ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
4
views
0
references
Top references
cited by
18
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,327
similar
All similar
Record
: found
Abstract
: found
Article
: found
Is Open Access
A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate
Author(s):
Ioannis Agrafiotis
1
,
Jason R C Nurse
2
,
Michael Goldsmith
1
,
Sadie Creese
1
,
David Upton
3
Publication date
Created:
October 16 2018
Publication date
(Electronic):
October 16 2018
Journal:
Journal of Cybersecurity
Publisher:
Oxford University Press (OUP)
Read this article at
ScienceOpen
Publisher
Download
XML
Review
Review article
Invite someone to review
Bookmark
Cite as...
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
UCL Grand Challenges: Cultural Understanding
Author and article information
Journal
Title:
Journal of Cybersecurity
Publisher:
Oxford University Press (OUP)
ISSN (Print):
2057-2085
ISSN (Electronic):
2057-2093
Publication date Created:
2018
Publication date Created:
January 01 2018
Publication date Created:
October 16 2018
Publication date Other:
2018
Publication date (Print):
January 01 2018
Publication date (Electronic):
October 16 2018
Volume
: 4
Issue
: 1
Affiliations
[
1
]
Department of Computer Science, University of Oxford, Oxford, OX1 3QD, UK
[
2
]
School of Computing, University of Kent, Canterbury, CT2 7NF, UK
[
3
]
Saïd Business School, University of Oxford, Oxford, OX1 1HP, UK
Article
DOI:
10.1093/cybsec/tyy006
SO-VID:
be78e423-ed6d-4e7a-8504-71f0295af119
Copyright ©
© 2018
License:
http://creativecommons.org/licenses/by/4.0/
History
Data availability:
Comments
Comment on this article
Sign in to comment
scite_
Similar content
1,327
Contextual Cross-Referencing of Species Names for Fiddler Crabs (Genus Uca): An Experiment in Cyber-Taxonomy
Authors:
Michael Rosenberg
A Survey of Cyber Attacks on Cyber Physical Systems: Recent Advances and Challenges
Authors:
Wenli Duo
,
MengChu Zhou
,
Abdullah Abusorrah
Innovative Countermeasures to Defeat Cyber Attacks Against Blockchain Wallets: A Crypto Terminal Use Case
Authors:
Pascal Urien
See all similar
Cited by
17
Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic
Authors:
Harjinder Singh Lallie
,
Lynsay A. Shepherd
,
Jason R.C. Nurse
…
Best ways computation intelligent of face cyber attacks
Authors:
Bilal Alhayani
,
Sara Abbas
,
Dawood Khutar
…
An Investigation of Misinformation Harms Related to Social Media during Two Humanitarian Crises
Authors:
Thi Tran
,
Rohit Valecha
,
Paul Rad
…
See all cited by