books search
books
articles search
articles
Donate
Log In
Log In
to access more features
personal recommendations
Telegram Bot
download history
send to Email or Kindle
manage booklists
save to favorites
Explore
Journals
Contribution
Donate
Litera Library
Donate paper books
Add paper books
Open LITERA Point
Volume 6; Issue 1
Main
Journal of Cybersecurity
Volume 6; Issue 1
Journal of Cybersecurity
Volume 6; Issue 1
1
Developing a measure of information seeking about phishing
Williams, Emma J
,
Joinson, Adam N
Journal:
Journal of Cybersecurity
Year:
2020
File:
PDF, 258 KB
Your tags:
2020
2
Update now or later? Effects of experience, cost, and risk preference on update decisions
Rajivan, Prashanth
,
Aharonov-Majar, Efrat
,
Gonzalez, Cleotilde
Journal:
Journal of Cybersecurity
Year:
2020
Language:
english
File:
PDF, 461 KB
Your tags:
english, 2020
3
SMART: security model adversarial risk-based tool for systems security design evaluation
Wortman, Paul A
,
Chandy, John A
Journal:
Journal of Cybersecurity
Year:
2020
Language:
english
File:
PDF, 748 KB
Your tags:
english, 2020
4
Exploring user perceptions of deletion in mobile instant messaging applications
Schnitzler, Theodor
,
Utz, Christine
,
Farke, Florian M
,
Pöpper, Christina
,
Dürmuth, Markus
Journal:
Journal of Cybersecurity
Year:
2020
File:
PDF, 382 KB
Your tags:
2020
5
Integrating costâbenefit analysis into the NIST Cybersecurity Framework via the GordonâLoeb Model
Gordon, Lawrence A
,
Loeb, Martin P
,
Zhou, Lei
Journal:
Journal of Cybersecurity
Year:
2020
File:
PDF, 271 KB
Your tags:
2020
6
Privacy threats in intimate relationships
Levy, Karen
,
Schneier, Bruce
Journal:
Journal of Cybersecurity
Year:
2020
File:
PDF, 424 KB
Your tags:
2020
7
Data presentation in security operations centres: exploring the potential for sonification to enhance existing practice
Axon, Louise
,
AlAhmadi, Bushra A
,
Nurse, Jason R C
,
Goldsmith, Michael
,
Creese, Sadie
Journal:
Journal of Cybersecurity
Year:
2020
File:
PDF, 472 KB
Your tags:
2020
8
Challenging software developers: dialectic as a foundation for security assurance techniques
Weir, Charles
,
Rashid, Awais
,
Noble, James
Journal:
Journal of Cybersecurity
Year:
2020
File:
PDF, 1.14 MB
Your tags:
2020
9
Categorizing human phishing difficulty: a Phish Scale
Steves, Michelle
,
Greene, Kristen
,
Theofanos, Mary
Journal:
Journal of Cybersecurity
Year:
2020
File:
PDF, 259 KB
Your tags:
2020
10
Public attribution of cyber intrusions
Egloff, Florian J
Journal:
Journal of Cybersecurity
Year:
2020
File:
PDF, 306 KB
Your tags:
2020
11
Cyber conflict or democracy âhackedâ? How cyber operations enhance information warfare
Whyte, Christopher
Journal:
Journal of Cybersecurity
Year:
2020
File:
PDF, 317 KB
Your tags:
2020
12
Predicting smartphone location-sharing decisions through self-reflection on past privacy behavior
Wisniewski, Pamela
,
Safi, Muhammad Irtaza
,
Patil, Sameer
,
Page, Xinru
Journal:
Journal of Cybersecurity
Year:
2020
File:
PDF, 334 KB
Your tags:
2020
13
Improving vulnerability remediation through better exploit prediction
Jacobs, Jay
,
Romanosky, Sasha
,
Adjerid, Idris
,
Baker, Wade
Journal:
Journal of Cybersecurity
Year:
2020
File:
PDF, 470 KB
Your tags:
2020
14
Exploring the security narrative in the work context
Busse, Karoline
,
Seifert, Jennifer
,
Smith, Matthew
Journal:
Journal of Cybersecurity
Year:
2020
File:
PDF, 371 KB
Your tags:
2020
15
Erratum to: A market for trading software issues
Journal:
Journal of Cybersecurity
Year:
2020
File:
PDF, 69 KB
Your tags:
2020
1
Follow
this link
or find "@BotFather" bot on Telegram
2
Send /newbot command
3
Specify a name for your chatbot
4
Choose a username for the bot
5
Copy an entire last message from BotFather and paste it here
×
×