Skip to main content

Advertisement

CyberSecurity research and education

  1. Currently 40 % of the world’s population, around 3 billion users, are online using cyberspace for everything from work to pleasure. While there are numerous benefits accompanying this medium, the Internet is n...

    Authors: Jason R. C. Nurse, Arnau Erola, Thomas Gibson-Robinson, Michael Goldsmith and Sadie Creese

    Citation: Security Informatics 2016 5:3

    Content type: Case study

    Published on:

  2. Attackers increasingly take advantage of naive users who tend to treat non-executable files casually, as if they are benign. Such users often open non-executable files although they can conceal and perform mal...

    Authors: Nir Nissim, Aviad Cohen, Robert Moskovitch, Asaf Shabtai, Matan Edri, Oren BarAd and Yuval Elovici

    Citation: Security Informatics 2016 5:1

    Content type: Research

    Published on:

  3. Effectively assessing and configuring security controls to minimize network risks requires human judgment. Little is known about what factors network professionals perceive to make judgments of network risk. T...

    Authors: Jennifer Cowley, Frank L. Greitzer and Bronwyn Woods

    Citation: Security Informatics 2015 4:1

    Content type: Research

    Published on:

    The Erratum to this article has been published in Security Informatics 2015 4:5