
Sammy Basu
Cyber as NATO’s newest operational domain: The pathway to implementation pp. 48-60 Downloads
Christos Athanasiadis and Rizwan Ali
Industry 4.0: Security imperatives for IoT — converging networks, increasing risks pp. 61-68 Downloads
Shaun Bligh-Wall
Partner or perish: Research collaboration to secure cyberspace pp. 69-79 Downloads
Gareth Parker and Alex Zelinsky
Multi-vector threats and the argument for greater convergence pp. 80-91 Downloads
Ron Chandler, Brent Hambly, Jason Holcomb, George Ressopoulos and Matthew Wharton
Cyber risk valuation: Show me the money pp. 92-94 Downloads
John B. Sapp
Page updated 2025-04-21