Issues related to cybersecurity affect everyone. Indeed, no matter our age or where we live, in 2020, we are using technology every day. At work, at home, at school or to communicate with others, we always have either a cell phone, a laptop, or a tablet near us. The increase in popularity of these technologies …
New technologies have altered the way people interact with each other. Colleagues, friends, family and romantic encounters are increasingly happening through social media. Global availability and accessibility make it possible to chat anytime, regardless of the time zone. This allows several individuals to meet or keep in touch with romantic or sexual partners despite the …
The rise in popularity of social networks and its convenience for social interactions also bring several disadvantages. Indeed, young adolescents grow up with these technologies in their hands. At the same time, the number of cases of cyberbullying is increasing as technologies gain ground among these young people. The issues of bullying at school or …
The protection of personal information is a hot topic in the media. Numerous cases of data theft or malicious use have made headlines, and the public is becoming more worried about it. However, what about issues where the individual offers his personal information’s himself unconsciously, without realizing the risks involved? Technology and its multiple services …
The omnipresence of technology and its globalization has changed not only the way we act and interact with each other but also the way we commit crimes. Indeed, the global accessibility of the internet, offers numerous opportunities for committing a criminal offense. This article focuses on cybercrime such as child pornography, fraud or computer hacking. …
Individuals own more and more online accounts to perform various tasks in their daily life. As such, users have been increasing their usage of passwords to access those online accounts. Because of the difficulties in remembering multiple passwords, users often employ risky password behaviours such as password reuse, writing passwords down, choosing weak passwords, and …
We all have questions, but who are the people with the answers for Cybersecurity. In this series we sat down with academics and experts to ask them about how they got started, what they are researching now, their lessons for us and the future. In this third episode of our series, Deborah Hurley addresses crucial …
La cyber violence dans les relations amoureuses (CVRA) (Cyber Dating Violence (CDV)) est l’abus psychologique et / ou la commission d’acte de violence entre partenaires amoureux via l’utilisation de la technologie (téléphones mobiles, SMS, messagerie instantanée, sites de réseaux sociaux, e-mails, etc.). La CVRA comprend des comportements tels que les menaces, l’humiliation, la distribution non …
Cyber Dating Violence (CDV) is the psychological abuse and/or perpetration of violent act among dating partners via the use of technology (mobile phones, texting, instant messenger, social networking sites, email, etc.). CDV includes behaviours such as threats, humiliation, non-consensual distribution of personal information or images, sexual pressure, checking up on a partner’s whereabouts, monitoring a …
As individuals are increasingly reliant on online communication in everyday life, understanding the mechanisms underlying online information processing is essential, especially in the context of one’s trying to persuade its interlocutors. Online information processing is complex for several reasons. First, communication methods vary as they can be asynchronous (e.g. emails ) or synchronous (e.g. instant …