You are currently on the new version of our website. Access the old version .
  • Tracked for
    Impact Factor
  • 9.1
    CiteScore
  • 22 days
    Time to First Decision

Journal of Cybersecurity and Privacy, Volume 4, Issue 3

2024 September - 16 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (16)

  • Article
  • Open Access
8 Citations
4,466 Views
15 Pages

Cybersecurity Access Control: Framework Analysis in a Healthcare Institution

  • Erik William Tomlinson,
  • Wolday D. Abrha,
  • Seong Dae Kim and
  • Salvador A. Ortega

20 September 2024

Cyber threats are continually evolving and becoming increasingly complex, affecting various industries. Healthcare institutions are the second most targeted industry, preceded by manufacturing. The industry is on the lookout for a reliable cybersecur...

  • Article
  • Open Access
22 Citations
29,577 Views
31 Pages

Protection of Personal Data in the Context of E-Commerce

  • Zlatan Morić,
  • Vedran Dakic,
  • Daniela Djekic and
  • Damir Regvart

20 September 2024

This paper examines the impact of stringent regulations on personal data protection on customer perception of data security and online shopping behavior. In the context of the rapidly expanding e-commerce landscape, ensuring the security of personal...

  • Article
  • Open Access
1 Citations
3,229 Views
53 Pages

An Evaluation of the Security of Bare Machine Computing (BMC) Systems against Cybersecurity Attacks

  • Fahad Alotaibi,
  • Ramesh K. Karne,
  • Alexander L. Wijesinha,
  • Nirmala Soundararajan and
  • Abhishek Rangi

18 September 2024

The Internet has become the primary vehicle for doing almost everything online, and smartphones are needed for almost everyone to live their daily lives. As a result, cybersecurity is a top priority in today’s world. As Internet usage has grown...

  • Article
  • Open Access
3 Citations
3,074 Views
15 Pages

Advancements in Synthetic Generation of Contactless Palmprint Biometrics Using StyleGAN Models

  • A M Mahmud Chowdhury,
  • Md Jahangir Alam Khondkar and
  • Masudul Haider Imtiaz

11 September 2024

Deep learning models have demonstrated significant advantages over traditional algorithms in image processing tasks like object detection. However, a large amount of data are needed to train such deep networks, which limits their application to tasks...

  • Article
  • Open Access
1 Citations
2,394 Views
13 Pages

Comparative Vulnerability Analysis of Thai and Non-Thai Mobile Banking Applications

  • Chatphat Titiakarawongse,
  • Sasiyaporn Taksin,
  • Jidapa Ruangsawat,
  • Kunthida Deeduangpan and
  • Sirapat Boonkrong

9 September 2024

The rapid adoption of mobile banking applications has raised significant concerns about their security vulnerabilities. This study presents a comparative vulnerability analysis of mobile banking applications from Thai and non-Thai banks, utilising th...

  • Article
  • Open Access
3 Citations
4,342 Views
21 Pages

IoT IP Overlay Network Security Performance Analysis with Open Source Infrastructure Deployment

  • Antonio Francesco Gentile,
  • Davide Macrì,
  • Emilio Greco and
  • Peppino Fazio

26 August 2024

Some of the most deployed infrastructures nowadays are Overlay Networks (ONs). They consist of hardware and software components designed to establish private and secure communication channels, typically over the Internet. ONs are among the most relia...

  • Article
  • Open Access
1 Citations
2,765 Views
14 Pages

24 August 2024

Cyberattacks are rapidly evolving both in terms of techniques and frequency, from low-level attacks through to sophisticated Advanced Persistent Threats (APTs). There is a need to consider how testbed environments such as cyber ranges can be readily...

  • Article
  • Open Access
2 Citations
6,510 Views
21 Pages

20 August 2024

Data breach incidents are now a regular occurrence, with millions of people affected worldwide. Few studies have examined the psychological aspects of data breach experiences, however, or the individual differences that influence how people react to...

  • Article
  • Open Access
4 Citations
4,365 Views
22 Pages

Use and Abuse of Personal Information, Part I: Design of a Scalable OSINT Collection Engine

  • Elliott Rheault,
  • Mary Nerayo,
  • Jaden Leonard,
  • Jack Kolenbrander,
  • Christopher Henshaw,
  • Madison Boswell and
  • Alan J. Michaels

13 August 2024

In most open-source intelligence (OSINT) research efforts, the collection of information is performed in an entirely passive manner as an observer to third-party communication streams. This paper describes ongoing work that seeks to insert itself int...

  • Article
  • Open Access
3 Citations
16,331 Views
26 Pages

Use & Abuse of Personal Information, Part II: Robust Generation of Fake IDs for Privacy Experimentation

  • Jack Kolenbrander,
  • Ethan Husmann,
  • Christopher Henshaw,
  • Elliott Rheault,
  • Madison Boswell and
  • Alan J. Michaels

11 August 2024

When personal information is shared across the Internet, we have limited confidence that the designated second party will safeguard it as we would prefer. Privacy policies offer insight into the best practices and intent of the organization, yet most...

of 2

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
J. Cybersecur. Priv. - ISSN 2624-800X