ArchiveApril 2013

Workplace Monitoring and Blocking Software

W

This is post 18 of 18 in the series “Human Aspects in Cybersecurity” Challenges Policy Makers face to Counter Cybercrime Cybercrime vs Traditional Crime Risks, Threats and Vulnerabilities Security Policies Cost and Challenges with E-Government Cultural Values and Moral Legitimacy One audit standard fits all? Mobile Security Will the Mandiant Report Raise Public Awareness? Ethical vs...

Software Piracy on an International Scale

S

This is post 17 of 18 in the series “Human Aspects in Cybersecurity” Challenges Policy Makers face to Counter Cybercrime Cybercrime vs Traditional Crime Risks, Threats and Vulnerabilities Security Policies Cost and Challenges with E-Government Cultural Values and Moral Legitimacy One audit standard fits all? Mobile Security Will the Mandiant Report Raise Public Awareness? Ethical vs...

3D Printing, Copyright and Legal Matters

3

This is post 16 of 18 in the series “Human Aspects in Cybersecurity” Challenges Policy Makers face to Counter Cybercrime Cybercrime vs Traditional Crime Risks, Threats and Vulnerabilities Security Policies Cost and Challenges with E-Government Cultural Values and Moral Legitimacy One audit standard fits all? Mobile Security Will the Mandiant Report Raise Public Awareness? Ethical vs...

Regulation vs Innovation

R

This is post 15 of 18 in the series “Human Aspects in Cybersecurity” Challenges Policy Makers face to Counter Cybercrime Cybercrime vs Traditional Crime Risks, Threats and Vulnerabilities Security Policies Cost and Challenges with E-Government Cultural Values and Moral Legitimacy One audit standard fits all? Mobile Security Will the Mandiant Report Raise Public Awareness? Ethical vs...

Identity Theft and Inexperienced Internet Users

I

This is post 14 of 18 in the series “Human Aspects in Cybersecurity” Challenges Policy Makers face to Counter Cybercrime Cybercrime vs Traditional Crime Risks, Threats and Vulnerabilities Security Policies Cost and Challenges with E-Government Cultural Values and Moral Legitimacy One audit standard fits all? Mobile Security Will the Mandiant Report Raise Public Awareness? Ethical vs...

Online Anonymity: Good or Bad?

O

This is post 13 of 18 in the series “Human Aspects in Cybersecurity” Challenges Policy Makers face to Counter Cybercrime Cybercrime vs Traditional Crime Risks, Threats and Vulnerabilities Security Policies Cost and Challenges with E-Government Cultural Values and Moral Legitimacy One audit standard fits all? Mobile Security Will the Mandiant Report Raise Public Awareness? Ethical vs...

Financial Sector Cybersecurity Regulations

F

(Bidgoli, 2006) describes the statutory approach in the United States as being sectorial in nature “because the laws are drawn along industry lines.” This contrasts other parts of the world, such as the European Union, which has a non-sectorial approach where, for example a comprehensive privacy law applies to all organizations regardless of their industry.

About Author

Ian Carnaghan

I am a software developer and online educator who likes to keep up with all the latest in technology. I also manage cloud infrastructure, continuous monitoring, DevOps processes, security, and continuous integration and deployment.

Follow Me