Skip to main content


CyberSecurity research and education

  1. Content type: Case study

    Currently 40 % of the world’s population, around 3 billion users, are online using cyberspace for everything from work to pleasure. While there are numerous benefits accompanying this medium, the Internet is n...

    Authors: Jason R. C. Nurse, Arnau Erola, Thomas Gibson-Robinson, Michael Goldsmith and Sadie Creese

    Citation: Security Informatics 2016 5:3

    Published on:

  2. Content type: Research

    Attackers increasingly take advantage of naive users who tend to treat non-executable files casually, as if they are benign. Such users often open non-executable files although they can conceal and perform mal...

    Authors: Nir Nissim, Aviad Cohen, Robert Moskovitch, Asaf Shabtai, Matan Edri, Oren BarAd and Yuval Elovici

    Citation: Security Informatics 2016 5:1

    Published on:

  3. Content type: Research

    Effectively assessing and configuring security controls to minimize network risks requires human judgment. Little is known about what factors network professionals perceive to make judgments of network risk. T...

    Authors: Jennifer Cowley, Frank L. Greitzer and Bronwyn Woods

    Citation: Security Informatics 2015 4:1

    Published on:

    The Erratum to this article has been published in Security Informatics 2015 4:5