View Post

Cultural Values and Moral Legitimacy

In Cybersecurity by Ian0 Comments

This entry is part 6 of 18 in the series Human Aspects in Cybersecurity

This entry is part 6 of 18 in the series Human Aspects in CybersecurityIn a paper that discussed various cyber-crimes throughout the years carried out by juveniles, Radnofsky (2006) points us to the seriousness of these types of threats.  The paper discusses the importance of changing cyber-culture through education and points to education through safety, security and ethics. 

View Post

Cost and Challenges with E-Government

In Cybersecurity by Ian0 Comments

This entry is part 5 of 18 in the series Human Aspects in Cybersecurity

This entry is part 5 of 18 in the series Human Aspects in CybersecurityThere is no doubt that E-Government provides conveniences today that many take for granted, however there is an underlying cost for these services.  First of all, government sites are attractive targets for malicious activities, whether or not this involves deliberate disruption of service, or the stealing of …

View Post

Cybercrime: Law Enforcement and E-Government Transnational Issues

In Cybersecurity by Ian0 Comments

During his 2013 State of the Union address, President Obama highlighted the importance of defending our nation from the many cyber threats that are continuing to dominate the news cycles. Just days prior to the President’s speech, eighteen people were charged in a massive credit card fraud ring. The Associated Press (2013) described it as a “sprawling international scam that …

View Post

Security Policies

In Cybersecurity by Ian0 Comments

This entry is part 4 of 18 in the series Human Aspects in Cybersecurity

This entry is part 4 of 18 in the series Human Aspects in CybersecurityBosworth et al (2009) stress the importance of formality that should be adopted when creating an ethics policy.  They emphasize that clear documentation, clear motivation, clear sanctions, and clear management support at every level, including the top, are all important pieces of an effective policy. 

View Post

Risks, Threats and Vulnerabilities

In Cybersecurity by Ian1 Comment

This entry is part 3 of 18 in the series Human Aspects in Cybersecurity

This entry is part 3 of 18 in the series Human Aspects in CybersecurityAccording to SANS (2009) attacks against websites and web applications constitute more than 60% of total attacks observed on the internet.  The risk of attack is generally based on the probability that a threat of some kind will exploit a vulnerability or weakness in a system or …

View Post

Cybercrime vs Traditional Crime

In Cybersecurity by Ian2 Comments

This entry is part 2 of 18 in the series Human Aspects in Cybersecurity

This entry is part 2 of 18 in the series Human Aspects in Cybersecurity“Eighteen people were charged in what may be one of the nation’s largest credit card fraud rings, a sprawling international scam that duped credit-rating agencies and used thousands of fake identities to steal at least $200 million, federal authorities said Tuesday.”

View Post

Challenges Policy Makers face to Counter Cybercrime

In Cybersecurity by Ian0 Comments

This entry is part 1 of 18 in the series Human Aspects in Cybersecurity

This entry is part 1 of 18 in the series Human Aspects in CybersecurityPfleeger (2005) reminds us that modern cyber-criminals can often be individuals that are difficult to detect.  They “wear business suits, have university degrees, and appear to be pillars of their communities.”  In addition to this, because of the wide spread accessibility to the internet and communications, it …