LIVIVO - The Search Portal for Life Sciences

zur deutschen Oberfläche wechseln
Advanced search

Search results

Result 1 - 10 of total 11

Search options

  1. Book ; Online: Exploring Cybercriminal Activities, Behaviors and Profiles

    Bada, Maria / Nurse, Jason R. C.

    2023  

    Abstract: While modern society benefits from a range of technological advancements, it also is exposed to an ever-increasing set of cybersecurity threats. These affect all areas of life including business, government, and individuals. To complement technology ... ...

    Abstract While modern society benefits from a range of technological advancements, it also is exposed to an ever-increasing set of cybersecurity threats. These affect all areas of life including business, government, and individuals. To complement technology solutions to this problem, it is crucial to understand more about cybercriminal perpetrators themselves, their use of technology, psychological aspects, and profiles. This is a topic that has received little socio-technical research emphasis in the technology community, has few concrete research findings, and is thus a prime area for development. The aim of this article is to explore cybercriminal activities and behavior from a psychology and human aspects perspective, through a series of notable case studies. We examine motivations, psychological and other interdisciplinary concepts as they may impact/influence cybercriminal activities. We expect this paper to be of value and particularly insightful for those studying technology, psychology, and criminology, with a focus on cybersecurity and cybercrime.
    Keywords Computer Science - Cryptography and Security ; Computer Science - Computers and Society ; Computer Science - Human-Computer Interaction
    Subject code 303
    Publishing date 2023-08-30
    Publishing country us
    Document type Book ; Online
    Database BASE - Bielefeld Academic Search Engine (life sciences selection)

    More links

    Kategorien

  2. Article ; Online: Cybersecurity: a critical priority for digital mental health.

    Inkster, Becky / Knibbs, Catherine / Bada, Maria

    Frontiers in digital health

    2023  Volume 5, Page(s) 1242264

    Abstract: There has been a surge in the supply and demand of digital mental health support services in recent times. There have also been high profile cyberattacks specifically targeting mental health and behavioral services, along with a shift toward targeting ... ...

    Abstract There has been a surge in the supply and demand of digital mental health support services in recent times. There have also been high profile cyberattacks specifically targeting mental health and behavioral services, along with a shift toward targeting vulnerable people directly. Cyberattacks involving personal health data, especially sensitive mental health data, could have devastating consequences to vulnerable people, those close to them, and many other stakeholders. This article calls for the immediate examination of the current state of cybersecurity in the digital mental healthcare industry to collectively identify risks and to protect user and provider vulnerabilities. This article points to the need to build a global cybersecurity culture within digital mental health while also working closely with other industries. The article concludes by making some preliminary recommendations to help support the creation of standards that will enhance the collective preparedness for future responses to cybersecurity threats and attacks.
    Language English
    Publishing date 2023-09-14
    Publishing country Switzerland
    Document type Journal Article
    ISSN 2673-253X
    ISSN (online) 2673-253X
    DOI 10.3389/fdgth.2023.1242264
    Database MEDical Literature Analysis and Retrieval System OnLINE

    More links

    Kategorien

  3. Book ; Online: A Cybersecurity Guide for Using Fitness Devices

    Bada, Maria / von Solms, Basie

    2021  

    Abstract: The popularity of wearable devices is growing exponentially, with consumers using these for a variety of services. Fitness devices are currently offering new services such as shopping or buying train tickets using contactless payment. In addition, ... ...

    Abstract The popularity of wearable devices is growing exponentially, with consumers using these for a variety of services. Fitness devices are currently offering new services such as shopping or buying train tickets using contactless payment. In addition, fitness devices are collecting a number of personal information such as body temperature, pulse rate, food habits and body weight, steps-distance travelled, calories burned and sleep stage. Although these devices can offer convenience to consumers, more and more reports are warning of the cybersecurity risks of such devices, and the possibilities for such devices to be hacked and used as springboards to other systems. Due to their wireless transmissions, these devices can potentially be vulnerable to a malicious attack allowing the data collected to be exposed. The vulnerabilities of these devices stem from lack of authentication, disadvantages of Bluetooth connections, location tracking as well as third party vulnerabilities. Guidelines do exist for securing such devices, but most of such guidance is directed towards device manufacturers or IoT providers, while consumers are often unaware of potential risks. The aim of this paper is to provide cybersecurity guidelines for users in order to take measures to avoid risks when using fitness devices.
    Keywords Computer Science - Cryptography and Security ; Computer Science - Computers and Society ; Computer Science - Human-Computer Interaction
    Subject code 600
    Publishing date 2021-05-06
    Publishing country us
    Document type Book ; Online
    Database BASE - Bielefeld Academic Search Engine (life sciences selection)

    More links

    Kategorien

  4. Book ; Online: Profiling the Cybercriminal

    Bada, Maria / Nurse, Jason R. C.

    A Systematic Review of Research

    2021  

    Abstract: As cybercrime becomes one of the most significant threats facing society today, it is of utmost importance to better understand the perpetrators behind such attacks. In this article, we seek to advance research and practitioner understanding of the ... ...

    Abstract As cybercrime becomes one of the most significant threats facing society today, it is of utmost importance to better understand the perpetrators behind such attacks. In this article, we seek to advance research and practitioner understanding of the cybercriminal (cyber-offender) profiling domain by conducting a rigorous systematic review. This work investigates the aforementioned domain to answer the question: what is the state-of-the-art in the academic field of understanding, characterising and profiling cybercriminals. Through the application of the PRISMA systematic literature review technique, we identify 39 works from the last 14 years (2006-2020). Our findings demonstrate that overall, there is lack of a common definition of profiling for cyber-offenders. The review found that one of the primary types of cybercriminals that studies have focused on is hackers and the majority of papers used the deductive approach as a preferred one. This article produces an up-to-date characterisation of the field and also defines open issues deserving of further attention such as the role of security professionals and law enforcement in supporting such research, as well as factors including personality traits which must be further researched whilst exploring online criminal behaviour. By understanding online offenders and their pathways towards malevolent behaviours, we can better identify steps that need to be taken to prevent such criminal activities.
    Keywords Computer Science - Computers and Society ; Computer Science - Cryptography and Security
    Publishing date 2021-05-06
    Publishing country us
    Document type Book ; Online
    Database BASE - Bielefeld Academic Search Engine (life sciences selection)

    More links

    Kategorien

  5. Book ; Online: Online Suicide Games

    Bada, Maria / Clayton, Richard

    A Form of Digital Self-harm or A Myth?

    2020  

    Abstract: Online suicide games are claimed to involve a series of challenges, ending in suicide. A whole succession of these such as the Blue Whale Challenge, Momo, the Fire Fairy and Doki Doki have appeared in recent years. The challenge culture is a deeply ... ...

    Abstract Online suicide games are claimed to involve a series of challenges, ending in suicide. A whole succession of these such as the Blue Whale Challenge, Momo, the Fire Fairy and Doki Doki have appeared in recent years. The challenge culture is a deeply rooted online phenomenon, whether the challenge is dangerous or not, while social media particularly motivates youngsters to take part because of their desire for attention. Although there is no evidence that the suicide games are real, authorities around the world have reacted by releasing warnings and creating information campaigns to warn youngsters and parents. We interviewed teachers, child protection experts and NGOs, conducted a systematic review of historical news reports from 2015-2019 and searched police and other authority websites to identify relevant warning releases. We then synthesized the existing knowledge on the suicide games phenomenon. A key finding of our work is that media, social media and warning releases by authorities are mainly just serving to spread the challenge culture and exaggerate fears regarding online risk.

    Comment: 7 pages
    Keywords Computer Science - Computers and Society ; Computer Science - Human-Computer Interaction
    Subject code 070
    Publishing date 2020-12-01
    Publishing country us
    Document type Book ; Online
    Database BASE - Bielefeld Academic Search Engine (life sciences selection)

    More links

    Kategorien

  6. Book ; Online: The Social and Psychological Impact of Cyber-Attacks

    Bada, Maria / Nurse, Jason R. C.

    2019  

    Abstract: Cyber-attacks have become as commonplace as the Internet itself. Each year, industry reports, media outlets and academic articles highlight this increased prevalence, spanning both the amount and variety of attacks and cybercrimes. In this article, we ... ...

    Abstract Cyber-attacks have become as commonplace as the Internet itself. Each year, industry reports, media outlets and academic articles highlight this increased prevalence, spanning both the amount and variety of attacks and cybercrimes. In this article, we seek to further advance discussions on cyber threats, cognitive vulnerabilities and cyberpsychology through a critical reflection on the social and psychological aspects related to cyber-attacks. In particular, we are interested in understanding how members of the public perceive and engage with risk and how they are impacted during and after a cyber-attack has occurred. This research focuses on key cognitive issues relevant to comprehending public reactions to malicious cyber events including risk perception, protection motivation, culture, and attacker characteristics (e.g., attacker identity, target identity and scale of attack). To consider the applicability of our findings, we investigate two significant cyber-attacks over the last few years, namely the WannaCry attack of 2017 and the Lloyds Banking Group attack in the same year.

    Comment: 21 pages
    Keywords Computer Science - Computers and Society ; Computer Science - Cryptography and Security ; Computer Science - Human-Computer Interaction
    Subject code 303
    Publishing date 2019-09-29
    Publishing country us
    Document type Book ; Online
    Database BASE - Bielefeld Academic Search Engine (life sciences selection)

    More links

    Kategorien

  7. Book ; Online: The Group Element of Cybercrime

    Nurse, Jason R. C. / Bada, Maria

    Types, Dynamics, and Criminal Operations

    2019  

    Abstract: While cybercrime can often be an individual activity pursued by lone hackers, it has increasingly grown into a group activity, with networks across the world. This chapter critically examines the group element of cybercrime from several perspectives. It ... ...

    Abstract While cybercrime can often be an individual activity pursued by lone hackers, it has increasingly grown into a group activity, with networks across the world. This chapter critically examines the group element of cybercrime from several perspectives. It identifies the platforms that online groups---cybercriminal and otherwise---use to interact, and considers groups as both perpetrators and victims of cybercrime. A key novelty is the discovery of new types of online groups whose collective actions border on criminality. The chapter also analyzes how online cybercrime groups form, organize, and operate. It explores issues such as trust, motives, and means, and draws on several poignant examples, from Anonymous to LulzSec, to illustrate the arguments.
    Keywords Computer Science - Cryptography and Security ; Computer Science - Computers and Society ; Computer Science - Social and Information Networks
    Publishing date 2019-01-07
    Publishing country us
    Document type Book ; Online
    Database BASE - Bielefeld Academic Search Engine (life sciences selection)

    More links

    Kategorien

  8. Book ; Online: Developing cybersecurity education and awareness programmes for Small and medium-sized enterprises (SMEs)

    Bada, Maria / Nurse, Jason R. C.

    2019  

    Abstract: Purpose: An essential component of an organisation's cybersecurity strategy is building awareness and education of online threats, and how to protect corporate data and services. This research article focuses on this topic and proposes a high-level ... ...

    Abstract Purpose: An essential component of an organisation's cybersecurity strategy is building awareness and education of online threats, and how to protect corporate data and services. This research article focuses on this topic and proposes a high-level programme for cybersecurity education and awareness to be used when targeting Small-to-Medium-sized Enterprises/Businesses (SMEs/SMBs) at a city-level. We ground this programme in existing research as well as unique insight into an ongoing city-based project with similar aims. Findings: We find that whilst literature can be informative at guiding education and awareness programmes, it may not always reach real-world programmes. On the other hand, existing programmes, such as the one we explored, have great potential but there can also be room for improvement. Knowledge from each of these areas can, and should, be combined to the benefit of the academic and practitioner communities. Originality/value: The study contributes to current research through the outline of a high-level programme for cybersecurity education and awareness targeting SMEs/SMBs. Through this research, we engage in a reflection of literature in this space, and present insights into the advances and challenges faced by an on-going programme. These analyses allow us to craft a proposal for a core programme that can assist in improving the security education, awareness and training that targets SMEs/SMBs.

    Comment: 20 pages, 1 figure
    Keywords Computer Science - Cryptography and Security ; Computer Science - Computers and Society ; Computer Science - Human-Computer Interaction
    Subject code 360
    Publishing date 2019-06-23
    Publishing country us
    Document type Book ; Online
    Database BASE - Bielefeld Academic Search Engine (life sciences selection)

    More links

    Kategorien

  9. Book ; Online: Developing a cyber security culture

    Uchendu, Betsy / Nurse, Jason R. C. / Bada, Maria / Furnell, Steven

    Current practices and future needs

    2021  

    Abstract: While the creation of a strong security culture has been researched and discussed for decades, it continues to elude many businesses. Part of the challenge faced is distilling pertinent, recent academic findings and research into useful guidance. In this ...

    Abstract While the creation of a strong security culture has been researched and discussed for decades, it continues to elude many businesses. Part of the challenge faced is distilling pertinent, recent academic findings and research into useful guidance. In this article, we aim to tackle this issue by conducting a state-of-the-art study into organisational cyber security culture research. This work investigates four questions, including how cyber security culture is defined, what factors are essential to building and maintaining such a culture, the frameworks proposed to cultivate a security culture and the metrics suggested to assess it. Through the application of the PRISMA systematic literature review technique, we identify and analyse 58 research articles from the last 10 years (2010-2020). Our findings demonstrate that while there have been notable changes in the use of terms (e.g., information security culture and cyber security culture), many of the most influential factors across papers are similar. Top management support, policy and procedures, and awareness for instance, are critical in engendering cyber security culture. Many of the frameworks reviewed revealed common foundations, with organisational culture playing a substantial role in crafting appropriate cyber security culture models. Questionnaires and surveys are the most used tool to measure cyber security culture, but there are also concerns as to whether more dynamic measures are needed. For practitioners, this article highlights factors and models essential to the creation and management of a robust security culture. For research, we produce an up-to-date characterisation of the field and also define open issues deserving of further attention such as the role of change management processes and national culture in an enterprise's cyber security culture.
    Keywords Computer Science - Cryptography and Security ; Computer Science - Computers and Society ; Computer Science - Human-Computer Interaction
    Subject code 303
    Publishing date 2021-06-28
    Publishing country us
    Document type Book ; Online
    Database BASE - Bielefeld Academic Search Engine (life sciences selection)

    More links

    Kategorien

  10. Book ; Online: Reviewing National Cybersecurity Awareness for Users and Executives in Africa

    Bada, Maria / von Solms, Basie / Agrafiotis, Ioannis

    2019  

    Abstract: There is an unprecedented increase in cybercrime globally observed over the last years. One of the regions driving this increase is Africa, where significant financial losses are reported. Yet, citizens of African countries are not aware of the risks ... ...

    Abstract There is an unprecedented increase in cybercrime globally observed over the last years. One of the regions driving this increase is Africa, where significant financial losses are reported. Yet, citizens of African countries are not aware of the risks present in cyberspace. The design and implementation of national awareness campaigns by African countries to address this problem are in their infancy state, mainly due to the absence of capacity building efforts. As part of the Global Cybersecurity Capacity Centre (GCSCC) programme, we conducted a series of focus groups in six African countries, in order to assess their cybersecurity posture, a critical component of which is user and executive awareness of cyber risks. This paper is an extended version of previous work where an initial analysis of awareness for cyber risk in African countries was presented. In this extended version, we reflect on best practice approaches for developing national awareness campaigns and use these as a framework to analyse qualitative data from the focus groups. We discuss the current state of African countries with regards to the implementation of national cybersecurity awareness campaigns for. users and executives, the main obstacles in combating cybercrime and conclude with recommendations on how African countries can identify and prioritise activities to increase their capacity regarding cybersecurity awareness.

    Comment: International Journal on Advances in Security, 10 pages
    Keywords Computer Science - Computers and Society
    Subject code 360
    Publishing date 2019-10-02
    Publishing country us
    Document type Book ; Online
    Database BASE - Bielefeld Academic Search Engine (life sciences selection)

    More links

    Kategorien

To top