In recent years news stories have highlighted the increasing rate of cybercriminal activity targeting both private organizations and government entities. Cases from mischievous amateur hackers managing to exploit basic vulnerabilities, to more advanced security breaches carried out by expert criminal hackers and cybercrime organizations overseas, have grabbed the attention of the media.
“We are moving into a new era of mobile computing, one that promises greater variety in applications highly improved usability, and speedier networking.” Godwin-Jones (2008). This statement rings true for the past five years where mobile computing has seen a massive explosion in growth.
In any kind of work or study, we always bring a certain set of beliefs as well as philosophical assumptions. Qualitative researchers understand the importance of beliefs and theories that inform their work and also actively write about them in their research.
This entry is part 12 of 18 in the series Human Aspects in CybersecurityHacking can be broken into several categories, including criminal hacking where the perpetrator is motivated by some tangible gain, usually monetary. There are other forms of hacking which are driven by other factors such as political reasons.
This entry is part 11 of 18 in the series Human Aspects in CybersecurityJust over a decade ago I began learning about web technologies and found myself learning basic HTML. I was excited when I managed to publish my first website, which was no more than a basic homepage with some external links.
In 2007 I graduated from the University of Ulster’s new E-Learning masters program. For my thesis, I developed a research study on collaborative learning and more specifically the adoption of Adobe Connect at the University of Maryland University College.
This entry is part 10 of 18 in the series Human Aspects in CybersecurityIn their paper on understanding risks associated with hackers/crackers, (Smith, & Rupp 2002) discuss the various types of classification hackers have been placed into by different authors over the years.
Last week I attended my first Drupal ‘learn sprint’. For anyone interested in contributing to the Drupal community, learn sprints are a great way to network with other professionals in the area while learning how you can contribute to Drupal.
This entry is part 9 of 18 in the series Human Aspects in CybersecurityThe Mandiant report: APT1: Exposing One of China’s Cyber Espionage Units, has stirred up a lot of media attention over the past few weeks. The report was originally released to show evidence that a specific Chinese military unit has been behind many major Advanced Persistent Threats (APTs) within the …
This entry is part 8 of 18 in the series Human Aspects in CybersecurityUnderlying vulnerabilities in mobile device software has also opened up the door to potential security breaches. In an article describing mobile application security flaws, (Westervelt, 2010) wrote that it was discovered that many mobile application security vulnerabilities were similar to those found in early web applications.
- Page 1 of 2