Second acts in cyberspace
(Login to Download)
The role of effects, saliencies and norms in US Cyberwar doctrine
(Login to Download)
A cyber SIOP- Operational considerations for strategic offensive cyber planning
(Login to Download)
Thermonuclear cyberwar
(Login to Download)
Cyberterrorism- its effects on psychological well-being, public confidence and political well-being, public confidence and political attitudes
(Login to Download)
Limiting the undesired impact of cyber weapons- technical requirements and policy implications
(Login to Download)
Introduction to the special issue on strategic dimensions of offensive cyber operations
(Login to Download)
Rules of engagement for cyberspace operations- a view from the USA
(Login to Download)
The price of anonymity empirical evidence from a market for Bitcoin anonymization
(Login to Download)
Given enough eyeballs, all bugs are shallow- Revisiting Eric Raymond with bug bounty programs
(Login to Download)
Strategic news bundling and privacy breach disclosures
(Login to Download)
International comparison of bank fraud reimbursement- customer perceptions and contractual terms
(Login to Download)
The impact of DDoS and other security shocks on Bitcoin currency exchanges- evidence from Mt. Gox
(Login to Download)
Thinking about intrusion kill chains as mechanisms
(Login to Download)
Coercion in cybersecurity- What public health models reveal
(Login to Download)
Valuing information security from a phishing attack
(Login to Download)
Surveillance and identity conceptual framework and formal models
(Login to Download)