Data presentation in security operations centres: exploring the potential for sonification to enhance existing practice
(Login to Download)
Developing a measure of information seeking about phishing
(Login to Download)
Integrating cost–benefit analysis into the NIST Cybersecurity Framework via the Gordon–Loeb Model
(Login to Download)
Privacy threats in intimate relationships
(Login to Download)
SMART: security model adversarial risk-based tool for systems security design evaluation
(Login to Download)
Update now or later? Effects of experience, cost, and risk preference on update decisions
(Login to Download)