Contact information of Henry Stewart Publications
Corrections
All material on this site has been provided by the respective publishers and authors. You can help
correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:aza:csj000. See general information about how to correct material in RePEc.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Henry Stewart Talks (email available below). General contact details of provider: .
Content
June 2018, Volume 2, Issue 1
- 23-30 GDPR and employee data protection: Cyber security data example
by Watson, Deborah & Millerick, Ryan
- 31-37 Reflections on CIO research: The essential qualities sought after when hiring today’s cyber security leaders
by Pales, Claire
- 38-50 #SafeCard: Ukraine’s answer to cyberthreats targeting cardholders
by Danylchenko, Olesya
- 51-65 An effective approach to addressing human security vulnerability in an organisation
by Sedova, Masha
- 66-72 Staying safe in an increasingly interconnected world: IOT and Cybersecurity
by Payton, Theresa
- 73-82 PCI DSS and card brands: Standards, compliance and enforcement
by Wilson, Donna & Roman, Ethan & Beierly, Ingrid
- 83-89 Purchasing and understanding cyber insurance coverage
by Selby, Judy
- 90-97 ‘Reasonable security’: A moving target
by Mcginn, Elizabeth E. & Shreve, James & Tank, Margo H. K.
March 2018, Volume 1, Issue 4
- 292-293 Editorial
by Beckett, Simon
- 294-300 Should cyber security be included in compliance training?
by Chmiel, Piotr
- 301-315 Data breach litigation and regulatory enforcement: A survey of our present and how to prepare for the future
by Dayanim, Behnam & George, Edward
- 316-325 Identity crisis: Detecting account opening fraud in the age of identity commoditisation
by Rivner, Uri
- 326-330 The human factor in cyber security
by Sotira, Nicola
- 331-342 Normative restraints on cyber conflict
by Nye, Joseph S.
- 343-350 Effective foundational security principles
by Kron, Erich
- 351-360 Human aspects of cyber security: Behaviour or culture change?
by Joinson, Adam & Steen, Tommy Van
- 361-367 Chief Information Security Officer best practices for 2018: Proactive cyber security
by Rosiek, Travis
- 368-376 Cyberattacks survival guide
by Naveh, Gadi
December 2017, Volume 1, Issue 3
- 197-198 Editorial
by Carpenter, Mike
- 199-206 Memory protection challenges: Attacks on memory encryption
by Branco, Rodrigo Rubira & Gueron, Shay
- 207-217 The NIST Risk Management Framework: Problems and recommendations
by Maclean, Don
- 218-226 Strategic decision making in cyber security: Lessons learned
by Habermayer, Helmut
- 227-240 Cyber defence capability development for common security and defence policy of the European Union: A critical look back and ahead
by Röhrig, Wolfgang
- 241-250 Successfully tackling cybercrime at the local level
by Haslam, Andy
- 251-258 Cyber insurance comes of age
by Tungatt, Gareth
- 259-272 Protocol analysis and vulnerabilities of Cisco’s autonomic network
by Eissa, Omar
- 273-284 ‘Imagine if …’: The power of storytelling in building business resilience
by Wilding, Nick
September 2017, Volume 1, Issue 2
- 100-101 Editorial
by Beckett, Simon
- 102-115 Cyber incidents: How best to work with law enforcement
by Laufman, David H. & Newell, Sean & Reynolds, Stephen & Buchwald, Mike
- 116-126 Is your information security ecosystem consuming poisonous information and putting your enterprise at risk?
by Mackay, Gordon
- 127-133 How machine learning is catching up with the insider threat
by Graves, Jamie
- 134-146 Cyber resilience: Leadership matters
by Armour, Cathie
- 147-155 Protecting the crown jewels of the government through infrastructure resilience and the DHS Continuous Diagnostics and Mitigation programme
by Cox, Kevin & Kneidinger, Mark
- 156-164 Cyber security talks: A content analysis of online discussions on ransomware
by Riglietti, Gianluca
- 165-174 NATO: Stepping up its game in cyber defence
by Shea, Jamie
- 175-186 Node.js Security
by Verbitskiy, Ilya
June 2017, Volume 1, Issue 1
- 4-5 Editorial
by Unknown
- 6-15 A security evolution driven by the Internet of Intelligent Things
by Williamson, Steve P.
- 16-27 Changing the rules of the game: How can law enforcement deter criminals by increasing the risks of conducting cybercrime?
by Amann, Philipp & Klayn, Aglika & Mounier, Grégory
- 28-43 Consider the consequences: A powerful approach for reducing ICS cyber risk
by Wyman, Richard
- 44-47 The fight within encryption
by Basu, Sammy
- 48-60 Cyber as NATO’s newest operational domain: The pathway to implementation
by Athanasiadis, Christos & Ali, Rizwan
- 61-68 Industry 4.0: Security imperatives for IoT — converging networks, increasing risks
by Bligh-Wall, Shaun
- 69-79 Partner or perish: Research collaboration to secure cyberspace
by Parker, Gareth & Zelinsky, Alex
- 80-91 Multi-vector threats and the argument for greater convergence
by Chandler, Ron & Hambly, Brent & Holcomb, Jason & Ressopoulos, George & Wharton, Matthew
- 92-94 Cyber risk valuation: Show me the money
by Sapp, John B.