CyberSecPsych

Bring psychology topics to light as they relate to the Dark Web

  • Home
  • About
  • Contact
  • Facebook
  • Twitter
  • LinkedIn
  • Instagram
  • The Psychological Underpinnings of Cyber Burnout

    The Psychological Underpinnings of Cyber Burnout

      A way of regarding, understanding, or interpreting something; a mental impression Our perceptions shape the way we approach each and every obstacle and opportunity that comes our way.  Two people can perceive circumstances in a completely different way, wherein one individual becomes energized and the other, overwhelmed and defeated by the task at hand. …

    danielleakingsbury

    August 20, 2019
    Cyberpsychology, Cybersecurity Culture, Uncategorized
    awareness training, burnout, cyber burnout, cyber security awareness, information security
  • State of Trust

    State of Trust

    Trust: a positive expectation that another will not—through words, actions, or decisions—act opportunistically. ACT OPPORTUNISTICALLY: “The risk involved in situations of trust derives from uncertainty regarding the future actions of others. Trust is warranted when an agent expects the benefit from making him/herself vulnerable to another agent (whose behavior is not under his/her control) to…

    danielleakingsbury

    July 10, 2018
    Cybersecurity Culture
  • Using Values to Transform the Global Culture of Security

    Using Values to Transform the Global Culture of Security

    Businesses around the globe have transitioned to digitally-focused operating models and in today’s age, data is now our most valuable business asset.  According to the CapGemini EMC Big Data report, 63% of the respondents considered that the monetization of the data could eventually become as valuable to their organizations as their existing products and services…

    danielleakingsbury

    February 19, 2018
    Uncategorized
  • Cyber Elicitation

    Cyber Elicitation

    Elicitation has been a topic of increased interest lately, both from the perspective of cyber espionage as well as in our normal, day to day lives.  The digital age provides endless arrays of access points to our personal and sensitive information, and with our minds being pulled into so many directions, we don’t always take…

    danielleakingsbury

    December 7, 2017
    Uncategorized
  • Decoding a Cyber Criminal (Part 2)

    Decoding a Cyber Criminal (Part 2)

    EXTERNAL ENVIRONMENTAL FACTORS  In the second part of our discussion where we decode the various aspects that influence an individual’s path towards becoming a cybercriminal, external environmental factors as they pertain to the family and social institutions are analyzed.  As we have come into the digital age, not much research has been done specifically on…

    danielleakingsbury

    October 17, 2017
    Uncategorized
  • Decoding a Cyber Criminal (Part 1)

    Decoding a Cyber Criminal (Part 1)

    BIOLOGICAL FACTORS  Biological factors are those which effect the behavior and function of a living organism.  These factors are either inherited, or caused by an event in the organisms life and can be physical, psychological, chemical, neurological, or genetic.  Biological factors are a primary driver of activity. As seen in the psycho-social map above, there…

    danielleakingsbury

    September 27, 2017
    Uncategorized
  • Ethical Hacker Psychology

    Ethical Hacker Psychology

    Ever wondered about hacker psychology?  How do they work?  What makes them tick?  After attending DEF CON for the first time this past year, this was something I wanted to explore further. Wesley McGrew, Director of Cyber Operations for HORNE Cyber Solutions, has graciously given us a peak into the life of an ethical hacker.…

    danielleakingsbury

    August 29, 2017
    Uncategorized
  • Dualistic Model of Passion: Hindering Cyber Burnout (Self-assessment included)

    Dualistic Model of Passion: Hindering Cyber Burnout (Self-assessment included)

    “They should study with their passion.  The way you have a great career in technology, is you do what you’re passionate about.  There is so much demand, there are so many opportunities, there are so many options.  Don’t study the thing they tell you to, study what stimulates your passions.  That’s where you will be…

    danielleakingsbury

    August 21, 2017
    Uncategorized
  • Motivation and Self-Determination: Intrinsic Cyber Security

    Motivation and Self-Determination: Intrinsic Cyber Security

    Self-Determination Theory The Self-Determination Theory (SDT) is a major theory of human motivation and personality that is concerned with supporting our natural or intrinsic tendencies to behave in effective and healthy way.  It posits that the degree of self-determination in relation to one’s behavior is of immense importance for one’s performance and satisfaction. SDT differentiates three types…

    danielleakingsbury

    August 14, 2017
    Uncategorized
  • Model of the Teaching-Learning Process in a Cyber Security Context

    Model of the Teaching-Learning Process in a Cyber Security Context

    We sent them to security training.  Why are they still clicking? Sole reliance on security training programs have little proven effect of long-term modification on end-user behavior.  Experian and Ponemon Institute’s 2016 “Managing Insider Risk through Training & Culture” report explains that only half of survey respondents felt like their company’s data protection and privacy…

    danielleakingsbury

    July 18, 2017
    Uncategorized
1 2
Next Page

Create a website or blog at WordPress.com

 

Loading Comments...
 

    • Follow Following
      • CyberSecPsych
      • Join 58 other followers
      • Already have a WordPress.com account? Log in now.
      • CyberSecPsych
      • Edit Site
      • Follow Following
      • Sign up
      • Log in
      • Report this content
      • View site in Reader
      • Manage subscriptions
      • Collapse this bar