Cyber Security: A Peer-Reviewed Journal
2017 - 2025
From Henry Stewart Publications Bibliographic data for series maintained by Henry Stewart Talks (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 3, issue 4, 2020
- Editorial pp. 292-293

- Simon Beckett
- Moving target defence: Economics and asymmetry pp. 294-307

- Don Maclean
- 1-10-60: Measuring the speed of incident response pp. 308-314

- Ronald Pool
- What lawyers mean by ‘reasonable’ cyber security controls pp. 315-329

- Chris Cronin
- The three Ps of third-party risk pp. 330-338

- Mark Sangster
- Cyber incident response approach framework for local government pp. 339-350

- Mark Brett, Joshua Wood and Jamie Parker
- Hacking humans: A case study and analysis of vulnerabilities in the advancing medical device landscape pp. 351-362

- Gabrielle Hempel, Diane Brady Janosek and Donna Brady Raziano
- The role of information about opponent’s actions and intrusion-detection alerts on cyber decisions in cyber security games pp. 363-378

- Palvi Aggarwal and Varun Dutt
Volume 3, issue 3, 2020
- Editorial pp. 193-194

- Simon Beckett
- Security and privacy risks in the blockchain ecosystem pp. 195-207

- Ivana Bartoletti, Samuel Plantié and Arun Sambodaran
- IT modernisation in the energy sector: Preventing cyberthreats to critical infrastructure pp. 208-219

- Pamela K. Isom
- The European Commission goes ‘cloud first’: A roadmap towards trusted cloud adoption to seize the opportunities of digital transformation for EU institutions and agencies pp. 220-232

- Ken Ducatel, Thomas Michlmayr, Philippe Merle, Dalibor Baskovc and François Mestre
- ADDRR: A counter kill chain cyber security model pp. 233-255

- Alex Henneberg
- Zero trust in an all too trusting world pp. 256-264

- Gerald Caron
- Security monitoring strategies for your OT infrastructure pp. 265-274

- Mohammad Jbair
- Evaluating cyber risk reporting in US financial reports pp. 275-286

- Ron Fisher, Justin Wood, Celia Porod and Lydia Greco
Volume 3, issue 2, 2019
- Call to arms: A holistic security approach for a changing threat landscape pp. 100-102

- Richard P. Grassie
- Third-party risk management: Strategy to mitigate ‘on-premise’ and ‘cloud’ cyber security risks pp. 103-115

- Moh Cissé
- Digital twins, the industrial Internet of Things and cyber security threats in connected industry pp. 116-123

- Mark Hearn
- A strategic approach to cyber security risk reduction for FX in the cloud using people, processes and technology pp. 124-133

- Rupert Lee-Browne
- Managing the hypercomplexity of cyber security regulation: In search of a regulatory Rosetta Stone pp. 134-144

- F. Paul Greene
- Healthcare cyber security and HIPAA assurance with business associates pp. 145-158

- Janice Ahlstrom, Christopher Tait and Kenneth Zoline
- Preventing cybercrime: A framework for understanding the role of human vulnerabilities pp. 159-174

- Christopher S. Kayser, Mary Ellen Mastrorilli and Robert Cadigan
- The nature of society: Are certain cultures less predisposed to cyberthreats than others? An examination using the example of Germany pp. 175-185

- Jochen Werne
Volume 3, issue 1, 2019
- Call for papers pp. 4-5

- Simon Beckett
- Impersonation fraud scenarios: How to protect, detect and respond pp. 6-13

- Mario Bruno
- Doing risk management correctly pp. 14-24

- Randall Frietzsche
- Examining the relationship between formal RMF training and perceptions of RMF effectiveness, sustainability and commitment in RMF practitioners pp. 25-36

- Philip D. Schall and Oludotun Oni
- Surviving ransom driven DDoS extortion campaigns pp. 37-43

- Sean Newman
- Resilience to combined attacks pp. 44-56

- David Winks
- A data privacy approach for cyber-physical systems pp. 57-72

- Jan Weldert, Jana Karina Von Wedel and Christian Beul
- Cyber security and human resource development implications for the enterprise pp. 73-92

- Andrew R. Gillam
Volume 2, issue 4, 2019
- Editorial pp. 292-293

- Simon Beckett
- The Eurosystem’s cyber resilience strategy for financial market infrastructures pp. 294-302

- Marc Bayle De Jessé
- Why do cyber security programmes fail? pp. 303-309

- Chris Moschovitis
- Cyber risk: Leveraging a multidisciplinary approach pp. 310-320

- Charlotte Branfield
- Thwarting a cyber physical attack in the Internet of Things era pp. 321-335

- Bharat Mistry and William (Bill) Malik
- Leadership in the cyber warfare era: Formulating a data breach reporting and management strategy pp. 336-345

- Garikai Chimuka
- An ISO 27001 compliance project for a cyber security service team pp. 346-359

- Moh Cissé
- Civil liberties vs national security in the encryption debate: Exceptional access and the trust deficit pp. 360-386

- Brittany Bieber, Ahmad Sultan, Michael Nacht and Sabhanaz Rashid Diya
Volume 2, issue 3, 2018
- Editorial pp. 200-201

- Simon Beckett
- Framing cyber security as a business risk pp. 202-210

- Evan Wheeler
- Insider threat detection: Where and how data science applies pp. 211-218

- Derek Lin
- DevOps security improvements through effective use of container technology pp. 219-227

- Murray Goldschmidt
- How can we effectively regulate grid security? pp. 228-237

- Tom Alrich
- Strategic trends in the global cyber conflict pp. 238-250

- Gil Baram, Daniel Cohen, Zeev Shapira, Omree Wechsler, Nir Hight and Isaac Ben-Israel
- SOC 2030: Security Operations centres are broken, let’s fix them pp. 251-261

- Kerry Matre
- Preventing cryptocurrency theft: Learning from the past to secure the future pp. 262-269

- Amos Kater and Andrew Jamieson
- Risk perceptions of electronic health records pp. 270-285

- Patricia Le, Michael Tsiang, Natan Hekmatjah and Peter Katona
Volume 2, issue 2, 2018
- Editorial pp. 104-105

- Simon Beckett
- The cyberthreat facing the financial services industry pp. 106-113

- Pat Antonacci
- Best practices in creating a vulnerability assessment programme: Measure twice and cut once, avoiding costly mistakes pp. 114-121

- Christopher Cowen
- Emerging trends in insurance coverage: Massive encryption attacks create urgent need for business interruption and cyber coverage pp. 122-130

- Sean Hoar and Peter M. Marchel
- Risky travel: The missing piece for holistic cyber security risk management pp. 131-142

- Moh Cissé
- The impact of GDPR on WHOIS: Implications for businesses facing cybercrime pp. 143-148

- Anthony J. Ferrante
- One way to better cyber resilience in the financial sector: The Danish approach pp. 149-162

- René Thomsen and Gustav Kaas-Jacobsen
- Small and medium enterprises: Analysing the cyber challenge pp. 163-172

- Gianluca Riglietti, Patrick Alcantara and Lucila Aguada
- Staying one step ahead of the GDPR: Embed privacy and security by design pp. 173-180

- Ann Cavoukian
- Measurement of organisational variables associated with cyber security preparedness in Turkey pp. 181-192

- S. Hakan Can, Gokhan Ikitemur and Helen M. Hendy
Volume 2, issue 1, 2018
- Editorial pp. 4-5

- Bonnie Butlin
- Banking phishing: The case of Brazil pp. 6-16

- Beatriz Silveira Brasil and Karina Correia Figueiredo Campelo
- From panic to pragmatism: De-escalating and managing commercial data breaches pp. 17-22

- Liisa Thomas and Amber C. Thomson
- GDPR and employee data protection: Cyber security data example pp. 23-30

- Deborah Watson and Ryan Millerick
- Reflections on CIO research: The essential qualities sought after when hiring today’s cyber security leaders pp. 31-37

- Claire Pales
- #SafeCard: Ukraine’s answer to cyberthreats targeting cardholders pp. 38-50

- Olesya Danylchenko
- An effective approach to addressing human security vulnerability in an organisation pp. 51-65

- Masha Sedova
- Staying safe in an increasingly interconnected world: IOT and Cybersecurity pp. 66-72

- Theresa Payton
- PCI DSS and card brands: Standards, compliance and enforcement pp. 73-82

- Donna Wilson, Ethan Roman and Ingrid Beierly
- Purchasing and understanding cyber insurance coverage pp. 83-89

- Judy Selby
- ‘Reasonable security’: A moving target pp. 90-97

- Elizabeth E. Mcginn, James Shreve and Margo H. K. Tank
| |