Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Forecasting the Impact of Information Security Breaches on Stock Market Returns and VaR Backtest
(Articles)
Ilaria Colivicchi
,
Riccardo Vignaroli
Journal of Mathematical Finance
Vol.9 No.3
,August 21, 2019
DOI:
10.4236/jmf.2019.93024
778
Downloads
2,329
Views
Citations
A Study on Quantitative Methodology to Assess Cyber Security Risk of Smart Grid
(Articles)
Pil Sung Woo
,
Byung-Hyun Ko
,
Dong-Joo Kang
,
Balho H. Kim
Energy and Power Engineering
Vol.5 No.4B
,November 18, 2013
DOI:
10.4236/epe.2013.54B249
5,347
Downloads
8,117
Views
Citations
Pricing Cyber Security Insurance
(Articles)
Zhaoxin Lin
,
Travis R. A. Sapp
,
Rahul Parsa
,
Jackie Rees Ulmer
,
Chengxin Cao
Journal of Mathematical Finance
Vol.12 No.1
,January 18, 2022
DOI:
10.4236/jmf.2022.121003
356
Downloads
2,458
Views
Citations
Appraising the Manifestation of Optimism Bias and Its Impact on Human Perception of Cyber Security: A Meta Analysis
(Articles)
Khaled M. Alnifie
,
Charles Kim
Journal of Information Security
Vol.14 No.2
,February 23, 2023
DOI:
10.4236/jis.2023.142007
364
Downloads
1,773
Views
Citations
Modeling Cyber Loss Severity Using a Spliced Regression Distribution with Mixture Components
(Articles)
Meng Sun
Open Journal of Statistics
Vol.13 No.4
,July 11, 2023
DOI:
10.4236/ojs.2023.134021
143
Downloads
671
Views
Citations
This article belongs to the Special Issue on
Multivariate Statistical Analysis
Relevance of Cybersecurity Education at Pedagogy Levels in Schools
(Articles)
Eric Amankwa
Journal of Information Security
Vol.12 No.4
,September 9, 2021
DOI:
10.4236/jis.2021.124013
1,006
Downloads
8,506
Views
Citations
An Institutional Theory Perspective on Developing a Cyber Security Legal Framework: A Case of Saudi Arabia
(Articles)
H. P. Singh
,
Tareq S. Alshammari
Beijing Law Review
Vol.11 No.3
,July 9, 2020
DOI:
10.4236/blr.2020.113039
821
Downloads
3,240
Views
Citations
The Impact of Cyber Security on Business: How to Protect Your Business
(Articles)
Emiles Mbungu Kala
Open Journal of Safety Science and Technology
Vol.13 No.2
,June 30, 2023
DOI:
10.4236/ojsst.2023.132003
468
Downloads
5,275
Views
Citations
Critical Role of Cyber Security in Global Economy
(Articles)
Emile S. Mbungu Kala
Open Journal of Safety Science and Technology
Vol.13 No.4
,December 25, 2023
DOI:
10.4236/ojsst.2023.134012
80
Downloads
683
Views
Citations
Development of the Software Application with Graphical User Interface for One Model Cyber Security
(Articles)
Ramaz R. Shamugia
Int'l J. of Communications, Network and System Sciences
Vol.12 No.12
,December 13, 2019
DOI:
10.4236/ijcns.2019.1212014
672
Downloads
1,590
Views
Citations
Ontology-Based Cyber Security Policy Implementation in Saudi Arabia
(Articles)
Amir Mohamed Talib
,
Fahad Omar Alomary
,
Hanan Fouad Alwadi
,
Rawan Rashed Albusayli
Journal of Information Security
Vol.9 No.4
,October 26, 2018
DOI:
10.4236/jis.2018.94021
1,505
Downloads
3,511
Views
Citations
E-Fraud in Nigerian Banks: Why and How?
(Articles)
Babatunde Moses Ololade
,
Mary Kehinde Salawu
,
Aderemi Daniel Adekanmi
Journal of Financial Risk Management
Vol.9 No.3
,September 10, 2020
DOI:
10.4236/jfrm.2020.93012
924
Downloads
7,906
Views
Citations
Case Study of a Cyber-Physical Attack Affecting Port and Ship Operational Safety
(Articles)
Kimberly Tam
,
Rory Hopcraft
,
Kemedi Moara-Nkwe
,
Juan Palbar Misas
,
Wesley Andrews
,
Avanthika Vineetha Harish
,
Pablo Giménez
,
Tom Crichton
,
Kevin Jones
Journal of Transportation Technologies
Vol.12 No.1
,December 6, 2021
DOI:
10.4236/jtts.2022.121001
484
Downloads
4,294
Views
Citations
Taming the Shrew of Rising Cyber-Warfare
(Articles)
Festus C. Obi
,
Alaba M. Oludare
Open Access Library Journal
Vol.9 No.12
,December 28, 2022
DOI:
10.4236/oalib.1109003
55
Downloads
491
Views
Citations
Increasing Threats to United States of America Infrastructure Based on Cyber-Attacks
(Articles)
Robb Shawe
,
Ian R. McAndrew
Journal of Software Engineering and Applications
Vol.16 No.10
,October 31, 2023
DOI:
10.4236/jsea.2023.1610027
152
Downloads
838
Views
Citations
Cybersecurity and Domestic Terrorism: Purpose and Future
(Articles)
Robb Shawe
,
Ian R. McAndrew
Journal of Software Engineering and Applications
Vol.16 No.10
,October 31, 2023
DOI:
10.4236/jsea.2023.1610028
97
Downloads
493
Views
Citations
Cybersecurity: Integrating Information into the Microeconomics of the Consumer and the Firm
(Articles)
Scott Farrow
Journal of Information Security
Vol.7 No.5
,August 30, 2016
DOI:
10.4236/jis.2016.75023
2,196
Downloads
3,874
Views
Citations
Cyber-Physical-Social Based Security Architecture for Future Internet of Things
(Articles)
Huansheng Ning
,
Hong Liu
Advances in Internet of Things
Vol.2 No.1
,January 14, 2012
DOI:
10.4236/ait.2012.21001
13,726
Downloads
31,736
Views
Citations
Perception on Cyber Terrorism: A Focus Group Discussion Approach
(Articles)
Rabiah Ahmad
,
Zahri Yunos
,
Shahrin Sahib
,
Mariana Yusoff
Journal of Information Security
Vol.3 No.3
,July 25, 2012
DOI:
10.4236/jis.2012.33029
8,316
Downloads
15,336
Views
Citations
Externalities and the Magnitude of Cyber Security Underinvestment by Private Sector Firms: A Modification of the Gordon-Loeb Model
(Articles)
Lawrence A. Gordon
,
Martin P. Loeb
,
William Lucyshyn
,
Lei Zhou
Journal of Information Security
Vol.6 No.1
,January 7, 2015
DOI:
10.4236/jis.2015.61003
7,302
Downloads
10,441
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top