Academics in business science and elsewhere have begun to look at what Vaughan (1999) called the “dark side of organisations” and started to engage with the fact that people connected to cyber systems can be the source of great opportunity for exploitation. MacGillivray (2014) notes that organisations should be seen as socio-technical: where infrastructure and systems shape and are shaped by the people that work with them. The current paper puts these sociotechnical systems at the heart of cyber-attack and defence - where we see ‘cyber’ as being shorthand for any computer dependent technologies used to achieve dark effects on the human mind and subsequent behaviour (e.g. SMS received on a mobile phone).There is no logic to restrictively foc...
In this article the authors focus on the human factor in cyber defence in order to improve the resil...
Today, cyberspace is where new forms of criminality are being exploited; and cyberspace has become t...
Next to sea, land, air and space, ‘cyber space’ appears to be the fifth operational domain for the m...
Academics in business science and elsewhere have begun to look at what Vaughan (1999) called the “da...
This paper sets out an argument that cyber-security needs to be thought of as an inherently socio-te...
This paper sets out an argument that cyber-security needs to be thought of as an inherently socio-te...
This chapter summarises how an organisation (and key individuals within it) could be subject to smar...
In this digital age, information is transferred with such ease and speed that security is rarely tak...
Abstract: When we think of technology, what often comes to mind are televisions, communications devi...
Cyber attackers continuously show new levels of intention by performing more sophisticated attacks o...
Cybersecurity incidents may seem very technological in nature, but ultimately the hackers and the or...
The orthodox paradigm to defend against automated social-engineering attacks in large-scale socio-te...
Essential systems providing water, electricity, healthcare, finance, food, and transportation are no...
The technological innovation of cyber systems and increase dependence of individuals, societies and ...
Ransomware attacks have become complex due to the ability of networked-systems constantly used as at...
In this article the authors focus on the human factor in cyber defence in order to improve the resil...
Today, cyberspace is where new forms of criminality are being exploited; and cyberspace has become t...
Next to sea, land, air and space, ‘cyber space’ appears to be the fifth operational domain for the m...
Academics in business science and elsewhere have begun to look at what Vaughan (1999) called the “da...
This paper sets out an argument that cyber-security needs to be thought of as an inherently socio-te...
This paper sets out an argument that cyber-security needs to be thought of as an inherently socio-te...
This chapter summarises how an organisation (and key individuals within it) could be subject to smar...
In this digital age, information is transferred with such ease and speed that security is rarely tak...
Abstract: When we think of technology, what often comes to mind are televisions, communications devi...
Cyber attackers continuously show new levels of intention by performing more sophisticated attacks o...
Cybersecurity incidents may seem very technological in nature, but ultimately the hackers and the or...
The orthodox paradigm to defend against automated social-engineering attacks in large-scale socio-te...
Essential systems providing water, electricity, healthcare, finance, food, and transportation are no...
The technological innovation of cyber systems and increase dependence of individuals, societies and ...
Ransomware attacks have become complex due to the ability of networked-systems constantly used as at...
In this article the authors focus on the human factor in cyber defence in order to improve the resil...
Today, cyberspace is where new forms of criminality are being exploited; and cyberspace has become t...
Next to sea, land, air and space, ‘cyber space’ appears to be the fifth operational domain for the m...