english

Individual differences influencing vulnerability to victimization and its psychological impacts

The rapidly growing problem of computer crimes affects the vast majority of countries. These crimes that come to life through a computer, phone, or tablet cost businesses and individuals a lot. It is known in the cybersecurity industry that computer attacks are often unintentionally caused by human error, leaving a system unprotected or easily accessible …

Android or iOS? The implication of an exploitation system for victims of domestic and intimate violence

Spyware is an increasingly popular tool sold to provide a surveillance tool to the general population, often advertised as the solution to parents, businesses, or spouses wanting to spy on their children, employee or partners. When this software is installed on the victim’s phone, it acts as a third party between the victim’s phone and …

What factors can influence risky behavior in cybersecurity?

Many cybersecurity problems require cyber teams to educate themselves and adapt to new issues constantly. Even though cybersecurity teams and experts polish and hone their knowledge using state-of-the-art software, some factors remain beyond their control. Human behaviours have direct and significant impacts on a computer attack’s success or failure. Individuals’ attitudes and behaviours strongly influence …

Developing a culture of cybersecurity within your organization

Nowadays, businesses are regularly using technology to safeguard their documents and their employee’s and customers’ personal information. Even if organizations are installing protection software or have cybersecurity departments on-site, their employees’ actions are a major significant weakness. A recent report showed that a significant proportion of companies’ cybersecurity breaches are committed by employees who do …

Do active and passive risks have the same predictive power as cybersecurity behaviour?

The growing number of cybercrime and their impact on victims and companies’ lives are considerable. In some cases, cybercrimes are usually the result of a wrong decision made by the user. Schneier (2000) even describes users as the weakest link in the cybersecurity chain. Although the general population seems to be aware of risks while …

Can Online Disinhibition Influence Sexual Assault?

New technologies have altered the way people interact with each other. Colleagues, friends, family and romantic encounters are increasingly happening through social media. Global availability and accessibility make it possible to chat anytime, regardless of the time zone. This allows several individuals to meet or keep in touch with romantic or sexual partners despite the …

The importance of self-efficacy and empathy factors in reducing cyberbullying

The rise in popularity of social networks and its convenience for social interactions also bring several disadvantages. Indeed, young adolescents grow up with these technologies in their hands. At the same time, the number of cases of cyberbullying is increasing as technologies gain ground among these young people. The issues of bullying at school or …

Is This Acceptable ? How factors related to user experience can expand our understanding of the phenomenon of accepting privacy compromises

The protection of personal information is a hot topic in the media. Numerous cases of data theft or malicious use have made headlines, and the public is becoming more worried about it. However, what about issues where the individual offers his personal information’s himself unconsciously, without realizing the risks involved? Technology and its multiple services …