“Passwords protect my stuff”—a study of children’s password practices
(Login to Download)
A market for trading software issues
(Login to Download)
Content analysis of cyber insurance policies: how do carriers price cyber risk?
(Login to Download)
Cryptocurrencies and fundamental rights
(Login to Download)
Cybersecurity education in a developing nation: the Ecuadorian environment
(Login to Download)
Escalation firebreaks in the cyber, conventional, and nuclear domains: moving beyond effects-based logics
(Login to Download)
On providing systematized access to consolidated principles, guidelines and patterns for usable security research and development
(Login to Download)
Past behavior and future judgements: seizing and freezing in response to cyber operations
(Login to Download)
Ransomware payments in the Bitcoin ecosystem
(Login to Download)
The cyber-resilience of financial institutions: significance and applicability
(Login to Download)
The end of the road for the UN GGE process: The future regulation of cyberspace
(Login to Download)
The implications of persistent (and permanent) engagement in cyberspace
(Login to Download)
To pay or not: game theoretic models of ransomware
(Login to Download)
To share or not to share: a behavioral perspective on human participation in security information sharing
(Login to Download)
What security features and crime prevention advice is communicated in consumer IoT device manuals and support pages?
(Login to Download)