# | Title | Journal | Year | Citations |
---|
|
1 | World Economic Forum: Global Risks Report 2019 | Computer Fraud and Security | 2019 | 292 |
2 | Verizon: Data Breach Investigations Report 2020 | Computer Fraud and Security | 2020 | 151 |
3 | Location-based authentication: Grounding cyberspace for better security | Computer Fraud and Security | 1996 | 144 |
4 | Verizon: 2019 Data Breach Investigations Report | Computer Fraud and Security | 2019 | 134 |
5 | The problem with Bitcoin | Computer Fraud and Security | 2013 | 126 |
6 | Verizon: 2021 Data Breach Investigations Report | Computer Fraud and Security | 2021 | 110 |
7 | IBM: Cost of a Data Breach Report | Computer Fraud and Security | 2021 | 107 |
8 | Cultivating an organizational information security culture | Computer Fraud and Security | 2006 | 103 |
9 | Verizon: Data Breach Investigations Report | Computer Fraud and Security | 2022 | 89 |
10 | APWG: Phishing Activity Trends Report Q4 2018 | Computer Fraud and Security | 2019 | 77 |
11 | From culture to disobedience: Recognising the varying user acceptance of IT security | Computer Fraud and Security | 2009 | 76 |
12 | Digital forensics: the missing piece of the Internet of Things promise | Computer Fraud and Security | 2016 | 74 |
13 | Beyond Bitcoin: using blockchain technology to provide assurance in the commercial world | Computer Fraud and Security | 2017 | 73 |
14 | IBM: Cost of a Data Breach Report 2019 | Computer Fraud and Security | 2019 | 71 |
15 | Information security architecture | Computer Fraud and Security | 2005 | 67 |
16 | Recognising and addressing ‘security fatigue’ | Computer Fraud and Security | 2009 | 66 |
17 | Cybercrime as a service: a very modern business | Computer Fraud and Security | 2013 | 60 |
18 | Phishing – challenges and solutions | Computer Fraud and Security | 2018 | 57 |
19 | Ransomware: to pay or not to pay? | Computer Fraud and Security | 2016 | 56 |
20 | Trade secrets in software design and logic | Computer Fraud and Security | 1998 | 54 |
21 | Beyond the PIN: Enhancing user authentication for mobile devices | Computer Fraud and Security | 2008 | 54 |
22 | Protecting against spear-phishing | Computer Fraud and Security | 2012 | 52 |
23 | Using feature generation from API calls for malware detection | Computer Fraud and Security | 2014 | 51 |
24 | The security issues of the Internet of Things | Computer Fraud and Security | 2015 | 50 |
25 | Human aspects of information security in organisations | Computer Fraud and Security | 2016 | 49 |
26 | Europol: Internet Organised Crime Threat Assessment (IOCTA) 2021 | Computer Fraud and Security | 2021 | 49 |
27 | Cyberterrorism — fact or fancy? | Computer Fraud and Security | 1998 | 46 |
28 | Malware detection by behavioural sequential patterns | Computer Fraud and Security | 2013 | 46 |
29 | Using complexity metrics to improve software security | Computer Fraud and Security | 2013 | 44 |
30 | Best practices for BYOD security | Computer Fraud and Security | 2014 | 43 |
31 | Identifying attack patterns for insider threat detection | Computer Fraud and Security | 2015 | 41 |
32 | McAfee Labs Threats Report: December 2018 | Computer Fraud and Security | 2019 | 41 |
33 | Malvertising – exploiting web advertising | Computer Fraud and Security | 2011 | 39 |
34 | Understanding the influences on information security behaviour | Computer Fraud and Security | 2012 | 39 |
35 | Deconstructing Flame: the limitations of traditional defences | Computer Fraud and Security | 2012 | 39 |
36 | Home working and cyber security – an outbreak of unpreparedness? | Computer Fraud and Security | 2020 | 39 |
37 | KISS — Keep It Simple Stupid | Computer Fraud and Security | 2004 | 38 |
38 | Analysis of mobile payment security measures and different standards | Computer Fraud and Security | 2007 | 38 |
39 | IBM: X-Force Threat Intelligence Index | Computer Fraud and Security | 2022 | 38 |
40 | Hackers Profiled — Who Are They and What Are Their Motivations? | Computer Fraud and Security | 2001 | 35 |
41 | Cloud computing – A question of trust | Computer Fraud and Security | 2009 | 35 |
42 | Bayesian inference – the future of online fraud protection | Computer Fraud and Security | 2012 | 35 |
43 | Crypto-jacking: how cyber-criminals are exploiting the crypto-currency boom | Computer Fraud and Security | 2018 | 35 |
44 | Public awareness and perceptions of biometrics | Computer Fraud and Security | 2007 | 34 |
45 | Phishing: can we spot the signs? | Computer Fraud and Security | 2007 | 34 |
46 | Can't get the staff? The growing need for cyber-security skills | Computer Fraud and Security | 2017 | 34 |
47 | Europol: Internet Organised Crime Threat Assessment (IOCTA) 2019 | Computer Fraud and Security | 2019 | 34 |
48 | Securing the next generation: enhancing e-safety awareness among young people | Computer Fraud and Security | 2009 | 32 |
49 | Online recruitment services: another playground for fraudsters | Computer Fraud and Security | 2016 | 32 |
50 | Cisco: 2020 CISO Benchmark Report | Computer Fraud and Security | 2020 | 32 |