Found: 15
Select item for more details and to access through your institution.
What security features and crime prevention advice is communicated in consumer IoT device manuals and support pages?
- Published in:
- Journal of Cybersecurity, 2019, v. 5, n. 1, p. N.PAG, doi. 10.1093/cybsec/tyz005
- By:
- Publication type:
- Article
To pay or not: game theoretic models of ransomware.
- Published in:
- Journal of Cybersecurity, 2019, v. 5, n. 1, p. N.PAG, doi. 10.1093/cybsec/tyz009
- By:
- Publication type:
- Article
Cybersecurity education in a developing nation: the Ecuadorian environment.
- Published in:
- Journal of Cybersecurity, 2019, v. 5, n. 1, p. N.PAG, doi. 10.1093/cybsec/tyz001
- By:
- Publication type:
- Article
"Passwords protect my stuff"—a study of children's password practices.
- Published in:
- Journal of Cybersecurity, 2019, v. 5, n. 1, p. N.PAG, doi. 10.1093/cybsec/tyz015
- By:
- Publication type:
- Article
The cyber-resilience of financial institutions: significance and applicability.
- Published in:
- Journal of Cybersecurity, 2019, v. 5, n. 1, p. N.PAG, doi. 10.1093/cybsec/tyz013
- By:
- Publication type:
- Article
Past behavior and future judgements: seizing and freezing in response to cyber operations.
- Published in:
- Journal of Cybersecurity, 2019, v. 5, n. 1, p. N.PAG, doi. 10.1093/cybsec/tyz012
- By:
- Publication type:
- Article
The implications of persistent (and permanent) engagement in cyberspace.
- Published in:
- Journal of Cybersecurity, 2019, v. 5, n. 1, p. N.PAG, doi. 10.1093/cybsec/tyz008
- By:
- Publication type:
- Article
The end of the road for the UN GGE process: The future regulation of cyberspace.
- Published in:
- Journal of Cybersecurity, 2019, v. 5, n. 1, p. N.PAG, doi. 10.1093/cybsec/tyy009
- By:
- Publication type:
- Article
Embracing and controlling risk dependency in cyber-insurance policy underwriting.
- Published in:
- Journal of Cybersecurity, 2019, v. 5, n. 1, p. N.PAG, doi. 10.1093/cybsec/tyz010
- By:
- Publication type:
- Article
Escalation firebreaks in the cyber, conventional, and nuclear domains: moving beyond effects-based logics.
- Published in:
- Journal of Cybersecurity, 2019, v. 5, n. 1, p. N.PAG, doi. 10.1093/cybsec/tyz007
- By:
- Publication type:
- Article
To share or not to share: a behavioral perspective on human participation in security information sharing.
- Published in:
- Journal of Cybersecurity, 2019, v. 5, n. 1, p. N.PAG, doi. 10.1093/cybsec/tyz006
- By:
- Publication type:
- Article
Ransomware payments in the Bitcoin ecosystem.
- Published in:
- Journal of Cybersecurity, 2019, v. 5, n. 1, p. N.PAG, doi. 10.1093/cybsec/tyz003
- By:
- Publication type:
- Article
A market for trading software issues.
- Published in:
- Journal of Cybersecurity, 2019, v. 5, n. 1, p. N.PAG, doi. 10.1093/cybsec/tyz011
- By:
- Publication type:
- Article
Content analysis of cyber insurance policies: how do carriers price cyber risk?
- Published in:
- Journal of Cybersecurity, 2019, v. 5, n. 1, p. N.PAG, doi. 10.1093/cybsec/tyz002
- By:
- Publication type:
- Article
Cryptocurrencies and fundamental rights.
- Published in:
- Journal of Cybersecurity, 2019, v. 5, n. 1, p. N.PAG, doi. 10.1093/cybsec/tyz004
- By:
- Publication type:
- Article