Human Aspects in Cybersecurity

Challenges Policy Makers face to Counter Cybercrime

Pfleeger (2005) reminds us that modern cyber-criminals can often be individuals that are difficult to detect.  They “wear business suits, have university degrees, and...
Ian Carnaghan
2 min read

Cybercrime vs Traditional Crime

“Eighteen people were charged in what may be one of the nation’s largest credit card fraud rings, a sprawling international scam that duped credit-rating...
Ian Carnaghan
2 min read

Risks, Threats and Vulnerabilities

According to SANS (2009) attacks against websites and web applications constitute more than 60% of total attacks observed on the internet.  The risk of...
Ian Carnaghan
1 min read

Security Policies

Bosworth et al (2009) stress the importance of formality that should be adopted when creating an ethics policy.  They emphasize that clear documentation, clear...
Ian Carnaghan
1 min read

Cost and Challenges with E-Government

There is no doubt that E-Government provides conveniences today that many take for granted, however there is an underlying cost for these services.  First...
Ian Carnaghan
1 min read

Cultural Values and Moral Legitimacy

In a paper that discussed various cyber-crimes throughout the years carried out by juveniles, Radnofsky (2006) points us to the seriousness of these types...
Ian Carnaghan
1 min read

One audit standard fits all?

Computer applications are constantly evolving; while web based systems continue to grow in complexity.  It is essential that these systems are properly secured both...
Ian Carnaghan
1 min read

Mobile Security

Underlying vulnerabilities in mobile device software has also opened up the door to potential security breaches.  In an article describing mobile application security flaws,...
Ian Carnaghan
1 min read

Will the Mandiant Report Raise Public Awareness?

The Mandiant report: APT1: Exposing One of China’s Cyber Espionage Units, has stirred up a lot of media attention over the past few weeks.  The report...
Ian Carnaghan
1 min read