20,062
Views
31
CrossRef citations to date
0
Altmetric
Research Article

A tale of two cybers - how threat reporting by cybersecurity firms systematically underrepresents threats to civil society

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (10)

Myriam Dunn Cavelty, Christine Eriksen & Benjamin Scharte. (2023) Making cyber security more resilient: adding social considerations to technological fixes. Journal of Risk Research 26:7, pages 801-814.
Read now
Anke Sophia Obendiek & Timo Seidl. (2023) The (False) promise of solutionism: ideational business power and the construction of epistemic authority in digital security governance. Journal of European Public Policy 30:7, pages 1305-1329.
Read now
Tom E. Julsrud. (2023) Sustainable sharing in local communities: exploring the role of social capital. Local Environment 28:6, pages 811-827.
Read now
Florian J. Egloff & Max Smeets. (2023) Publicly attributing cyber attacks: a framework. Journal of Strategic Studies 46:3, pages 502-533.
Read now
Nori Katagiri. (2023) Defending medical facilities from cyber attacks: critical issues with the principle of due diligence in international law. International Review of Law, Computers & Technology 0:0, pages 1-20.
Read now
Chris Bronk & Wm Arthur Conklin. (2022) Who’s in charge and how does it work? US cybersecurity of critical infrastructure. Journal of Cyber Policy 7:2, pages 155-174.
Read now
Moritz Weiss. (2022) The rise of cybersecurity warriors?. Small Wars & Insurgencies 33:1-2, pages 272-293.
Read now
Miguel Alberto Gomez. (2021) Overcoming uncertainty in cyberspace: strategic culture and cognitive schemas. Defence Studies 21:1, pages 25-46.
Read now
Jean-Marie Chenou. (2021) The contested meanings of cybersecurity: evidence from post-conflict Colombia. Conflict, Security & Development 21:1, pages 1-19.
Read now

Articles from other publishers (21)

Nico Ebert, Thierry Schaltegger, Benjamin Ambuehl, Lorin Schöni, Verena Zimmermann & Melanie Knieps. (2023) Learning from safety science: A way forward for studying cybersecurity incidents in organizations. Computers & Security 134, pages 103435.
Crossref
Kerstin Zettl-Schabath. 2023. Staatliche Cyberkonflikte. Staatliche Cyberkonflikte.
Joe Devanny & Andrew C. Dwyer. (2023) From Cyber Security to Cyber Power: Appraising the Emergence of ‘Responsible, Democratic Cyber Power’ in UK Strategy. From Cyber Security to Cyber Power: Appraising the Emergence of ‘Responsible, Democratic Cyber Power’ in UK Strategy.
Giovanni Apruzzese, Pavel Laskov, Edgardo Montes de Oca, Wissam Mallouli, Luis Brdalo Rapa, Athanasios Vasileios Grammatopoulos & Fabio Di Franco. (2023) The Role of Machine Learning in Cybersecurity. Digital Threats: Research and Practice 4:1, pages 1-38.
Crossref
Sourabh Purkait & Madhavi Damle. (2023) Cyber Security and Frameworks: A Study of Cyber Attacks and Methods of Prevention of Cyber Attacks. Cyber Security and Frameworks: A Study of Cyber Attacks and Methods of Prevention of Cyber Attacks.
Eugenio Lilli. (2023) How Can We Know What We Think We Know about Cyber Operations?. Journal of Global Security Studies 8:2.
Crossref
Lennart Maschmeyer. (2022) Subversion, cyber operations, and reverse structural power in world politics. European Journal of International Relations 29:1, pages 79-103.
Crossref
Konstantinos Ntafloukas, Liliana Pasquale, Beatriz Martinez-Pastor & Daniel P. McCrum. (2023) A Vulnerability Assessment Approach for Transportation Networks Subjected to Cyber–Physical Attacks. Future Internet 15:3, pages 100.
Crossref
Paul Strickland. 2022. Tourism Marketing in Southeast and East Asia. Tourism Marketing in Southeast and East Asia 175 184 .
Luis Salim, Stephanus Harjono, Ferdinand Gunawan, Jurike Moniaga & Indra Rianto. (2022) A Literature Review on the Impact of Effective Management in Cyber Security System Performance. A Literature Review on the Impact of Effective Management in Cyber Security System Performance.
Yusuf S. AlMahmeed & Alauddin Y. Al-Omay. (2022) Zero-day Attack Solutions Using Threat Hunting Intelligence: Extensive Survey. Zero-day Attack Solutions Using Threat Hunting Intelligence: Extensive Survey.
Marcus Michaelsen & Johannes Thumfart. (2022) Drawing a line: Digital transnational repression against political exiles and host state sovereignty. European Journal of International Security, pages 1-21.
Crossref
Konstantinos Ntafloukas, Daniel P. McCrum & Liliana Pasquale. (2022) A Cyber-Physical Risk Assessment Approach for Internet of Things Enabled Transportation Infrastructure. Applied Sciences 12:18, pages 9241.
Crossref
Jean-Marie Chenou & John K. Bonilla-Aranzales. 2022. Cyber Peace. Cyber Peace 94 116 .
Nori Katagiri. (2022) Explaining Cyberspace Dynamics in the COVID Era. Global Studies Quarterly 2:3.
Crossref
William Akoto. (2021) Accountability and cyber conflict: examining institutional constraints on the use of cyber proxies. Conflict Management and Peace Science 39:3, pages 311-332.
Crossref
Ryan Shandler, Keren L. G. Snider & Daphna Canetti. 2022. The Cambridge Handbook of Political Psychology. The Cambridge Handbook of Political Psychology 565 581 .
. 2022. The Cambridge Handbook of Political Psychology. The Cambridge Handbook of Political Psychology 361 598 .
Miguel Alberto Gomez & Christopher Whyte. (2021) Breaking the Myth of Cyber Doom: Securitization and Normalization of Novel Threats. International Studies Quarterly 65:4, pages 1137-1150.
Crossref
Felix Antonio Barrio & Raquel Poy. 2021. Handbook of Research on Advanced Research Methodologies for a Digital Society. Handbook of Research on Advanced Research Methodologies for a Digital Society 840 866 .
Dennis Broeders. (2021) Private active cyber defense and (international) cyber security—pushing the line?. Journal of Cybersecurity 7:1.
Crossref