Human Aspects in Cybersecurity Archives - Ian Carnaghan

Challenges Policy Makers face to Counter Cybercrime

Pfleeger (2005) reminds us that modern cyber-criminals can often be individuals that are difficult to detect.  They “wear business...

Feb 4 · 2 min read >
65 of internet users are cybercrime victims infographic c5b55bf8d6

Cybercrime vs Traditional Crime

“Eighteen people were charged in what may be one of the nation’s largest credit card fraud rings, a sprawling...

Feb 5 · 2 min read >

Risks, Threats and Vulnerabilities

According to SANS (2009) attacks against websites and web applications constitute more than 60% of total attacks observed on...

Feb 6 · 1 min read >
Risks, Threats and Vulnerabilities

Security Policies

Bosworth et al (2009) stress the importance of formality that should be adopted when creating an ethics policy.  They...

Feb 17 · 1 min read >
Security Policies

Cost and Challenges with E-Government

There is no doubt that E-Government provides conveniences today that many take for granted, however there is an underlying...

Feb 18 · 1 min read >
e-government

Cultural Values and Moral Legitimacy

In a paper that discussed various cyber-crimes throughout the years carried out by juveniles, Radnofsky (2006) points us to...

Feb 19 · 1 min read >
Cultural Values

One audit standard fits all?

Computer applications are constantly evolving; while web based systems continue to grow in complexity.  It is essential that these...

Mar 6 · 1 min read >
audit standard

Mobile Security

Underlying vulnerabilities in mobile device software has also opened up the door to potential security breaches.  In an article...

Mar 7 · 1 min read >
Mobile Security

Will the Mandiant Report Raise Public Awareness?

The Mandiant report: APT1: Exposing One of China’s Cyber Espionage Units, has stirred up a lot of media attention over the...

Mar 8 · 1 min read >
Mandiant Report