A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate
(Login to Download)
Cybersecurity incident response capabilities in the Ecuadorian financial sector
(Login to Download)
Determining an optimal threshold on the online reserves of a bitcoin exchange
(Login to Download)
Forgetting personal data and revoking consent under the GDPR: Challenges and proposed solutions
(Login to Download)
Malware and market share
(Login to Download)
Malware in the future? Forecasting of analyst detection of cyber events
(Login to Download)
Patchwork of confusion: the cybersecurity coordination problem
(Login to Download)
The costs of consumer-facing cybercrime: an empirical exploration of measurement issues and estimates
(Login to Download)
Threat intelligence sharing between cybersecurity vendors: Network, dyadic, and agent views
(Login to Download)