default search action
Journal of Cybersecurity, Volume 6
Volume 6, Number 1, 2020
- Theodor Schnitzler, Christine Utz, Florian Farke, Christina Pöpper, Markus Dürmuth:
Exploring user perceptions of deletion in mobile instant messaging applications. tyz016 - Emma J. Williams, Adam N. Joinson:
Developing a measure of information seeking about phishing. tyaa001 - Paul A. Wortman, John A. Chandy:
SMART: security model adversarial risk-based tool for systems security design evaluation. tyaa003 - Louise Axon, Bushra A. AlAhmadi, Jason R. C. Nurse, Michael Goldsmith, Sadie Creese:
Data presentation in security operations centres: exploring the potential for sonification to enhance existing practice. tyaa004 - Prashanth Rajivan, Efrat Aharonov-Majar, Cleotilde Gonzalez:
Update now or later? Effects of experience, cost, and risk preference on update decisions. tyaa002 - Lawrence A. Gordon, Martin P. Loeb, Lei Zhou:
Integrating cost-benefit analysis into the NIST Cybersecurity Framework via the Gordon-Loeb Model. tyaa005 - Karen Levy, Bruce Schneier:
Privacy threats in intimate relationships. tyaa006 - Michelle Steves, Kristen K. Greene, Mary Theofanos:
Categorizing human phishing difficulty: a Phish Scale. - Charles Weir, Awais Rashid, James Noble:
Challenging software developers: dialectic as a foundation for security assurance techniques. - Florian J. Egloff:
Public attribution of cyber intrusions. - Christopher Whyte:
Cyber conflict or democracy "hacked"? How cyber operations enhance information warfare. - Pamela J. Wisniewski, Muhammad Irtaza Safi, Sameer Patil, Xinru Page:
Predicting smartphone location-sharing decisions through self-reflection on past privacy behavior. - Jay Jacobs, Sasha Romanosky, Idris Adjerid, Wade Baker:
Improving vulnerability remediation through better exploit prediction. - Erratum to: A market for trading software issues.
- Karoline Busse, Jennifer Seifert, Matthew Smith:
Exploring the security narrative in the work context. - Seb Aebischer, Claudio Dettoni, Graeme Jenkinson, Kat Krol, David Llewellyn-Jones, Toshiyuki Masui, Frank Stajano:
Deploying authentication in the wild: towards greater ecological validity in security usability studies. - Tommy van Steen, Emma Norris, Kirsty Atha, Adam N. Joinson:
What (if any) behaviour change techniques do government-led cybersecurity awareness campaigns use? - Jason Morris, Ingolf Becker, Simon Parkin:
An analysis of perceptions and support for Windows 10 Home Edition update features. - Krzysztof Cabaj, Piotr Zórawski, Piotr Nowakowski, Maciej Purski, Wojciech Mazurczyk:
Efficient distributed network covert channels for Internet of things environments†. - Saad Khan, Simon Parkinson, Na Liu, Liam Grant:
Low-cost fitness and activity trackers for biometric authentication. - Peter Maynard, Kieran McLaughlin, Sakir Sezer:
Decomposition and sequential-AND analysis of known cyber-attacks on critical infrastructure control systems. - Oksana Kulyk, Nina Gerber, Annika Hilt, Melanie Volkamer:
Has the GDPR hype affected users' reaction to cookie disclaimers? - Marc Jegers, Leo Van Hove:
Malware and market share: a comment on Arce. - Lena Yuryna Connolly, David S. Wall, Michael Lang, Bruce Oddson:
An empirical study of ransomware attacks on organizations: an assessment of severity and salient factors affecting vulnerability.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.