The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers |
Activities |
Consumption |
2020 |
Internet security: firewalls and beyond |
Problems, Technical Solutions |
Industry, Population |
2020 |
Cybersecurity and US Legislative Efforts to address Cybercrime |
Social Solutions |
Governance |
2020 |
The Meaning of the Cyber Revolution Perils to Theory and Statecraft |
Activities, Technical Solutions |
Governance |
2013 |
Limiting the undesired impact of cyber weapons: technical requirements and policy implications |
Social Solutions, International Responses |
Governance |
2017 |
Policy measures and cyber insurance: a framework |
Social Solutions |
Governance |
2017 |
Mapping the Cyber Policy Landscape: Indonesia |
Social Solutions |
Governance |
2016 |
Visual structures for seeing cyber policy strategies |
Social Solutions |
Governance |
2015 |
The EU as a Coherent (Cyber)Security Actor? |
Activities, International Responses |
Governance |
2017 |
Implementation of a Cyber Security Policy in South Africa: Reflection on Progress and the Way Forward |
Activities, Technical Solutions |
Governance |
2012 |
National Cyber Security Policy and Strategy of Nigeria: A Qualitative Analysis |
Activities |
Governance |
2015 |
Cyber Security – Threat Scenarios, Policy Framework and Cyber Wargames |
Technical Solutions |
Governance |
2014 |
Mind This Gap: Criminal Hacking and the Global Cybersecurity Skills Shortage, a Critical Analysis |
Technical Solutions |
Governance |
2016 |
Computer Security in the Real World |
Technical Solutions |
Governance |
2001 |
SMART: security model adversarial risk-based tool for systems security design evaluation |
Technical Solutions |
Governance |
2020 |
Timing of cyber conflict |
Social Solutions, International Responses |
Governance |
2013 |
Examining the costs and causes of cyber incidents |
Social Solutions |
Governance, Trade |
2016 |
Reflections on The Fog of (Cyber) War |
Social Solutions |
Governance |
2018 |
On the Use of Offensive Cyber Capabilities A Policy Analysis on Offensive US Cyber Policy |
Social Solutions |
Governance |
2012 |
Predicting individuals’ vulnerability to social engineering in social networks |
Activities, Technical Solutions, Social Solutions |
Population |
2020 |
Update now or later? Effects of experience, cost, and risk preference on update decisions |
Activities, Technical Solutions, Social Solutions |
Governance, Industry, Population |
2020 |
Forgetting personal data and revoking consent under the GDPR: Challenges and proposed solutions |
International Responses |
Governance |
2020 |
Cryptocurrencies and Fundamental Rights |
Social Solutions |
Trade |
2020 |
Social engineering in cybersecurity: The evolution of a concept |
Social Solutions |
Governance |
2018 |
Developing a measure of information seeking about phishing |
Technical Solutions |
Population |
2020 |
Staying Ahead of the Race – Quantum Computing and Cybersecurity |
Technical Solutions |
Consumption |
2020 |
The cyber-resilience of financial institutions: significance and applicability |
Social Solutions |
Trade |
2019 |
Inkemia |
Technical Solutions |
Industry |
2017 |
VALOPES |
Problems |
Water |
2017 |
The new oil. A practical approach to the physics, economics and engineering which enabled our rise and are now shaping the battle to escape our demise. |
Problems |
Energy |
2019 |
Development of a Tool for Culinary Management |
Problems |
Consumption |
2019 |
France’s New Offensive Cyber Doctrine |
Activities, Social Solutions, International Responses |
Conflicts, Governance, Industry |
2019 |
Public-Private Partnerships for Critical Infrastructure Protection |
Social Solutions |
Governance, Industry |
2013 |
A public policy perspective of the Dark Web |
Social Solutions, International Responses |
Industry |
2016 |
Power/Freedom on the dark web: A digital ethnography of the Dark Web Social Network |
Social Solutions |
Industry |
2014 |
The Danger From Within |
Social Solutions |
Industry |
2019 |
Creating a Culture of Enterprise Cybersecurity |
Social Solutions |
Industry |
2019 |
Senators push to ditch Social Security numbers in light of Equifax hack |
Technical Solutions |
Industry |
2017 |
Inside the ‘Stalkerware’ Surveillance Market, Where Ordinary People Tap Each Other’s Phones |
Technical Solutions |
Industry |
2017 |
How Chinese Spies Got the N.S.A’s Hacking Tools, and Used Them for Attacks |
Technical Solutions |
Industry |
2019 |
Russia’s Approach to Cyber Warfare |
Social Solutions |
Industry |
2019 |
The Untold Story of NotPetya, the Most Devastating Cyberattack in History |
Social Solutions |
Industry |
2018 |
Three Chinese Digital Economy Policies at Stake in the U.S.–China Talks |
Social Solutions |
Industry |
2019 |
The Web of Profit: A look at the cybercrime economy |
Problems, Social Solutions |
Industry |
2019 |
The year ahead in cybersecurity law |
Problems, Social Solutions, International Responses |
Industry |
2019 |
How Cybercriminals Change Tactics During Their Cyber Attacks |
Activities, Technical Solutions |
Industry |
2019 |
On the Effectiveness of Machine and Deep Learning for Cyber Security |
Technical Solutions |
Industry |
2019 |
How far should organizations be able to go to defend against cyberattacks? |
Activities, Technical Solutions |
Industry |
2019 |
China, Russia Biggest Cyber Offenders |
International Responses |
Industry |
2019 |
Why Cybersecurity Is About More Than Prevention-Focused Products |
Technical Solutions |
Governance |
2018 |