CybersecurityChallenges Policy Makers face to Counter Cybercrime4 Feb 20130This entry is part 1 of 18 in the series Human Aspects in CybersecurityPfleeger (2005) reminds us that modern cyber-criminals…
CybersecurityCybercrime vs Traditional Crime5 Feb 20132 CommentsThis entry is part 2 of 18 in the series Human Aspects in Cybersecurity“Eighteen people were charged in what may…
CybersecurityRisks, Threats and Vulnerabilities6 Feb 20131 CommentThis entry is part 3 of 18 in the series Human Aspects in CybersecurityAccording to SANS (2009) attacks against websites…
CybersecuritySecurity Policies17 Feb 20130This entry is part 4 of 18 in the series Human Aspects in CybersecurityBosworth et al (2009) stress the importance…
CybersecurityCost and Challenges with E-Government18 Feb 20130This entry is part 5 of 18 in the series Human Aspects in CybersecurityThere is no doubt that E-Government provides…
CybersecurityCultural Values and Moral Legitimacy19 Feb 20130This entry is part 6 of 18 in the series Human Aspects in CybersecurityIn a paper that discussed various cyber-crimes…
CybersecurityOne audit standard fits all?6 Mar 20130This entry is part 7 of 18 in the series Human Aspects in CybersecurityComputer applications are constantly evolving; while web…
CybersecurityMobile Security7 Mar 20130This entry is part 8 of 18 in the series Human Aspects in CybersecurityUnderlying vulnerabilities in mobile device software has…
CybersecurityWill the Mandiant Report Raise Public Awareness?8 Mar 20130This entry is part 9 of 18 in the series Human Aspects in CybersecurityThe Mandiant report: APT1: Exposing One of China’s…
CybersecurityEthical vs Non-Ethical Hackers20 Mar 20131 CommentThis entry is part 10 of 18 in the series Human Aspects in CybersecurityIn their paper on understanding risks associated…
CybersecurityMotivation and Intent of Hackers21 Mar 20131 CommentThis entry is part 11 of 18 in the series Human Aspects in CybersecurityJust over a decade ago I began…
CybersecurityHacking as an Addiction23 Mar 20130This entry is part 12 of 18 in the series Human Aspects in CybersecurityHacking can be broken into several categories,…
CybersecurityOnline Anonymity: Good or Bad?5 Apr 20130This entry is part 13 of 18 in the series Human Aspects in CybersecurityAnonymity on the Internet provides an important…
CybersecurityIdentity Theft and Inexperienced Internet Users5 Apr 20131 CommentThis entry is part 14 of 18 in the series Human Aspects in CybersecurityIdentity theft has been a growing concern…
CybersecurityRegulation vs Innovation6 Apr 20130This entry is part 15 of 18 in the series Human Aspects in CybersecurityOne of the ongoing discussions in the…
Cybersecurity3D Printing, Copyright and Legal Matters19 Apr 20130This entry is part 16 of 18 in the series Human Aspects in CybersecurityDuring the 1980s the role playing games…
CybersecuritySoftware Piracy on an International Scale20 Apr 20130This entry is part 17 of 18 in the series Human Aspects in Cybersecurity Copyright has become a huge issue…
CybersecurityWorkplace Monitoring and Blocking Software20 Apr 20130This entry is part 18 of 18 in the series Human Aspects in CybersecuritySoftware monitoring and blocking tools have become…