Month: April 2021

Impact of contextual and personal determinants on online social conformity

Social conformity is a well-studied phenomenon in psychology, especially in sociopsychology, mainly due to its influence on human behaviour. Indeed, conformity is a social phenomenon that causes individuals to change their behaviours, vision, or opinions to agree with the majority (Asch, 1951). These behaviours are mainly explained by the human tendency to be appreciated by …

Impact des déterminants contextuels et personnels sur la conformité sociale en ligne

La conformité sociale est un phénomène bien étudié en psychologie, et surtout en sociopsychologie, principalement  en raison de son effet d’influence sur les comportements humains. En effet, la conformité est un fait social qui amène les individus à changer leurs propres comportements, idéaux ou opinions afin de concorder avec la majorité (Asch, 1951). Ces comportements …

Analyzing Encrypted Traffic – security and privacy issues in Remote Desktop Protocol

Presented by Lucas Lapczyck as a part of the 2020 Serene-risc Workshop on The State of Canadian Cybersecurity Conference: Human-Centric Cybersecurity. About the presentation Network traffic encryption is a widely adopted mechanism to prevent eavesdropping on network communications. Since traditional network monitoring approaches such as Deep Packet Inspection cannot be applied on encrypted traffic, there …

The role of human beliefs in knowledge absorption for cyber-security

The strong growth in computer security incidents forces private companies and government organizations to improve and be aware of hackers’ new tacticss continually. To do this, these organizations must equip themselves with numerous hardware and software at the cutting edge of technology. Despite this, if no one can use them well or know how to …

Le rôle des croyances humaines dans l’absorption des connaissances pour la cybersécurité

La forte croissance des incidents de sécurité informatique oblige les compagnies privées et les organisations gouvernementales à constamment s’améliorer et être au courant des nouvelles tactiques des pirates informatiques.  Pour ce faire, ces organisations doivent s’équiper autant en matériels et logiciels à la fine pointe de la technologie. Néanmoins, si les employés ne savent pas …

Privacy Threats in the Context of Intimate Relationships: Sociotechnical Vulnerabilities in Canada’s Legal System

Presented by Yuan Stevens as a part of the 2020 Serene-risc Workshop on The State of Canadian Cybersecurity Conference: Human-Centric Cybersecurity. About the presentation In 2018, the Government of Canada released its Strategy to Prevent and Address Gender-Based Violence. An annual review of the strategy demonstrates that the Canadian government is slowly beginning to regulate …

Les scambaiters et leur influence sur la répression policière de la fraude

La fraude n’est pas un nouveau crime apparu dans les années 2000. Elle existe depuis longtemps, mais l’apparition de l’internet a permis sa facilitation et a ouvert les portes à diverses formes de fraudes. Une fraude implique généralement deux individus où l’un essaie d’exploiter l’autre afin d’obtenir un gain financier (Smith, 2008). Cela implique généralement …