[HTML][HTML] Cybercrime threat intelligence: A systematic multi-vocal literature review

G Cascavilla, DA Tamburri, WJ Van Den Heuvel - Computers & Security, 2021 - Elsevier
Significant cybersecurity and threat intelligence analysts agree that online criminal activity is
increasing exponentially. To offer an overview of the techniques and indicators to perform …

Cyber-insurance survey

A Marotta, F Martinelli, S Nanni, A Orlando… - Computer Science …, 2017 - Elsevier
Cyber insurance is a rapidly developing area which draws more and more attention of
practitioners and researchers. Insurance, an alternative way to deal with residual risks, was …

[HTML][HTML] Decision support approaches for cyber security investment

A Fielder, E Panaousis, P Malacaria, C Hankin… - Decision support …, 2016 - Elsevier
When investing in cyber security resources, information security managers have to follow
effective decision-making strategies. We refer to this as the cyber security investment …

Informing cybersecurity strategic commitment through top management perceptions: The role of institutional pressures

O Ogbanufe, DJ Kim, MC Jones - Information & management, 2021 - Elsevier
Given the financial consequences of security breaches, security risk management has
gained more attention in board rooms and garnered more involvement from top …

Cyber risk assessment and mitigation (CRAM) framework using logit and probit models for cyber insurance

A Mukhopadhyay, S Chatterjee, KK Bagchi… - Information Systems …, 2019 - Springer
Malicious external attackers commonly use cyber threats (such as virus attacks, denial-of-
service (DoS) attacks, financial fraud, system penetration, and theft of proprietary …

Threat actors' tenacity to disrupt: Examination of major cybersecurity incidents

OI Falowo, S Popoola, J Riep, VA Adewopo… - IEEE Access, 2022 - ieeexplore.ieee.org
The exponential growth in the interconnectedness of people and devices, as well as the
upward trend in cyberspace usage will continue to lead to a greater reliance on the internet …

Analyzing and evaluating critical cyber security challenges faced by vendor organizations in software development: SLR based approach

AW Khan, S Zaib, F Khan, I Tarimer, JT Seo… - IEEE access, 2022 - ieeexplore.ieee.org
Security is the protection from various kinds of threats and most organizations engage in the
challenge of security especially cyber-attacks. The attacks are increasing rapidly, due to …

Cyberspace and personal cyber insurance: a systematic review

R McGregor, C Reaiche, S Boyle… - Journal of Computer …, 2024 - Taylor & Francis
As individuals become increasingly digitally dependent, cyber threats and cyber insurance
to mitigate them gain relevance. This literature review conceptualizes a framework for siting …

Regulating cybercrime through law enforcement and industry mechanisms

TJ Holt - The ANNALS of the American Academy of Political …, 2018 - journals.sagepub.com
Cybercrimes, or offenses enabled by technology, affect computer systems and people and
prove difficult to pursue through traditional criminal justice strategies due to jurisdictional …

The benefits and costs of cybersecurity risk reduction: A dynamic extension of the Gordon and Loeb model

K Krutilla, A Alexeev, E Jardine, D Good - Risk Analysis, 2021 - Wiley Online Library
This article develops a dynamic extension of the classic model of cybersecurity investment
formulated by Gordon and Loeb. In this dynamic model, results are influenced by the rate at …