english

The Hidden Face of Cybercrime

In scientific literature and newspaper articles, cybercrime is described as crimes committed anonymously. These crimes appear as new challenges that criminology and law enforcement agencies have never seen because of the anonymity and the ubiquity of delinquents. This perception of cybercrime obscures the fact that individuals physically commit cybercrime. That is why researchers Lusthaus and …

Cybercrime threat intelligence: A systematic multi-vocal literature review

Threat Intelligence focuses precisely on the organization, analysis, and development of detailed information to protect and prevent an organization (governmental or private) from suffering a cyber attack (Tounsi & Rais, 2018). The lifecycle of this discipline generally involves 6 phases: direction, collection, processing, analysis, dissemination, and feedback (see Fig. 1). The sources of information can …

Intimate abuse through technology: A systematic review of scientific Constructs and Behavioral dimensions

With the significant increase in smartphones as a means of communication between individuals connected by an intimate relationship, we see an increase in domestic and intimate violence carried out by this medium. The growing research on this subject has led to many scientific concepts all aimed at defining this phenomenon. However, these constructs tend to …

Personality and online deviance: The role of reinforcement sensitivity theory in cybercrime

In the last decade, many studies have tried to understand and explain the motivations behind the commission of cybercrimes. However, to date, no study has sought to explain the effect of personality on individual differences in the very motivations for engaging in cybercrime. For this reason, researchers Palmieri, Shortland, and McGarry (2021) decided to focus …

AI and cybercrime

Although new technologies hold unlimited potential, their damaging effects are often minimized or even ignored. In recent years, the emergence and growing development of artificial intelligence (AI) and its applications are increasingly visible in our daily lives. From a criminological point of view, artificial intelligence can be used in all tasks that require classification and …

A Cybersecurity Overview of the Canadian Health Sector

This research report written by Louis Melançon for Serene-risc in August 2020, provides a cybersecurity overview of the Canadian health sector. It looks at the latest statistics concerning the cybersecurity practices of Canadian health businesses. This report also presents each of the five major cyber threats to healthcare and examines the recommended security safeguards and measures. Finally, it covers …

Personalizing Nudges for better decision-making

Nudging has proven itself in various areas such as health, education, finance, security and privacy. Nudging argues that to facilitate decision-making, it is better to make the process easy, more attractive, and socially desirable rather than relying on the establishment of strict policies, prohibitions or even sanctions. Nudging can take several forms, such as labelling …

Sharing is Caring: A collaborative framework for sharing security alerts

A threat detection system that aims to be collaborative and active cannot function without adequate communication between the actors involved. In particular, an exchange of information about responses to security incidents allows better identification and prevention of future incidents while enabling them to be isolated faster. On the other hand, the main problem that seems …

Interplay and psychopathological risk of nomophobia and cyber-bullying

The increase in daily and excessive use of cell phones in the past decade has contributed significantly to the rise in nomophobia. Nomophobia is an indicator of the anxiety experienced by smartphone users (or any technology connected to the Internet) when they face the inability to use these devices. For its part, cyber-bullying consists of …