default search action
Journal of Cybersecurity, Volume 3
Volume 3, Number 1, 2017
- Herbert Lin, Amy Zegart:
Introduction to the special issue on strategic dimensions of offensive cyber operations. 1-5
- Henry Farrell, Charles L. Glaser:
The role of effects, saliencies and norms in US Cyberwar doctrine. 7-17 - Austin Long:
A cyber SIOP? Operational considerations for strategic offensive cyber planning. 19-28 - Martin Libicki:
Second acts in cyberspace. 29-35 - Erik Gartzke, Jon R. Lindsay:
Thermonuclear cyberwar. 37-48 - Michael L. Gross, Daphna Canetti, Dana Randall:
Cyberterrorism: its effects on psychological well-being, public confidence and political attitudes. 49-58 - Steven M. Bellovin, Susan Landau, Herbert S. Lin:
Limiting the undesired impact of cyber weapons: technical requirements and policy implications. 59-68 - C. Robert Kehler, Herbert Lin, Michael Sulmeyer:
Rules of engagement for cyberspace operations: a view from the USA. JCyberSecur(2017)3(1)
Volume 3, Number 2, June 2017
Research Articles
- Thomas Maillart, Mingyi Zhao, Jens Grossklags, John Chuang:
Given enough eyeballs, all bugs are shallow? Revisiting Eric Raymond with bug bounty programs. 81-90 - Sébastien Gay:
Strategic news bundling and privacy breach disclosures. 91-108 - Ingolf Becker, Alice Hutchings, Ruba Abu-Salma, Ross J. Anderson, Nicholas Bohm, Steven J. Murdoch, M. Angela Sasse, Gianluca Stringhini:
International comparison of bank fraud reimbursement: customer perceptions and contractual terms. 109-125 - Malte Möser, Rainer Böhme:
The price of anonymity: empirical evidence from a market for Bitcoin anonymization. 127-135 - Amir Feder, Neil Gandal, J. T. Hamrick, Tyler Moore:
The impact of DDoS and other security shocks on Bitcoin currency exchanges: evidence from Mt. Gox. 137-144
Volume 3, Number 3, November 2017
- Victoria Wang, John V. Tucker:
Surveillance and identity: conceptual framework and formal models. 145-158 - Kenneth D. Nguyen, Heather Rosoff, Richard S. John:
Valuing information security from a phishing attack. 159-171 - Steven Weber:
Coercion in cybersecurity: What public health models reveal. 173-183 - Jonathan M. Spring, Eric Hatleback:
Thinking about intrusion kill chains as mechanisms. 185-197
- Corrigendum to: Introduction to the special issue on strategic dimensions of offensive cyber operations. 199
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.