Contact information of Henry Stewart Publications
Corrections
All material on this site has been provided by the respective publishers and authors. You can help
correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:aza:csj000. See general information about how to correct material in RePEc.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Henry Stewart Talks (email available below). General contact details of provider: .
Content
June 2019, Volume 2, Issue 4
December 2018, Volume 2, Issue 3
- 200-201 Editorial
by Beckett, Simon
- 202-210 Framing cyber security as a business risk
by Wheeler, Evan
- 211-218 Insider threat detection: Where and how data science applies
by Lin, Derek
- 219-227 DevOps security improvements through effective use of container technology
by Goldschmidt, Murray
- 228-237 How can we effectively regulate grid security?
by Alrich, Tom
- 238-250 Strategic trends in the global cyber conflict
by Baram, Gil & Cohen, Daniel & Shapira, Zeev & Wechsler, Omree & Hight, Nir & Ben-Israel, Isaac
- 251-261 SOC 2030: Security Operations centres are broken, let’s fix them
by Matre, Kerry
- 262-269 Preventing cryptocurrency theft: Learning from the past to secure the future
by Kater, Amos & Jamieson, Andrew
- 270-285 Risk perceptions of electronic health records
by Le, Patricia & Tsiang, Michael & Hekmatjah, Natan & Katona, Peter
September 2018, Volume 2, Issue 2
- 104-105 Editorial
by Beckett, Simon
- 106-113 The cyberthreat facing the financial services industry
by Antonacci, Pat
- 114-121 Best practices in creating a vulnerability assessment programme: Measure twice and cut once, avoiding costly mistakes
by Cowen, Christopher
- 122-130 Emerging trends in insurance coverage: Massive encryption attacks create urgent need for business interruption and cyber coverage
by Hoar, Sean & Marchel, Peter M.
- 131-142 Risky travel: The missing piece for holistic cyber security risk management
by Cissé, Moh
- 143-148 The impact of GDPR on WHOIS: Implications for businesses facing cybercrime
by Ferrante, Anthony J.
- 149-162 One way to better cyber resilience in the financial sector: The Danish approach
by Thomsen, René & Kaas-Jacobsen, Gustav
- 163-172 Small and medium enterprises: Analysing the cyber challenge
by Riglietti, Gianluca & Alcantara, Patrick & Aguada, Lucila
- 173-180 Staying one step ahead of the GDPR: Embed privacy and security by design
by Cavoukian, Ann
- 181-192 Measurement of organisational variables associated with cyber security preparedness in Turkey
by Can, S. Hakan & Ikitemur, Gokhan & Hendy, Helen M.
June 2018, Volume 2, Issue 1
- 4-5 Editorial
by Butlin, Bonnie
- 6-16 Banking phishing: The case of Brazil
by Brasil, Beatriz Silveira & Campelo, Karina Correia Figueiredo
- 17-22 From panic to pragmatism: De-escalating and managing commercial data breaches
by Thomas, Liisa & Thomson, Amber C.
- 23-30 GDPR and employee data protection: Cyber security data example
by Watson, Deborah & Millerick, Ryan
- 31-37 Reflections on CIO research: The essential qualities sought after when hiring today’s cyber security leaders
by Pales, Claire
- 38-50 #SafeCard: Ukraine’s answer to cyberthreats targeting cardholders
by Danylchenko, Olesya
- 51-65 An effective approach to addressing human security vulnerability in an organisation
by Sedova, Masha
- 66-72 Staying safe in an increasingly interconnected world: IOT and Cybersecurity
by Payton, Theresa
- 73-82 PCI DSS and card brands: Standards, compliance and enforcement
by Wilson, Donna & Roman, Ethan & Beierly, Ingrid
- 83-89 Purchasing and understanding cyber insurance coverage
by Selby, Judy
- 90-97 ‘Reasonable security’: A moving target
by Mcginn, Elizabeth E. & Shreve, James & Tank, Margo H. K.
March 2018, Volume 1, Issue 4
- 292-293 Editorial
by Beckett, Simon
- 294-300 Should cyber security be included in compliance training?
by Chmiel, Piotr
- 301-315 Data breach litigation and regulatory enforcement: A survey of our present and how to prepare for the future
by Dayanim, Behnam & George, Edward
- 316-325 Identity crisis: Detecting account opening fraud in the age of identity commoditisation
by Rivner, Uri
- 326-330 The human factor in cyber security
by Sotira, Nicola
- 331-342 Normative restraints on cyber conflict
by Nye, Joseph S.
- 343-350 Effective foundational security principles
by Kron, Erich
- 351-360 Human aspects of cyber security: Behaviour or culture change?
by Joinson, Adam & Steen, Tommy Van
- 361-367 Chief Information Security Officer best practices for 2018: Proactive cyber security
by Rosiek, Travis
- 368-376 Cyberattacks survival guide
by Naveh, Gadi
December 2017, Volume 1, Issue 3
- 197-198 Editorial
by Carpenter, Mike
- 199-206 Memory protection challenges: Attacks on memory encryption
by Branco, Rodrigo Rubira & Gueron, Shay
- 207-217 The NIST Risk Management Framework: Problems and recommendations
by Maclean, Don
- 218-226 Strategic decision making in cyber security: Lessons learned
by Habermayer, Helmut
- 227-240 Cyber defence capability development for common security and defence policy of the European Union: A critical look back and ahead
by Röhrig, Wolfgang
- 241-250 Successfully tackling cybercrime at the local level
by Haslam, Andy
- 251-258 Cyber insurance comes of age
by Tungatt, Gareth
- 259-272 Protocol analysis and vulnerabilities of Cisco’s autonomic network
by Eissa, Omar
- 273-284 ‘Imagine if …’: The power of storytelling in building business resilience
by Wilding, Nick
September 2017, Volume 1, Issue 2
- 100-101 Editorial
by Beckett, Simon
- 102-115 Cyber incidents: How best to work with law enforcement
by Laufman, David H. & Newell, Sean & Reynolds, Stephen & Buchwald, Mike
- 116-126 Is your information security ecosystem consuming poisonous information and putting your enterprise at risk?
by Mackay, Gordon
- 127-133 How machine learning is catching up with the insider threat
by Graves, Jamie
- 134-146 Cyber resilience: Leadership matters
by Armour, Cathie
- 147-155 Protecting the crown jewels of the government through infrastructure resilience and the DHS Continuous Diagnostics and Mitigation programme
by Cox, Kevin & Kneidinger, Mark
- 156-164 Cyber security talks: A content analysis of online discussions on ransomware
by Riglietti, Gianluca
- 165-174 NATO: Stepping up its game in cyber defence
by Shea, Jamie
- 175-186 Node.js Security
by Verbitskiy, Ilya
June 2017, Volume 1, Issue 1
- 4-5 Editorial
by Unknown
- 6-15 A security evolution driven by the Internet of Intelligent Things
by Williamson, Steve P.
- 16-27 Changing the rules of the game: How can law enforcement deter criminals by increasing the risks of conducting cybercrime?
by Amann, Philipp & Klayn, Aglika & Mounier, Grégory
- 28-43 Consider the consequences: A powerful approach for reducing ICS cyber risk
by Wyman, Richard
- 44-47 The fight within encryption
by Basu, Sammy
- 48-60 Cyber as NATO’s newest operational domain: The pathway to implementation
by Athanasiadis, Christos & Ali, Rizwan
- 61-68 Industry 4.0: Security imperatives for IoT — converging networks, increasing risks
by Bligh-Wall, Shaun
- 69-79 Partner or perish: Research collaboration to secure cyberspace
by Parker, Gareth & Zelinsky, Alex
- 80-91 Multi-vector threats and the argument for greater convergence
by Chandler, Ron & Hambly, Brent & Holcomb, Jason & Ressopoulos, George & Wharton, Matthew
- 92-94 Cyber risk valuation: Show me the money
by Sapp, John B.