Works matching IS 20572093 AND DT 2024 AND VI 10 AND IP 1
Results: 28
Enhancing cyber insurance strategies: exploring reinsurance and alternative risk transfer approaches.
- Published in:
- Journal of Cybersecurity, 2024, v. 10, n. 1, p. 1, doi. 10.1093/cybsec/tyae027
- By:
- Publication type:
- Article
Cyberbullying on Social Media: Definitions, Prevalence, and Impact Challenges.
- Published in:
- Journal of Cybersecurity, 2024, v. 10, n. 1, p. 1, doi. 10.1093/cybsec/tyae026
- By:
- Publication type:
- Article
Navigating the landscape of security modelling: the MORS grid.
- Published in:
- Journal of Cybersecurity, 2024, v. 10, n. 1, p. 1, doi. 10.1093/cybsec/tyae024
- By:
- Publication type:
- Article
A path forward: improving Internet routing security by enabling zones of trust.
- Published in:
- Journal of Cybersecurity, 2024, v. 10, n. 1, p. 1, doi. 10.1093/cybsec/tyae023
- By:
- Publication type:
- Article
Into the unknown: the need to reframe risk analysis.
- Published in:
- Journal of Cybersecurity, 2024, v. 10, n. 1, p. 1, doi. 10.1093/cybsec/tyae022
- By:
- Publication type:
- Article
The unpredictability of phishing susceptibility: results from a repeated measures experiment.
- Published in:
- Journal of Cybersecurity, 2024, v. 10, n. 1, p. 1, doi. 10.1093/cybsec/tyae021
- By:
- Publication type:
- Article
Using Situational Crime Prevention (SCP)-C<sup>3</sup> cycle and common inventory of cybersecurity controls from ISO/IEC 27002:2022 to prevent cybercrimes.
- Published in:
- Journal of Cybersecurity, 2024, v. 10, n. 1, p. 1, doi. 10.1093/cybsec/tyae020
- By:
- Publication type:
- Article
Economics and optimal investment policies of Attackers and Defenders in cybersecurity.
- Published in:
- Journal of Cybersecurity, 2024, v. 10, n. 1, p. 1, doi. 10.1093/cybsec/tyae019
- By:
- Publication type:
- Article
Toward effective learning of cybersecurity: new curriculum agenda and learning methods.
- Published in:
- Journal of Cybersecurity, 2024, v. 10, n. 1, p. 1, doi. 10.1093/cybsec/tyae018
- By:
- Publication type:
- Article
GDPR and the indefinable effectiveness of privacy regulators: Can performance assessment be improved?
- Published in:
- Journal of Cybersecurity, 2024, v. 10, n. 1, p. 1, doi. 10.1093/cybsec/tyae017
- By:
- Publication type:
- Article
A novel visual interface enables human detection of malware in portable document format.
- Published in:
- Journal of Cybersecurity, 2024, v. 10, n. 1, p. 1, doi. 10.1093/cybsec/tyae016
- By:
- Publication type:
- Article
A risk estimation study of native code vulnerabilities in Android applications.
- Published in:
- Journal of Cybersecurity, 2024, v. 10, n. 1, p. 1, doi. 10.1093/cybsec/tyae015
- By:
- Publication type:
- Article
Narrow windows of opportunity: the limited utility of cyber operations in war.
- Published in:
- Journal of Cybersecurity, 2024, v. 10, n. 1, p. 1, doi. 10.1093/cybsec/tyae014
- By:
- Publication type:
- Article
'There was a bit of PTSD every time I walked through the office door': Ransomware harms and the factors that influence the victim organization's experience.
- Published in:
- Journal of Cybersecurity, 2024, v. 10, n. 1, p. 1, doi. 10.1093/cybsec/tyae013
- By:
- Publication type:
- Article
The health belief model and phishing: determinants of preventative security behaviors.
- Published in:
- Journal of Cybersecurity, 2024, v. 10, n. 1, p. 1, doi. 10.1093/cybsec/tyae012
- By:
- Publication type:
- Article
It is not only about having good attitudes: factor exploration of the attitudes toward security recommendations.
- Published in:
- Journal of Cybersecurity, 2024, v. 10, n. 1, p. 1, doi. 10.1093/cybsec/tyae011
- By:
- Publication type:
- Article
Who will take the bait? Using an embedded, experimental study to chart organization-specific phishing risk profiles and the effect of a voluntary microlearning among employees of a Dutch municipality.
- Published in:
- Journal of Cybersecurity, 2024, v. 10, n. 1, p. 1, doi. 10.1093/cybsec/tyae010
- By:
- Publication type:
- Article
Interdependent security games in the Stackelberg style: how first-mover advantage impacts free riding and security (under-)investment.
- Published in:
- Journal of Cybersecurity, 2024, v. 10, n. 1, p. 1, doi. 10.1093/cybsec/tyae009
- By:
- Publication type:
- Article
CipherTrace: automatic detection of ciphers from execution traces to neutralize ransomware.
- Published in:
- Journal of Cybersecurity, 2024, v. 10, n. 1, p. 1, doi. 10.1093/cybsec/tyae008
- By:
- Publication type:
- Article
'The trivial tickets build the trust': a co-design approach to understanding security support interactions in a large university.
- Published in:
- Journal of Cybersecurity, 2024, v. 10, n. 1, p. 1, doi. 10.1093/cybsec/tyae007
- By:
- Publication type:
- Article
The simple economics of an external shock to a bug bounty platform.
- Published in:
- Journal of Cybersecurity, 2024, v. 10, n. 1, p. 1, doi. 10.1093/cybsec/tyae006
- By:
- Publication type:
- Article
The cybersecurity of fairy tales.
- Published in:
- Journal of Cybersecurity, 2024, v. 10, n. 1, p. 1, doi. 10.1093/cybsec/tyae005
- By:
- Publication type:
- Article
DoWNet—classification of Denial-of-Wallet attacks on serverless application traffic.
- Published in:
- Journal of Cybersecurity, 2024, v. 10, n. 1, p. 1, doi. 10.1093/cybsec/tyae004
- By:
- Publication type:
- Article
The barriers to sustainable risk transfer in the cyber-insurance market.
- Published in:
- Journal of Cybersecurity, 2024, v. 10, n. 1, p. 1, doi. 10.1093/cybsec/tyae003
- By:
- Publication type:
- Article
Behind the curve: technology challenges facing the homeland intelligence and counterterrorism workforce.
- Published in:
- Journal of Cybersecurity, 2024, v. 10, n. 1, p. 1, doi. 10.1093/cybsec/tyae002
- By:
- Publication type:
- Article
Cybersecurity when working from home during COVID-19: considering the human factors.
- Published in:
- Journal of Cybersecurity, 2024, v. 10, n. 1, p. 1, doi. 10.1093/cybsec/tyae001
- By:
- Publication type:
- Article
A systematic literature review on advanced persistent threat behaviors and its detection strategy.
- Published in:
- Journal of Cybersecurity, 2024, v. 10, n. 1, p. 1, doi. 10.1093/cybsec/tyad023
- By:
- Publication type:
- Article
Bugs in our pockets: the risks of client-side scanning.
- Published in:
- Journal of Cybersecurity, 2024, v. 10, n. 1, p. 1, doi. 10.1093/cybsec/tyad020
- By:
- Publication type:
- Article