english

Exploring role of moral disengagement and counterproductive work behaviours in information security awareness

Security breaches in organizations have been on the rise in recent years. It is becoming increasingly necessary for organizations to investigate and research the causes of these flaws. A better understanding of the elements that cause security breaches can correct gaps in either knowledge, human resources and/or materials resources. Elements well-identified in previous studies, such …

A framework for effective corporate communication after cybersecurity incidents

Cybersecurity incidents can have various significant consequences on an organization or a company. These consequences can then lead to other adverse effects, such as damaging the company’s reputation and causing the loss of customers or business partners. The growing increase in reported cases of cyber incidents leads experts to want to act ahead by prioritizing …

Applying marketing principles to assess cybersecurity education training and awareness programs

Cybersecurity Management and prevention programs’ success and relevance depend primarily on improving employees’ security behaviours within an organization. Indeed, several existing programs make sure to apply those concepts, so employees have the proper tools and knowledge to intervene in a cybersecurity compromise situation within their organizations. Existing programs like education, training, and security awareness programs …

Faces of radicalism: Differentiating between violent and non-violent radicals

Radical groups and radicalized individuals are often confused as being all violent and at risk of committing acts of terrorism. Radicals are defined as individuals who support or justify terrorism, and sometimes they express a desire to engage in radical acts of violence. However, very few studies have focused on what differentiates violent radicals, who …

Taxonomy and definition of cyberterrorism

Like cybercrime, large-scale cyber-attacks are overgrowing and attracting attention from both media and government agencies mainly because these attacks are often linked to threats of cyberterrorism. A misconception is to take for granted that cyberterrorism is precisely the same phenomenon as terrorism and then uses the exact definition for both phenomena. Moreover, even the definition …

Topological Data Analysis for Ransomware Detection on the Bitcoin Blockchain

Presented by Cuneyt Akcora as a part of the 2020 Serene-risc Workshop on The State of Canadian Cybersecurity Conference: Human-Centric Cybersecurity. About the presentation Proliferation of cryptocurrencies (e.g., Bitcoin) that allow pseudo-anonymous transactions, has made it easier for ransomware developers to demand ransom by encrypting sensitive user data. The recently revealed strikes of ransomware attacks …