default search action
Journal of Cybersecurity, Volume 2
Volume 2, Number 1, 2016
- Tyler Moore, David J. Pym, Michel van Eeten:
Introduction. 1-2
- Benjamin Edwards, Steven A. Hofmeyr, Stephanie Forrest:
Hype and heavy tails: A closer look at data breaches. 3-14 - Armin Sarabi, Parinaz Naghizadeh, Yang Liu, Mingyan Liu:
Risky business: Fine-grained data breach prediction using business profiles. 15-28 - Stefan Laube, Rainer Böhme:
The economics of mandatory security breach reporting to authorities. 29-41 - Chad Heitzenrater, Andrew C. Simpson:
Policy, statistics and questions: Reflections on UK cyber security disclosures. 43-56 - Konstantinos Mersinas, Bjoern Hartig, Keith M. Martin, Andrew Seltzer:
Are information security professionals expected value maximizers?: An experiment and survey-based test. 57-70 - Peter Snyder, Chris Kanich:
Characterizing fraud and its ramifications in affiliate marketing networks. 71-81 - Orçun Çetin, Mohammad Hanif Jhaveri, Carlos Gañán, Michel van Eeten, Tyler Moore:
Understanding the role of sender reputation in abuse reporting and cleanup. 83-98 - Shu He, Gene Moo Lee, Sukjin Han, Andrew B. Whinston:
How would information disclosure influence organizations' outbound spam volume? Evidence from a field experiment. 99-118
Volume 2, Number 2, 2016
- Tyler Moore, David J. Pym:
Editorial. 119-120
- Sasha Romanosky:
Examining the costs and causes of cyber incidents. 121-135 - Thomas J. Holt, Olga Smirnova, Alice Hutchings:
Examining signals of trust in criminal markets online. 137-145 - Hanan Hibshi, Travis D. Breaux, Maria Riaz, Laurie A. Williams:
A grounded analysis of experts' decision-making during security assessments. 147-163
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.