Advances in cyber capabilities continue to cause apprehension among the public. With states engaging in cyber operations in pursuit of its perceived strategic utility, it is unsurprising that images of a “Cyber Pearl Harbor” remain appealing. It is crucial to note, however, that the offensive action in cyberspace has only had limited success over the past decade. It is estimated that less than 5% of these have achieved their stated political or strategic objectives. Moreover, only five states are thought to have the capabilities to inflict or threaten substantial damage. Consequently, this raises the question of what accounts for the continued sense of dread in cyberspace. The article posits that this dread results from the inappropriate us...
Fear has been used to convince people to behave securely in a variety of cybersecurity domains. In t...
This paper argues that the primary threat posed by cyber-attacks is not cataclysmic physical destruc...
Fear has been used to convince people to behave securely in a variety of cyber security domains. In ...
Advances in cyber capabilities continue to cause apprehension among the public. With states engaging...
Moderate and measured takes on cyber security threats are swamped by the recent flood of research an...
The United States struggles to impose meaningful costs for destructive or disruptive cyber operation...
This paper sets out an argument that cyber-security needs to be thought of as an inherently socio-te...
In recent years, scholars, commentators and politicians have discussed the prospect of a ‘cyber secu...
Cyber security researchers are starting to experiment with fear appeals, with a wide variety of desi...
Cyber-security is thus a very serious issue. Attacks can have catastrophic consequences. The cyber-w...
We developed a simulation game to study the effectiveness of decision-makers in overcoming two compl...
Fear appeals have been used for thousands of years to scare people into engaging in a specific behav...
Purpose: This paper aims to determine the potential predictors of anxiety about digital security, te...
The use of cyber operations as a foreign policy instrument continues to stimulate academic interest ...
This thesis investigates variation in state responses to hostile cyber operations. The central argum...
Fear has been used to convince people to behave securely in a variety of cybersecurity domains. In t...
This paper argues that the primary threat posed by cyber-attacks is not cataclysmic physical destruc...
Fear has been used to convince people to behave securely in a variety of cyber security domains. In ...
Advances in cyber capabilities continue to cause apprehension among the public. With states engaging...
Moderate and measured takes on cyber security threats are swamped by the recent flood of research an...
The United States struggles to impose meaningful costs for destructive or disruptive cyber operation...
This paper sets out an argument that cyber-security needs to be thought of as an inherently socio-te...
In recent years, scholars, commentators and politicians have discussed the prospect of a ‘cyber secu...
Cyber security researchers are starting to experiment with fear appeals, with a wide variety of desi...
Cyber-security is thus a very serious issue. Attacks can have catastrophic consequences. The cyber-w...
We developed a simulation game to study the effectiveness of decision-makers in overcoming two compl...
Fear appeals have been used for thousands of years to scare people into engaging in a specific behav...
Purpose: This paper aims to determine the potential predictors of anxiety about digital security, te...
The use of cyber operations as a foreign policy instrument continues to stimulate academic interest ...
This thesis investigates variation in state responses to hostile cyber operations. The central argum...
Fear has been used to convince people to behave securely in a variety of cybersecurity domains. In t...
This paper argues that the primary threat posed by cyber-attacks is not cataclysmic physical destruc...
Fear has been used to convince people to behave securely in a variety of cyber security domains. In ...