english

A framework for effective corporate communication after cybersecurity incidents

Cybersecurity incidents can have various significant consequences on an organization or a company. These consequences can then lead to other adverse effects, such as damaging the company’s reputation and causing the loss of customers or business partners. The growing increase in reported cases of cyber incidents leads experts to want to act ahead by prioritizing …

Applying marketing principles to assess cybersecurity education training and awareness programs

Cybersecurity Management and prevention programs’ success and relevance depend primarily on improving employees’ security behaviours within an organization. Indeed, several existing programs make sure to apply those concepts, so employees have the proper tools and knowledge to intervene in a cybersecurity compromise situation within their organizations. Existing programs like education, training, and security awareness programs …

Faces of radicalism: Differentiating between violent and non-violent radicals

Radical groups and radicalized individuals are often confused as being all violent and at risk of committing acts of terrorism. Radicals are defined as individuals who support or justify terrorism, and sometimes they express a desire to engage in radical acts of violence. However, very few studies have focused on what differentiates violent radicals, who …

Taxonomy and definition of cyberterrorism

Like cybercrime, large-scale cyber-attacks are overgrowing and attracting attention from both media and government agencies mainly because these attacks are often linked to threats of cyberterrorism. A misconception is to take for granted that cyberterrorism is precisely the same phenomenon as terrorism and then uses the exact definition for both phenomena. Moreover, even the definition …

Topological Data Analysis for Ransomware Detection on the Bitcoin Blockchain

Presented by Cuneyt Akcora as a part of the 2020 Serene-risc Workshop on The State of Canadian Cybersecurity Conference: Human-Centric Cybersecurity. About the presentation Proliferation of cryptocurrencies (e.g., Bitcoin) that allow pseudo-anonymous transactions, has made it easier for ransomware developers to demand ransom by encrypting sensitive user data. The recently revealed strikes of ransomware attacks …

Cybercrime and shifts in opportunities during COVID-19

The global pandemic in which we have been immersed for months has changed many things. Indeed, no one has been immune to periods of isolation, the risks of contagion from the virus, and unfortunately, the criminal opportunities that arose. Indeed, several waves of attempted fraud have made headlines in recent months. Fraudsters seem likely to …

Privacy calculus on social networks?

Social networks on mobile applications are used more and more by everyone. Businesses and individuals use platforms like Twitter, Facebook, Instagram, WhatsApp, YouTube, and many others as sources of entertainment and income. However, the increase in use and public engagement on those platforms has also caused a significant increase in user privacy risks. Computers and …

Call for Help: Examining the antecedents of Social Support Seeking Among Victims of Cybercrime

The increase in cyber crimes leads to a rise in the number of victims of this type of crime. The number of victims only keeps increasing over time, and the consequences are significant. These crimes, such as fraud, identity theft, hacking, and more, are those rare crimes where victims must go through a long process …