Northampton Electronic Collection of Theses and Research

Items where Subject is "HV6773 Computer crime. Hacking"

Group by: Creators | Item Type | Date | No Grouping
Jump to: 2018 | 2017 | 2015 | 2014 | 2012 | 2011
Number of items at this level: 13.

2018

  1. Hills, M. (2018) Improving incident detection through capturing new behaviour analytics. Invited Presentation presented to: The European Information Security Summit 2018 (TEISS), ILEC Conference Centre, London, 20-21 February 2018.

2017

  1. Hills, M. (2017) Always on guard: how a corporate immune system can engage full-spectrum risks – a conceptual framework to re-engineer organizational capability and culture. In: Bajgoric, N. (ed.) Always-On Enterprise Information Systems for Modern Organizations. London: IGI Global. pp. 41-59.
  2. Hills, M. (2017) Towards corporate cyber immunity. Invited Keynote presented to: Cyber Security Briefing by Northamptonshire Growth Hub, Office of the Police and Crime Commissioner and the University of Northampton, Cottesbrooke, Park Campus, The University of Northampton, 08 September 2017.
  3. Hills, M. (2017) Corporate cyber immunity - what can a company do to prevent itself becoming a target? [Video]. YouTube.
  4. Hills, M. (2017) Lessons from the NHS ransomware calamity. EDQuarter. 26/05/2017

2015

  1. Hills, M. (2015) Enhancing corporate resilience to cyber-enabled attack: building immunity to psycho-cultural exploits. Invited Presentation presented to: Inaugural Northampton Business School Research Conference, Sunley Management Centre, The University of Northampton, 18 June 2015. (Unpublished)
  2. Hills, M. (2015) Beyond simple human threats to cybersecurity: the need for strong proactive measures and resilient responses to cyber risk. Cyber Security Review. Spring(2015), pp. 26-30. 2055-6950.
  3. Hills, M. (2015) Competitive advantage from human factors: cybersecurity. Invited Presentation presented to: Warwick Manufacturing Group Cybersecurity MSc Programme Event, Warwick University, 20 April 2015. (Unpublished)
  4. Hills, M. and Batchelor, G. (2015) Hard targets and an immune response: how information warfare and special force perspectives can deliver competitive advantage in mitigation and management of cyber crisis. Invited Presentation presented to: I4 (International Information Integrity Institute) - KPMG, Barcelona, Spain, 24 June 2015. (Unpublished)

2014

  1. Hills, M. (2014) The deregulation and swarming of cyberwarfare: the need for and limitations of law in enabling aggressive ‘hacking-back’ and pre-emption. Journal of Law & Cyber Warfare. 3(1), pp. 43-51.
  2. Hills, M. (2014) Socio-technical security: the insider threat. Invited Presentation presented to: Warwick Manufacturing Group Cybersecurity MSc Programme Event, Warwick University, 24 April 2014. (Unpublished)

2012

  1. Hills, M. (2012) A new perspective on the achievement of psychological effects from cyber warfare payloads: the analogy of parasitic manipulation of host behavior. Journal of Law & Cyber Warfare. 1(1), pp. 208-217.

2011

  1. Miladi, N. (2011) TV debate in: Politics and Media. Islam Channel. 18 July 2011.
This list was generated from NECTAR on Wed Sep 3 16:09:14 2025 BST.