Oxford Index Browse

You are looking at 1-10 of 11 items for:

Science and Mathematics x Computer Security x clear all

Refine by type

Refine by product

 

Critical visualization: a case for rethinking how we visualize risk and security

Peter Hall, Claude Heath and Lizzie Coles-Kemp.

in Journal of Cybersecurity

September 2015; p ublished online December 2015 .

Journal Article. Subjects: IT and Communications Law; Computer Science; Computer Security. 7264 words.

In an era of high-profile hacks, information leaks and cybercrime, cybersecurity is the focus of much corporate and state-funded research. Data visualization is regarded as an important...

Go to Oxford Journals »  full text: open access

From physical security to cybersecurity

Arunesh Sinha, Thanh H. Nguyen, Debarun Kar, Matthew Brown, Milind Tambe and Albert Xin Jiang.

in Journal of Cybersecurity

September 2015; p ublished online November 2015 .

Journal Article. Subjects: IT and Communications Law; Computer Science; Computer Security. 14191 words.

Security is a critical concern around the world. In many domains from cybersecurity to sustainability, limited security resources prevent complete security coverage at all times. Instead,...

Go to Oxford Journals »  full text: open access

Identifying patterns in informal sources of security information

Emilee Rader and Rick Wash.

in Journal of Cybersecurity

September 2015; p ublished online December 2015 .

Journal Article. Subjects: IT and Communications Law; Computer Science; Computer Security. 20810 words.

Computer users have access to computer security information from many different sources, but few people receive explicit computer security training. Despite this lack of formal education,...

Go to Oxford Journals »  full text: open access

Increasing cybersecurity investments in private sector firms

Lawrence A. Gordon, Martin P. Loeb, William Lucyshyn and Lei Zhou.

in Journal of Cybersecurity

September 2015; p ublished online November 2015 .

Journal Article. Subjects: IT and Communications Law; Computer Science; Computer Security. 13628 words.

The primary objective of this article is to develop an economics-based analytical framework for assessing the impact of government incentives/regulations designed to offset the tendency to...

Go to Oxford Journals »  full text: open access

Journal of Cybersecurity

Journal. Subjects: IT and Communications Law; Computer Science; Computer Security.

Go to Oxford Journals »  home page

Keys under doormats: mandating insecurity by requiring government access to all data and communications

Harold Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael A. Specter and Daniel J. Weitzner.

in Journal of Cybersecurity

September 2015; p ublished online November 2015 .

Journal Article. Subjects: IT and Communications Law; Computer Science; Computer Security. 10876 words.

Twenty years ago, law enforcement organizations lobbied to require data and communication services to engineer their products to guarantee law enforcement access to all data. After lengthy...

Go to Oxford Journals »  full text: open access

Neural correlates of gender differences and color in distinguishing security warnings and legitimate websites: a neurosecurity study

Bonnie Brinton Anderson, C. Brock Kirwan, David Eargle, Scott R. Jensen and Anthony Vance.

in Journal of Cybersecurity

September 2015; p ublished online November 2015 .

Journal Article. Subjects: IT and Communications Law; Computer Science; Computer Security. 8564 words.

Users have long been recognized as the weakest link in security. Accordingly, researchers have applied knowledge from the fields of psychology and human–computer interaction to understand...

Go to Oxford Journals »  full text: open access

Optimizing time allocation for network defence

Tristan Caulfield and Andrew Fielder.

in Journal of Cybersecurity

September 2015; p ublished online November 2015 .

Journal Article. Subjects: IT and Communications Law; Computer Science; Computer Security. 11932 words.

The presence of unpatched, exploitable vulnerabilities in software is a prerequisite for many forms of cyberattack. Because of the almost inevitable discovery of a vulnerability and...

Go to Oxford Journals »  full text: open access

Scripting the crime commission process in the illicit online prescription drug trade

Nektarios Leontiadis and Alice Hutchings.

in Journal of Cybersecurity

September 2015; p ublished online November 2015 .

Journal Article. Subjects: IT and Communications Law; Computer Science; Computer Security. 10549 words.

This article considers the processes in the illicit online prescription drug trade, namely search-redirection attacks and the operation of unlicensed pharmacies using crime script analysis....

Go to Oxford Journals »  full text: open access

Tipping the scales: the attribution problem and the feasibility of deterrence against cyberattack

Jon R. Lindsay.

in Journal of Cybersecurity

September 2015; p ublished online November 2015 .

Journal Article. Subjects: IT and Communications Law; Computer Science; Computer Security. 14142 words.

Cyber attackers rely on deception to exploit vulnerabilities and obfuscate their identity, which makes many pessimistic about cyber deterrence. The attribution problem appears to make...

Go to Oxford Journals »  full text: open access