View Post

Workplace Monitoring and Blocking Software

In Cybersecurity by Ian0 Comments

This entry is part 18 of 18 in the series Human Aspects in Cybersecurity

This entry is part 18 of 18 in the series Human Aspects in CybersecuritySoftware monitoring and blocking tools have become commonplace within the work environment and have been used in order to protect company intellectual assets from employees who either deliberately or accidently become the cause of security issues. In addition to this, one of the main arguments for such …

Share
View Post

Software Piracy on an International Scale

In Cybersecurity by Ian0 Comments

This entry is part 17 of 18 in the series Human Aspects in Cybersecurity

This entry is part 17 of 18 in the series Human Aspects in Cybersecurity Copyright has become a huge issue and talking point recently with continual legal challenges, the introduction and defeat of the Stop Online Piracy Act (SOPA) and considerations for future legislation, challenges and controversy.  The United States leads the world in having some of the toughest copyright …

Share
View Post

3D Printing, Copyright and Legal Matters

In Cybersecurity by Ian0 Comments

This entry is part 16 of 18 in the series Human Aspects in Cybersecurity

This entry is part 16 of 18 in the series Human Aspects in CybersecurityDuring the 1980s the role playing games like Dungeons and Dragons saw the rise in popularity of model or figurine molds, which essentially allowed players to create character’s using casting kits.  These were in effect a very early day version of 3D printing, which has introduced the …

Share
View Post

Kickoff Meeting

In Doctoral Research by Ian0 Comments

The first meeting with the administration team of Monarch Academy took place on Wednesday, April 10th at the school. The team consisted of an administrator from Monarch, a representative from Expeditionary Learning (EL), and several teachers.  The purpose of this initial meeting was to to gain more of an insight into the challenges of mapping expeditions.

Share
View Post

Regulation vs Innovation

In Cybersecurity by Ian0 Comments

This entry is part 15 of 18 in the series Human Aspects in Cybersecurity

This entry is part 15 of 18 in the series Human Aspects in CybersecurityOne of the ongoing discussions in the United States focuses on the need for regulation versus the need to free business from restrictive laws that would hinder innovation.  There are many sources that provide strong arguments for both sides.  You only have to look as far as …

Share
View Post

Identity Theft and Inexperienced Internet Users

In Cybersecurity by Ian1 Comment

This entry is part 14 of 18 in the series Human Aspects in Cybersecurity

This entry is part 14 of 18 in the series Human Aspects in CybersecurityIdentity theft has been a growing concern over the last decade.  In recent years it has become a major problem for many as the Internet has taken over much of the day to day banking many traditionally did at their physical located branches.  Is there however a …

Share
View Post

Online Anonymity: Good or Bad?

In Cybersecurity by Ian0 Comments

This entry is part 13 of 18 in the series Human Aspects in Cybersecurity

This entry is part 13 of 18 in the series Human Aspects in CybersecurityAnonymity on the Internet provides an important layer of protection for people to express themselves online, while keeping their real life identity private.  It has led to both positive as well as negative implications over the years and there has been much discussion on the benefits and …

Share
View Post

Financial Sector Cybersecurity Regulations

In Cybersecurity by Ian0 Comments

(Bidgoli, 2006) describes the statutory approach in the United States as being sectorial in nature “because the laws are drawn along industry lines.” This contrasts other parts of the world, such as the European Union, which has a non-sectorial approach where, for example a comprehensive privacy law applies to all organizations regardless of their industry.

Share