LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Thackray, Helen; McAlaney, John; Dogan, H.; Taylor, Jacqui; Richardson, C. (2016)
Publisher: BCS:Chartered Institute for IT
Languages: English
Types: Unknown
Subjects:

Classified by OpenAIRE into

ACM Ref: ComputingMilieux_LEGALASPECTSOFCOMPUTING
In cyber-security the weakest link is often seen as the human factor. This has led to discussions about the optimal methods in preventing cyber security breaches. This paper proposes that the fusion of cybersecurity and social psychology can inform and advance attempts to educate those on both sides of the law. Awareness and education will lead to more effective communication between parties and greater understanding of the risks and consequences for cyber attackers and defenders alike.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • Bernstein, M. S., Monroy-Hernandez, A., Harry, D., Andre, P., Panovich, K., Vargas, G. (2011) 4chan and /b/: An Analysis of Anonymity and Ephemerality in a Large Online Community. In: Fifth International AAAI Conference on Weblogs and Social Media, ICWSM, 50-57.
    • Bojarski, K. (2015) Dealer, Hacker, Lawyer, Spy: Modern Techniques and Legal Boundaries of Counter-cybercrime Operations. The European Review of Organised Crime, 2 (2), 25-50.
    • Coleman, G. (2014) Hacker, hoaxer, whistleblower, spy: The Many Faces of Anonymous. London: Verso.
    • Coleman, G. (2015) Epilogue: The State of Anonymous. In Hacker, hoaxer, whistleblower, spy: The Many Faces of Anonymous. London: Verso, 401-461.
    • Chantler, N. (1996) Profile of a computer hacker. Florida: Infowar.
    • Dobusch, L. & Schoeneborn, D. (2015) Fluidity, Identity, and Organizationality: The Communicative Constitution of Anonymous. Journal of Management Studies, 52 (8), 1005- 1035.
    • Glenny, M. (2011) Dark market: How hackers became the new mafia. New York: Vintage.
    • Gunnarson, C. (2014) Changing the Game: Addiopizzo's Mobilisation against Racketeering in Palermo. The European Review of Organised Crime, 1 (1), 39-77.
    • Joinson, A. N. (2007) Disinhibition and the Internet. In: J. Gackenbach (ed). Psychology and the Internet: Intrapersonal, interpersonal, and transpersonal implications (2nd ed). San Diego: Academic Press. 75-92.
    • Krapp, P. (2005) Terror and play; or what was hacktivism?. Grey Room MIT Press, 21, 70-93.
    • Landreth, B., & Rheingold, H. (1985) Out of the inner circle: a hacker's guide to computer security. Bellevue, Washington: Microsoft Press.
    • Lapidot-Lefler, N., & Barak, A. (2015) The benign online disinhibition effect: Could situational factors induce self-disclosure and prosocial behaviors?. Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 9 (2), 2-3.
    • McEvoy Manjikian, M. (2010) From Global Village to Virtual Battlespace: The Colonizing of the Internet and the Extension of Realpolitik. International Studies Quarterly, 54, 381-401.
    • McMahon, C. (2016) Cyber-Psychology: The Key to Securing the Human Element in Your Organization. Info Security Magazine, available from: https://www.infosecurity-magazine.com/ magazine-features/cyberpsychology-securinghuman/, accessed 12/03/16.
    • Olsen, P. (2013) We are Anonymous. London: Random House.
    • Rogers, M. K. (2006) A two-dimensional circumplex approach to the development of a hacker taxonomy. Digital Investigation, 3 (2), 97-102.
    • Rogers, M. K. (2010) The psyche of cybercriminals: a psycho-social perspective. In: Ghosh S.,
    • Turrini E. (eds). Cybercrimes: A Multidisciplinary Analysis. Berlin: Springer, 217-35.
    • Seebruck, R. (2015) A typology of hackers: Classifying cyber malfeasance using a weighted arc circumplex model. Digital Investigation, 14, 36-45.
    • Suler, J. (2004) The Online Disinhibition Effect. CyberPsychology & Behavior, 7 (3), 321-326.
    • Taylor, P. (1999) Hackers: crime in the digital sublime. London: Routledge.
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article