Category: Uncategorized
-
The Psychological Underpinnings of Cyber Burnout
A way of regarding, understanding, or interpreting something; a mental impression Our perceptions shape the way we approach each and every obstacle and opportunity that comes our way. Two people can perceive circumstances in a completely different way, wherein one individual becomes energized and the other, overwhelmed and defeated by the task at hand. …
-
Using Values to Transform the Global Culture of Security
Businesses around the globe have transitioned to digitally-focused operating models and in today’s age, data is now our most valuable business asset. According to the CapGemini EMC Big Data report, 63% of the respondents considered that the monetization of the data could eventually become as valuable to their organizations as their existing products and services…
-
Cyber Elicitation
Elicitation has been a topic of increased interest lately, both from the perspective of cyber espionage as well as in our normal, day to day lives. The digital age provides endless arrays of access points to our personal and sensitive information, and with our minds being pulled into so many directions, we don’t always take…
-
Decoding a Cyber Criminal (Part 2)
EXTERNAL ENVIRONMENTAL FACTORS In the second part of our discussion where we decode the various aspects that influence an individual’s path towards becoming a cybercriminal, external environmental factors as they pertain to the family and social institutions are analyzed. As we have come into the digital age, not much research has been done specifically on…
-
Decoding a Cyber Criminal (Part 1)
BIOLOGICAL FACTORS Biological factors are those which effect the behavior and function of a living organism. These factors are either inherited, or caused by an event in the organisms life and can be physical, psychological, chemical, neurological, or genetic. Biological factors are a primary driver of activity. As seen in the psycho-social map above, there…
-
Ethical Hacker Psychology
Ever wondered about hacker psychology? How do they work? What makes them tick? After attending DEF CON for the first time this past year, this was something I wanted to explore further. Wesley McGrew, Director of Cyber Operations for HORNE Cyber Solutions, has graciously given us a peak into the life of an ethical hacker.…
-
Dualistic Model of Passion: Hindering Cyber Burnout (Self-assessment included)
“They should study with their passion. The way you have a great career in technology, is you do what you’re passionate about. There is so much demand, there are so many opportunities, there are so many options. Don’t study the thing they tell you to, study what stimulates your passions. That’s where you will be…
-
Motivation and Self-Determination: Intrinsic Cyber Security
Self-Determination Theory The Self-Determination Theory (SDT) is a major theory of human motivation and personality that is concerned with supporting our natural or intrinsic tendencies to behave in effective and healthy way. It posits that the degree of self-determination in relation to one’s behavior is of immense importance for one’s performance and satisfaction. SDT differentiates three types…
-
Model of the Teaching-Learning Process in a Cyber Security Context
We sent them to security training. Why are they still clicking? Sole reliance on security training programs have little proven effect of long-term modification on end-user behavior. Experian and Ponemon Institute’s 2016 “Managing Insider Risk through Training & Culture” report explains that only half of survey respondents felt like their company’s data protection and privacy…
-
Mapping Cognitive Biases in Risk Assessment
Cognitive biases are mental processes that effect our ability to perceive a particular situation based on inputs that we have encountered in the past. They cause mistakes in reasoning, evaluation, or remembering of a situation, and effect a person’s decision-making. They can be organized into 4 categories: Biases that arise from too much information Biases…