Cybersecurity has gained prominence, with a number of widely publicised security incidents, hacking attacks and data breaches reaching the news over the last few years. The escalation in the numbers of cyber incidents shows no sign of abating, and it seems appropriate to take a look at the way cybersecurity is conceptualised and to consider whether there is a need for a mindset change.To consider this question, we applied a "problematization" approach to assess current conceptualisations of the cybersecurity problem by government, industry and hackers. Our analysis revealed that individual human actors, in a variety of roles, are generally considered to be "a problem". We also discovered that deployed solutions primarily focus on preventing...
In this paper I provide an ethical and conceptual analysis of the emerging concern with ‘cybersecuri...
For most people, cybersecurity is a hard to grasp notion. Traditionally, cybersecurity has been cons...
2015 - 2016Recent security breaches showed that every attack begins with the involvement of users an...
Cybersecurity has gained prominence, with a number of widely publicised security incidents, hacking ...
Cybersecurity has gained prominence, with a number of widely publicised security incidents, hacking ...
This paper sets out an argument that cyber-security needs to be thought of as an inherently socio-te...
The chapter presents an overview of emerging issues in the psychology of human behaviour and the evo...
This paper sets out an argument that cyber-security needs to be thought of as an inherently socio-te...
The issue of cybersecurity has become much more prevalent over the last few years, with a number of ...
With computers being a standard part of life now with the evolution of the internet, many aspects of...
This paper is primarily intended to firstly define and review the literature in cybersecurity and vi...
Information security has for long time been a field of study in computer science, software engineeri...
Almost 60% of the world’s population has access to the internet and most organisations today rely on...
In this digital age, information is transferred with such ease and speed that security is rarely tak...
Information security has for long time been a field of study in computer science, software engineeri...
In this paper I provide an ethical and conceptual analysis of the emerging concern with ‘cybersecuri...
For most people, cybersecurity is a hard to grasp notion. Traditionally, cybersecurity has been cons...
2015 - 2016Recent security breaches showed that every attack begins with the involvement of users an...
Cybersecurity has gained prominence, with a number of widely publicised security incidents, hacking ...
Cybersecurity has gained prominence, with a number of widely publicised security incidents, hacking ...
This paper sets out an argument that cyber-security needs to be thought of as an inherently socio-te...
The chapter presents an overview of emerging issues in the psychology of human behaviour and the evo...
This paper sets out an argument that cyber-security needs to be thought of as an inherently socio-te...
The issue of cybersecurity has become much more prevalent over the last few years, with a number of ...
With computers being a standard part of life now with the evolution of the internet, many aspects of...
This paper is primarily intended to firstly define and review the literature in cybersecurity and vi...
Information security has for long time been a field of study in computer science, software engineeri...
Almost 60% of the world’s population has access to the internet and most organisations today rely on...
In this digital age, information is transferred with such ease and speed that security is rarely tak...
Information security has for long time been a field of study in computer science, software engineeri...
In this paper I provide an ethical and conceptual analysis of the emerging concern with ‘cybersecuri...
For most people, cybersecurity is a hard to grasp notion. Traditionally, cybersecurity has been cons...
2015 - 2016Recent security breaches showed that every attack begins with the involvement of users an...