In recent years news stories have highlighted the increasing rate of cybercriminal activity targeting both private organizations and government entities. Cases from mischievous amateur hackers managing to exploit basic vulnerabilities, to more advanced security breaches carried out by expert criminal hackers and cybercrime organizations overseas, have grabbed the attention of the media.
Mobile Cybersecurity Policies in the Private and Public Sector
“We are moving into a new era of mobile computing, one that promises greater variety in applications highly improved usability, and speedier networking.” Godwin-Jones (2008). This statement rings true for the past five years where mobile computing has seen a massive explosion in growth.
Philosophical Assumptions for Qualitative Research
This post contains affiliate links. If you click through and make a purchase, I may receive a commission (at no additional cost to you). As an Amazon Associate I earn from qualifying purchases. This helps support the blog and allows me to continue to make free content. Thank you for your support! In any kind of work or study, we always bring a certain set of beliefs as well as philosophical...
Hacking as an Addiction
This is post 12 of 18 in the series “Human Aspects in Cybersecurity” Challenges Policy Makers face to Counter Cybercrime Cybercrime vs Traditional Crime Risks, Threats and Vulnerabilities Security Policies Cost and Challenges with E-Government Cultural Values and Moral Legitimacy One audit standard fits all? Mobile Security Will the Mandiant Report Raise Public Awareness? Ethical vs...
Motivation and Intent of Hackers
This is post 11 of 18 in the series “Human Aspects in Cybersecurity” Challenges Policy Makers face to Counter Cybercrime Cybercrime vs Traditional Crime Risks, Threats and Vulnerabilities Security Policies Cost and Challenges with E-Government Cultural Values and Moral Legitimacy One audit standard fits all? Mobile Security Will the Mandiant Report Raise Public Awareness? Ethical vs...
Online Teaching and Learning Experiences in Higher Education
In 2007 I graduated from the University of Ulster’s new E-Learning masters program. For my thesis, I developed a research study on collaborative learning and more specifically the adoption of Adobe Connect at the University of Maryland University College.
Ethical vs Non-Ethical Hackers
This is post 10 of 18 in the series “Human Aspects in Cybersecurity” Challenges Policy Makers face to Counter Cybercrime Cybercrime vs Traditional Crime Risks, Threats and Vulnerabilities Security Policies Cost and Challenges with E-Government Cultural Values and Moral Legitimacy One audit standard fits all? Mobile Security Will the Mandiant Report Raise Public Awareness? Ethical vs...
Drupal Ladder
Last week I attended my first Drupal ‘learn sprint’. For anyone interested in contributing to the Drupal community, learn sprints are a great way to network with other professionals in the area while learning how you can contribute to Drupal.
Health Services and Challenges facing the Low-Literacy Population
In the United States, a large proportion of the population falls into the category of having low literacy skills. “A long-awaited federal study finds that an estimated 32 million adults in the USA — about one in seven — are saddled with such low literacy skills that it would be tough for them to read anything more challenging than a children’s picture book or to understand a...
Will the Mandiant Report Raise Public Awareness?
This is post 9 of 18 in the series “Human Aspects in Cybersecurity” Challenges Policy Makers face to Counter Cybercrime Cybercrime vs Traditional Crime Risks, Threats and Vulnerabilities Security Policies Cost and Challenges with E-Government Cultural Values and Moral Legitimacy One audit standard fits all? Mobile Security Will the Mandiant Report Raise Public Awareness? Ethical vs...
Mobile Security
This is post 8 of 18 in the series “Human Aspects in Cybersecurity” Challenges Policy Makers face to Counter Cybercrime Cybercrime vs Traditional Crime Risks, Threats and Vulnerabilities Security Policies Cost and Challenges with E-Government Cultural Values and Moral Legitimacy One audit standard fits all? Mobile Security Will the Mandiant Report Raise Public Awareness? Ethical vs...
One audit standard fits all?
This is post 7 of 18 in the series “Human Aspects in Cybersecurity” Challenges Policy Makers face to Counter Cybercrime Cybercrime vs Traditional Crime Risks, Threats and Vulnerabilities Security Policies Cost and Challenges with E-Government Cultural Values and Moral Legitimacy One audit standard fits all? Mobile Security Will the Mandiant Report Raise Public Awareness? Ethical vs...
Illuminate
Illuminate is the code name for a curriculum mapping project I am currently developing as part of my Doctoral thesis. I will be using this part of the blog to document my progress as development progresses. My plan is to have a version 1 of Illuminate completed by the spring of 2014.