Meurs et al., 2022
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| Sharif et al. | A literature review of financial losses statistics for cyber security and future trend | |
| Meurs et al. | Ransomware: How attacker’s effort, victim characteristics and context influence ransom requested, payment and financial loss | |
| Sen et al. | Estimating the contextual risk of data breach: An empirical approach | |
| Agarwal et al. | Blockchain and crypto forensics: Investigating crypto frauds | |
| Coburn et al. | Solving cyber risk: protecting your company and society | |
| Levi et al. | The implications of economic cybercrime for policing | |
| Gwebu et al. | Data breaches in hospitality: is the industry different? | |
| Khan et al. | What matters for financial inclusions? Evidence from emerging economy | |
| Smith et al. | Cyber terrorism cases and stock market valuation effects | |
| Alqudhaibi et al. | Cybersecurity 4.0: safeguarding trust and production in the digital food industry era | |
| Grody | Addressing cyber risk in financial institutions and in the financial system | |
| Kaur et al. | Introduction to cybersecurity | |
| Maphosa | An overview of cybersecurity in Zimbabwe’s financial services sector | |
| Connolly et al. | Your Money or Your Business: Decision-Making Processes in Ransomware Attacks. | |
| Terlizzi et al. | Privacy concerns and protection motivation theory in the context of mobile banking | |
| Goh et al. | Predictive taxonomy analytics (LASSO): predicting outcome types of cyber breach | |
| AlSalamah | Security risk management in online system | |
| Abubakar et al. | Root cause analysis (rca) as a preliminary tool into the investigation of identity theft | |
| Rjaibi et al. | The mean failure cost cybersecurity model toward security measures and associated mechanisms | |
| Kropotov et al. | What decision-makers need to know about ransomware risk | |
| Borrion et al. | Your money or your business: Decision-making processes in ransomware attacks | |
| Gabrian | Impact Zones: How cybercrime disrupts and shapes the landscape of data security | |
| El-Kady | Decoding the dark: AI and ML in the dark web cybercrime and cryptocurrency forensics | |
| JOSEPH | The Effectiveness of Cybersecurity Measures in Preventing Cyber-Attacks on Mobile Payment Systems | |
| Meurs et al. | Estimating the Number of Ransomware Attacks |