Volume 3 (2019-20)

Each volume of Cyber Security: A Peer-Reviewed Journal consists of four quarterly 100-page issues. The articles published in Volume 3 are listed below. Further articles to be published in Volume 3 can be viewed on the 'Forthcoming content' page.

Volume 3 Number 2

  • Editorial
    Simon Beckett, Publisher
  • Third-party risk management: Strategy to mitigate ‘on-premise’ and ‘cloud’ cyber security risks
    Moh Cissé, CEO, M6C StrategIT
  • Digital twins, the industrial Internet of Things and cyber security threats in connected industry
    Mark Hearn, Director of IoT Security and Business Development, Irdeto
  • A strategic approach to cyber security risk reduction for FX in the cloud using people, processes and technology
    Rupert Lee-Browne, Chairman, Caxton
  • Managing the hypercomplexity of cyber security regulation: In search of a regulatory Rosetta Stone
    F. Paul Greene, Partner and the Privacy & Data Security practice group leader, Harter Secrest & Emery
  • Healthcare cyber security and HIPAA assurance with business associates
    Janice Ahlstrom, Director, Christopher Tait, Principal and Kenneth Zoline, Senior Manager, Baker Tilly
  • Preventing cybercrime: A framework for understanding the role of human vulnerabilities
    Christopher S. Kayser, Cybercrime Analytics Inc., Mary Ellen Mastrorilli, Associate Professor and Robert Cadigan, Associate Professor Emeritus, Boston University
  • The nature of society: Are certain cultures less predisposed to cyberthreats than others? An examination using the example of Germany
    Jochen Werne, Authorised Officer, Bankhaus August Lenz

Volume 3 Number 1

  • Editorial
    Simon Beckett, Publisher
  • Impersonation fraud scenarios: How to protect, detect and respond
    Mario Bruno, Lead Investigator, Citigroup
  • Doing risk management correctly
    Randall Frietzsche, Enterprise CISO, Denver Health
  • Examining the relationship between formal RMF training and perceptions of RMF effectiveness, sustainability and commitment in RMF practitioners
    Philip D. Schall, Associate Professor of Information Systems, Liberty University and Oludotun Oni, Professor of Information Systems and Security, University of the Cumberlands
  • Surviving ransom driven DDoS extortion campaigns
    Sean Newman, Senior Director of Product Management, Corero Network Security
  • Resilience to combined attacks
    David Winks, AcquSight
  • A data privacy approach for cyber-physical systems
    Jan Weldert, Cyber Security and Data Privacy Expert, Jana Karina von Wedel, Deputy Head of Cyber Security and Data Privacy and Christian Beul, INVENSITY
  • Cyber security and human resource development implications for the enterprise
    Andrew R. Gillam, Indiana State University