Pub Date : 2023-07-01DOI: 10.12968/s1361-3723(23)70029-8
J. Cullen
Digital identity technology has a lot to offer, both in improving security and enabling more-effective and efficient services. So why is there so much reluctance to adopt the technology, both from organisations and users?
{"title":"Busting the biggest myths about digital identities","authors":"J. Cullen","doi":"10.12968/s1361-3723(23)70029-8","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70029-8","url":null,"abstract":"Digital identity technology has a lot to offer, both in improving security and enabling more-effective and efficient services. So why is there so much reluctance to adopt the technology, both from organisations and users?","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"8 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75356725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-01DOI: 10.12968/s1361-3723(23)70034-1
Chris Vaughan
Is our understanding of risk keeping pace with the evolution of technology, major changes to IT infrastructure and the ever-changing threat landscape? Organisations are having to change their approaches to risk, otherwise they are in danger of facing an existential thread from the gap between their understanding of the issues they face and the reality.
{"title":"Information risk management – the gaps between expectation and reality","authors":"Chris Vaughan","doi":"10.12968/s1361-3723(23)70034-1","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70034-1","url":null,"abstract":"Is our understanding of risk keeping pace with the evolution of technology, major changes to IT infrastructure and the ever-changing threat landscape? Organisations are having to change their approaches to risk, otherwise they are in danger of facing an existential thread from the gap between their understanding of the issues they face and the reality.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87077127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-01DOI: 10.12968/s1361-3723(23)70027-4
Steve Mansfield-Devine
The threat landscape is growing, attacks are becoming more frequent and more sophisticated and security budgets are being squeezed. Is information security becoming just too difficult for some organisations? In this interview, Srinivas Mukkamala, chief product officer at Ivanti, explains that there are ways to overcome these challenges.
{"title":"Is cyber security too hard?","authors":"Steve Mansfield-Devine","doi":"10.12968/s1361-3723(23)70027-4","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70027-4","url":null,"abstract":"The threat landscape is growing, attacks are becoming more frequent and more sophisticated and security budgets are being squeezed. Is information security becoming just too difficult for some organisations? In this interview, Srinivas Mukkamala, chief product officer at Ivanti, explains that there are ways to overcome these challenges.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"41 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77357141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-01DOI: 10.12968/s1361-3723(23)70024-9
Akber Datoo, Simon Maharaj
Clarity around the legal status of digital objects is crucial of digital assets, such as crypto currency, are to be seen as mature enough to be taken seriously by financial markets. Changes to the law in England and Wales could help with that.
{"title":"Changing the law to deliver crypto asset certainty","authors":"Akber Datoo, Simon Maharaj","doi":"10.12968/s1361-3723(23)70024-9","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70024-9","url":null,"abstract":"Clarity around the legal status of digital objects is crucial of digital assets, such as crypto currency, are to be seen as mature enough to be taken seriously by financial markets. Changes to the law in England and Wales could help with that.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"24 2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82684135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-01DOI: 10.12968/s1361-3723(23)70026-2
Matias Madou
It's unlikely you will ever reach a stage of complete ‘security maturity’. Even as your systems, processes and skills improve, the goal posts are being shifted by innovative attackers and fresh vulnerabilities. But that's not a reason to give up on security maturity – shooting for that goal will still leave you better off.
{"title":"Security maturity is a journey, not a destination","authors":"Matias Madou","doi":"10.12968/s1361-3723(23)70026-2","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70026-2","url":null,"abstract":"It's unlikely you will ever reach a stage of complete ‘security maturity’. Even as your systems, processes and skills improve, the goal posts are being shifted by innovative attackers and fresh vulnerabilities. But that's not a reason to give up on security maturity – shooting for that goal will still leave you better off.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"24 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82727761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-01DOI: 10.12968/s1361-3723(23)70025-0
Niklas J. Hellemann
All organisations are under cyber attack and many are breached each day. And given that there's a high likelihood that you will suffer a cyber incident, the question then becomes what do you do about it? Communication – to staff, investors and the public – is a critical step and a high level of transparency here is key to enabling everyone to respond appropriately and effectively.
{"title":"Normalising radical transparency in cyber security","authors":"Niklas J. Hellemann","doi":"10.12968/s1361-3723(23)70025-0","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70025-0","url":null,"abstract":"All organisations are under cyber attack and many are breached each day. And given that there's a high likelihood that you will suffer a cyber incident, the question then becomes what do you do about it? Communication – to staff, investors and the public – is a critical step and a high level of transparency here is key to enabling everyone to respond appropriately and effectively.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81387924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-01DOI: 10.12968/s1361-3723(23)70023-7
Bernard Montel
3 Looking Back to the Future: A Recursive Retrospective WILLIAM E. DOLL JR University of Victoria I, now a newly minted Canadian resident, am indebted both to Deborah Osberg and the Canadian Association for Curriculum Studies for honoring me with a retrospective on my work in the curriculum studies field. This is not something I ever expected, especially back in the 1980s when I began searching for a new curriculum model to the one then prominent, the Tyler Rationale (1950). At the time I was much engaged in reading Jean Piaget, and while I had great difficulty with the usual American interpretation of his work – “ages and stages” – I did feel his biological sense of cognition (Biology and Knowledge, 1971) and his actual work in the fields of biology and zoology provided a framework the Rationale did not consider. This framework, that of an organism’s inherent self‐organizing powers,1 became clearer to me as I was introduced to Ilya Prigogine and his work on becoming. As I noted in my 1986 article, reprinted in this volume, I found a strong connection between Piaget and Prigogine and bringing this connection to the fore, with the paradigm in which it is encased, could “stand as an alternative
{"title":"Looking back to the future","authors":"Bernard Montel","doi":"10.12968/s1361-3723(23)70023-7","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70023-7","url":null,"abstract":"3 Looking Back to the Future: A Recursive Retrospective WILLIAM E. DOLL JR University of Victoria I, now a newly minted Canadian resident, am indebted both to Deborah Osberg and the Canadian Association for Curriculum Studies for honoring me with a retrospective on my work in the curriculum studies field. This is not something I ever expected, especially back in the 1980s when I began searching for a new curriculum model to the one then prominent, the Tyler Rationale (1950). At the time I was much engaged in reading Jean Piaget, and while I had great difficulty with the usual American interpretation of his work – “ages and stages” – I did feel his biological sense of cognition (Biology and Knowledge, 1971) and his actual work in the fields of biology and zoology provided a framework the Rationale did not consider. This framework, that of an organism’s inherent self‐organizing powers,1 became clearer to me as I was introduced to Ilya Prigogine and his work on becoming. As I noted in my 1986 article, reprinted in this volume, I found a strong connection between Piaget and Prigogine and bringing this connection to the fore, with the paradigm in which it is encased, could “stand as an alternative","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"24 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91103760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-01DOI: 10.12968/s1361-3723(23)70020-1
Chris Dimitriadis
When your networks are breached, you may lose more than your data. Customers are increasingly wary of doing business with organisations that have been hacked. The reputational damage can last a long time – perhaps longer than the business itself.
{"title":"Consumer trust and perspectives on cyber security","authors":"Chris Dimitriadis","doi":"10.12968/s1361-3723(23)70020-1","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70020-1","url":null,"abstract":"When your networks are breached, you may lose more than your data. Customers are increasingly wary of doing business with organisations that have been hacked. The reputational damage can last a long time – perhaps longer than the business itself.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82848123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-01DOI: 10.12968/s1361-3723(23)70022-5
Fabien Rech
There's often a gap between security threats as understood by the C-suite and the day-to-day threats faced by security professionals. This can condemn the latter to working with outdated and inadequate solutions. Executives need to understand that cyber security is an area crying out for investment.
{"title":"Don't turn a blind eye to cyber security","authors":"Fabien Rech","doi":"10.12968/s1361-3723(23)70022-5","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70022-5","url":null,"abstract":"There's often a gap between security threats as understood by the C-suite and the day-to-day threats faced by security professionals. This can condemn the latter to working with outdated and inadequate solutions. Executives need to understand that cyber security is an area crying out for investment.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"2012 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74217035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}