


default search action
Journal of Cybersecurity, Volume 11
Volume 11, Number 1, 2025
- Laura D. Osburn
:
Telling stories about vendors: narrative practices to negotiate risk and establish an organizational cybersecurity culture. - Charles Harry, Ido Sivan-Sevilla
, Mark McDermott:
Measuring the size and severity of the integrated cyber attack surface across US county governments. - Marte Marjorie Søgnen
, Adam Szekeres
, Einar Arthur Snekkenes
:
Implementing information security controls: now or later? Delay discounting of losses and gains. - Catherine Carpentier-Desjardins, Masarah Paquet-Clouston
, Stefan Kitzler
, Bernhard Haslhofer
:
Mapping the DeFi crime landscape: an evidence-based picture. - Junli Jiang
, Pavel Naumov
:
De re/de dicto distinction: a logicians' perspective on data anonymity. - Rachiyta Jain, Temima Hrle, Daniel W. Woods
:
Insurance versus digital harm: a content analysis of home and cyber insurance policies in the USA and UK. - Daniel W. Woods
, Josephine Wolff
:
A history of cyber risk transfer. - Ammar Zafar
:
Reconciling blockchain technology and data protection laws: regulatory challenges, technical solutions, and practical pathways. - Mazaher Kianpour
, Ulrik Franke
:
The use of simulations in economic cybersecurity decision-making. - Hala Assal
, Srivathsan G. Morkonda
, Muhammad Zaid Arif, Sonia Chiasson:
Software security in practice: knowledge and motivation. - Fran Casino
, Darren Hurley-Smith, Julio César Hernández Castro, Constantinos Patsakis:
Not on my watch: ransomware detection through classification of high-entropy file segments. - Sadra Fathenojavan
, Ali Moeini, Hamid Haj Seyyed Javadi
:
A post-quantum lattice-based lightweight anonymous authentication scheme for IoT. - Eman Salem Alashwali
, Joanne C. Peca
, Mandy Lanyon
, Lorrie Faith Cranor
:
Work from home and privacy challenges: what do workers face and what are they doing about it? - Sam Whitt, Vitali Shkliarov, Vera Mironova:
Going public about cyber attacks: public threat sensitivity and support for escalation in the United States and Russia. - Gregor Petric
, John N. Just:
Information security culture and phishing-reporting model: structural equivalence across Germany, UK, and USA. - Dominika Kuznicka-Blaszkowska
, Nadiya Kostyuk:
Emerging need to regulate deepfakes in international law: the Russo-Ukrainian war as an example. - Francesco Casaril, Letterio Galletta:
Space cybersecurity governance: assessing policies and frameworks in view of the future European space legislation.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.