Issue navigation
Volume 6, Issue 1, 2020
Has the GDPR hype affected users’ reaction to cookie disclaimers?
Oksana Kulyk and others
Journal of Cybersecurity, Volume 6, Issue 1, 2020, tyaa022, https://doi.org/10.1093/cybsec/tyaa022
Malware and market share: a comment on Arce
Marc Jegers and Leo Van Hove
Journal of Cybersecurity, Volume 6, Issue 1, 2020, tyaa024, https://doi.org/10.1093/cybsec/tyaa024
An empirical study of ransomware attacks on organizations: an assessment of severity and salient factors affecting vulnerability
Lena Yuryna Connolly and others
Journal of Cybersecurity, Volume 6, Issue 1, 2020, tyaa023, https://doi.org/10.1093/cybsec/tyaa023
Research Paper
Exploring user perceptions of deletion in mobile instant messaging applications
Theodor Schnitzler and others
Journal of Cybersecurity, Volume 6, Issue 1, 2020, tyz016, https://doi.org/10.1093/cybsec/tyz016
Developing a measure of information seeking about phishing
Emma J Williams and Adam N Joinson
Journal of Cybersecurity, Volume 6, Issue 1, 2020, tyaa001, https://doi.org/10.1093/cybsec/tyaa001
SMART: security model adversarial risk-based tool for systems security design evaluation
Paul A Wortman and John A Chandy
Journal of Cybersecurity, Volume 6, Issue 1, 2020, tyaa003, https://doi.org/10.1093/cybsec/tyaa003
Data presentation in security operations centres: exploring the potential for sonification to enhance existing practice
Louise Axon and others
Journal of Cybersecurity, Volume 6, Issue 1, 2020, tyaa004, https://doi.org/10.1093/cybsec/tyaa004
Update now or later? Effects of experience, cost, and risk preference on update decisions
Prashanth Rajivan and others
Journal of Cybersecurity, Volume 6, Issue 1, 2020, tyaa002, https://doi.org/10.1093/cybsec/tyaa002
Integrating cost–benefit analysis into the NIST Cybersecurity Framework via the Gordon–Loeb Model
Lawrence A Gordon and others
Journal of Cybersecurity, Volume 6, Issue 1, 2020, tyaa005, https://doi.org/10.1093/cybsec/tyaa005
Privacy threats in intimate relationships
Karen Levy and Bruce Schneier
Journal of Cybersecurity, Volume 6, Issue 1, 2020, tyaa006, https://doi.org/10.1093/cybsec/tyaa006
Challenging software developers: dialectic as a foundation for security assurance techniques
Charles Weir and others
Journal of Cybersecurity, Volume 6, Issue 1, 2020, tyaa007, https://doi.org/10.1093/cybsec/tyaa007
Categorizing human phishing difficulty: a Phish Scale
Michelle Steves and others
Journal of Cybersecurity, Volume 6, Issue 1, 2020, tyaa009, https://doi.org/10.1093/cybsec/tyaa009
Public attribution of cyber intrusions
Florian J Egloff
Journal of Cybersecurity, Volume 6, Issue 1, 2020, tyaa012, https://doi.org/10.1093/cybsec/tyaa012
Cyber conflict or democracy “hacked”? How cyber operations enhance information warfare
Christopher Whyte
Journal of Cybersecurity, Volume 6, Issue 1, 2020, tyaa013, https://doi.org/10.1093/cybsec/tyaa013
Improving vulnerability remediation through better exploit prediction
Jay Jacobs and others
Journal of Cybersecurity, Volume 6, Issue 1, 2020, tyaa015, https://doi.org/10.1093/cybsec/tyaa015
Predicting smartphone location-sharing decisions through self-reflection on past privacy behavior
Pamela Wisniewski and others
Journal of Cybersecurity, Volume 6, Issue 1, 2020, tyaa014, https://doi.org/10.1093/cybsec/tyaa014
Exploring the security narrative in the work context
Karoline Busse and others
Journal of Cybersecurity, Volume 6, Issue 1, 2020, tyaa011, https://doi.org/10.1093/cybsec/tyaa011
Deploying authentication in the wild: towards greater ecological validity in security usability studies
Seb Aebischer and others
Journal of Cybersecurity, Volume 6, Issue 1, 2020, tyaa010, https://doi.org/10.1093/cybsec/tyaa010
An analysis of perceptions and support for Windows 10 Home Edition update features
Jason Morris and others
Journal of Cybersecurity, Volume 6, Issue 1, 2020, tyaa017, https://doi.org/10.1093/cybsec/tyaa017
Efficient distributed network covert channels for Internet of things environments
Krzysztof Cabaj and others
Journal of Cybersecurity, Volume 6, Issue 1, 2020, tyaa018, https://doi.org/10.1093/cybsec/tyaa018
What (if any) behaviour change techniques do government-led cybersecurity awareness campaigns use?
Tommy van Steen and others
Journal of Cybersecurity, Volume 6, Issue 1, 2020, tyaa019, https://doi.org/10.1093/cybsec/tyaa019
Low-cost fitness and activity trackers for biometric authentication
Saad Khan and others
Journal of Cybersecurity, Volume 6, Issue 1, 2020, tyaa021, https://doi.org/10.1093/cybsec/tyaa021
Decomposition and sequential-AND analysis of known cyber-attacks on critical infrastructure control systems
Peter Maynard and others
Journal of Cybersecurity, Volume 6, Issue 1, 2020, tyaa020, https://doi.org/10.1093/cybsec/tyaa020
Erratum
Erratum to: A market for trading software issues
Journal of Cybersecurity, Volume 6, Issue 1, 2020, tyaa016, https://doi.org/10.1093/cybsec/tyaa016
Advertisement
Advertisement