This paper draws on the psychology of risk and "management guru" literature (Huczynski, 2006) to examine how cybersecurity risks are constructed and communicated by cybersecurity specialists. We conduct a rhetorical analysis of ten recent cybersecurity publications ranging from popular media to academic and technical articles. We find most cybersecurity specialists in the popular domain use management guru techniques and manipulate common cognitive limitations in order to over-dramatize and over-simplify cybersecurity risks to critical infrastructure (CI). We argue there is a role for government: to collect, validate and disseminate more data among owners and operators of CI; to adopt institutional arrangements with an eye to moderating exa...
As threat actor operations become increasingly sophisticated and emphasize the targeting of critical...
As threat actor operations become increasingly sophisticated and emphasize the targeting of critical...
As threat actor operations become increasingly sophisticated and emphasize the targeting of critical...
This paper draws on the psychology of risk and "management guru" literature (Huczynski, 2006) to exa...
This paper draws on the psychology of risk and "management guru" literature (Huczynski, 2006) to exa...
This paper draws on the psychology of risk and "management guru" literature (Huczynski, 2006) to exa...
This paper draws on the psychology of risk and "management guru" literature (Huczynski, 2006) to exa...
This paper sets out an argument that cyber-security needs to be thought of as an inherently socio-te...
The 4th industrial revolution (4IR) is transforming the way businesses operate, making them more eff...
Cybersecurity covers the broad range of technical and social issues that must be considered to prote...
Despite increased awareness of cybersecurity incidents and consequences, organisations still struggl...
This paper sets out an argument that cyber-security needs to be thought of as an inherently socio-te...
Cybersecurity practitioners working in organisations implement risk controls aiming to improve the s...
Governments and businesses are struggling to cope with the scale and complexity of managing cyber ri...
With various views being posed on cybersecurity, this paper examines the proposition that cybersecur...
As threat actor operations become increasingly sophisticated and emphasize the targeting of critical...
As threat actor operations become increasingly sophisticated and emphasize the targeting of critical...
As threat actor operations become increasingly sophisticated and emphasize the targeting of critical...
This paper draws on the psychology of risk and "management guru" literature (Huczynski, 2006) to exa...
This paper draws on the psychology of risk and "management guru" literature (Huczynski, 2006) to exa...
This paper draws on the psychology of risk and "management guru" literature (Huczynski, 2006) to exa...
This paper draws on the psychology of risk and "management guru" literature (Huczynski, 2006) to exa...
This paper sets out an argument that cyber-security needs to be thought of as an inherently socio-te...
The 4th industrial revolution (4IR) is transforming the way businesses operate, making them more eff...
Cybersecurity covers the broad range of technical and social issues that must be considered to prote...
Despite increased awareness of cybersecurity incidents and consequences, organisations still struggl...
This paper sets out an argument that cyber-security needs to be thought of as an inherently socio-te...
Cybersecurity practitioners working in organisations implement risk controls aiming to improve the s...
Governments and businesses are struggling to cope with the scale and complexity of managing cyber ri...
With various views being posed on cybersecurity, this paper examines the proposition that cybersecur...
As threat actor operations become increasingly sophisticated and emphasize the targeting of critical...
As threat actor operations become increasingly sophisticated and emphasize the targeting of critical...
As threat actor operations become increasingly sophisticated and emphasize the targeting of critical...