You are currently viewing a new version of our website. To view the old version click .
  • Tracked forImpact Factor
  • 9.1CiteScore
  • 25 daysTime to First Decision

Journal of Cybersecurity and Privacy, Volume 5, Issue 4

December 2025 - 36 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (36)

  • Systematic Review
  • Open Access
837 Views
30 Pages

Privacy harms have expanded alongside rapid technological change, challenging the adequacy of existing regulatory frameworks. This systematic review (1990–2025) systematically maps documented privacy harms to specific legal mechanisms and obser...

  • Article
  • Open Access
437 Views
16 Pages

Phishing attacks, particularly Smishing (SMS phishing), have become a major cybersecurity threat, with attackers using social engineering tactics to take advantage of human vulnerabilities. Traditional detection models often struggle to keep up with...

  • Systematic Review
  • Open Access
1,203 Views
22 Pages

This review examines AI governance centered on Regulation (EU) 2024/1689 of the European Parliament and of the Council of 13 June 2024 laying down harmonised rules on artificial intelligence (the EU Artificial Intelligence Act), alongside comparable...

  • Article
  • Open Access
812 Views
19 Pages

This article analyzes how artificial intelligence (AI) is influencing the evolution of cybercrime in Ecuador. The use of AI tools to create new threats, such as intelligent malware, automated phishing, and financial fraud, is on the rise. The main pr...

  • Article
  • Open Access
612 Views
37 Pages

Zero Trust in Practice: A Mixed-Methods Study Under the TOE Framework

  • Angélica Pigola and
  • Fernando de Souza Meirelles

This study examines the adoption and implementation of the Zero Trust (ZT) cybersecurity paradigm using the Technology–Organization–Environment (TOE) framework. While ZT is gaining traction as a security model, many organizations struggle...

  • Article
  • Open Access
1,143 Views
40 Pages

Integrated Analysis of Malicious Software: Insights from Static and Dynamic Perspectives

  • Maria-Mădălina Andronache,
  • Alexandru Vulpe and
  • Corneliu Burileanu

Malware remains one of the most persistent and evolving threats to cybersecurity, necessitating robust analysis techniques to understand and mitigate its impact. This study presents a comprehensive analysis of selected malware samples using both stat...

  • Article
  • Open Access
1,559 Views
26 Pages

Identifying and Modeling Barriers to Compliance with the NIS2 Directive: A DEMATEL Approach

  • Konstantina Mentzelou,
  • Panos T. Chountalas,
  • Fotis C. Kitsios,
  • Anastasios I. Magoutas and
  • Thomas K. Dasaklis

The implementation of the NIS2 Directive expands the scope of cybersecurity regulation across the European Union, placing new demands on both essential and important entities. Despite its importance, organizations face multiple barriers that undermin...

  • Article
  • Open Access
1,102 Views
26 Pages

Ransomware attacks pose a serious threat to computer networks, causing widespread disruption to individual, corporate, governmental, and critical national infrastructures. To mitigate their impact, extensive research has been conducted to analyze ran...

  • Systematic Review
  • Open Access
4,724 Views
25 Pages

AI-Augmented SOC: A Survey of LLMs and Agents for Security Automation

  • Siddhant Srinivas,
  • Brandon Kirk,
  • Julissa Zendejas,
  • Michael Espino,
  • Matthew Boskovich,
  • Abdul Bari,
  • Khalil Dajani and
  • Nabeel Alzahrani

The increasing volume, velocity, and sophistication of cyber threats have placed immense pressure on modern Security Operations Centers (SOCs). Traditional rule-based and manual processes are proving insufficient, leading to alert fatigue, delayed re...

  • Article
  • Open Access
1,113 Views
17 Pages

Anomaly Detection Against Fake Base Station Threats Using Machine Learning

  • Amanul Islam,
  • Sourav Purification and
  • Sang-Yoon Chang

Mobile networking in 4G and 5G remains vulnerable against fake base stations. A fake base station can inject and manipulate the radio resource control (RRC) communication protocol to disable the user equipment’s connectivity. To motivate our re...

of 4

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
J. Cybersecur. Priv. - ISSN 2624-800X