Cyber Security Responsibilization: an evaluation of the intervention approaches adopted by the Five Eyes Countries and China
- Authors: Renaud, Karen , Orgeron, Craig , Warkentin, Merrill , French, P Edward
- Date: 2020
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/149806 , vital:38885 , https://0-doi.org.wam.seals.ac.za/10.1111/puar.13210
- Description: Governments can intervene to a greater or lesser extent in managing the risks that citizens face. They can adopt a maximal intervention approach (e .g. COVID‐19) or a hands‐off approach (e .g ., unemployment) , effectively “responsibilizing” their citizens. To manage the cyber risk, governments publish cyber‐related policies. This article examines the intervention stances the governments adopt in supporting individual citizens managing their personal cyber risk. The authors pinpoint the cyber‐related responsibilities that several governments espouse, applying a “responsibilization” analysis. Those applying to citizens are identified, thereby revealing the governments' cyber‐related intervention stance. The analysis reveals that most governments adopt a minimal cyber‐related intervention stance in supporting their citizens. Given the increasing number of successful cyber attacks on individuals, it seems time for the consequences of this stance to be acknowledged and reconsidered. The authors argue that governments should support individual citizens more effectively in dealing with cyber threats.
- Full Text:
- Date Issued: 2020
PRECEPT: a framework for ethical digital forensics investigations
- Authors: Ferguson, R I , Renaud, Karen , Wilford, Sara , Irons, Alastair
- Date: 2020
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/149884 , vital:38909 , https://doi.org/10.1108/JIC-05-2019-00979
- Description: This paper argues the need for a practical, ethically grounded approach to digital forensic investigations, one that acknowledges and respects the privacy rights of individuals and the intellectual capital disclosure rights of organizations, as well as acknowledging the needs of law enforcement. The paper derives a set of ethical guidelines, and then maps these onto a forensics investigation framework. The framework to expert review in two stages is subjected, refining the framework after each stage. The paper concludes by proposing the refined ethically grounded digital forensics investigation framework. The treatise is primarily UK based, but the concepts presented here have international relevance and applicability.
- Full Text:
- Date Issued: 2020
The privacy paradox applies to IoT devices too: a Saudi Arabian study
- Authors: Aleisa, Noura , Renaud, Karen , Bongiovanni, Ivano
- Date: 2020
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/150252 , vital:38953 , https://doi.org/10.1016/j.cose.2020.101897
- Description: The “privacy paradox” is the term used to describe the disconnect between self-reported privacy value attributions and actions actually taken to protect and preserve personal privacy. This phenomenon has been investigated in a number of domains and we extend the body of research with an investigation in the IoT domain. We presented participants with evidence of a specific IoT device’s (smart plug) privacy violations and then measured changes in privacy concerns and trust, as well as uptake of a range of behavioural responses. Our Saudi Arabian participants, despite expressing high levels of privacy concerns, generally chose not to respond to this evidence with preventative action.
- Full Text:
- Date Issued: 2020
The Privacy Paradox applies to IoT devices too: a Saudi Arabian study
- Authors: Aleisa, Noura , Renaud, Karen , Bongiovanni, Ivano
- Date: 2020
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/158350 , vital:40176 , https://doi.org/10.1016/j.cose.2020.101897
- Description: The “privacy paradox” is the term used to describe the disconnect between self-reported privacy value attributions and actions actually taken to protect and preserve personal privacy. This phenomenon has been investigated in a number of domains and we extend the body of research with an investigation in the IoT domain. We presented participants with evidence of a specific IoT device’s (smart plug) privacy violations and then measured changes in privacy concerns and trust, as well as uptake of a range of behavioural responses.
- Full Text:
- Date Issued: 2020