Why Cyber Security is a Socio-Technical Challenge: New Concepts and Practical Measures to Enhance Detection

Mils Hills (Editor)
Northampton Business School, University of Northampton, UK

Series: Computer Science, Technology and Applications
BISAC: COM053000

Clear

$160.00

Volume 10

Issue 1

Volume 2

Volume 3

Special issue: Resilience in breaking the cycle of children’s environmental health disparities
Edited by I Leslie Rubin, Robert J Geller, Abby Mutic, Benjamin A Gitterman, Nathan Mutic, Wayne Garfinkel, Claire D Coles, Kurt Martinuzzi, and Joav Merrick

eBook

Digitally watermarked, DRM-free.
Immediate eBook download after purchase.

Product price
Additional options total:
Order total:

Quantity:

Details

This book is a provocative manifesto of disruptive thinking about cyber security. It presents cutting-edge thinking and professional reflection and is designed to be a source of ideas and approaches that can be adopted for application in the real world by those who recognize that conventional ways of defining and considering cyber-attack are insufficient.

All of the authors believe that the term “cyber” must be urgently wrestled back from the technologists, cyber security professionals, consultancies and corporate silos that have hijacked it (seemingly without any resistance) and rendered the term essentially meaningless. The authors write from applied and often unique experiences in a range of commercial, consulting, state and defense environments.
Many of the authors of this volume have direct experience of inflicting, reporting on and protecting organizations from such effects, and also have knowledge of taking the challenge to additional levels. Most consultancies, academics and “experts” don’t live in the real world, are content with operating in the commoditized world of cyber-technical security and don’t have the intellectual capacity to understand, engage with or monetize this more challenging reality. This book is intended to help organizations improve preparedness for the established cyber world reality. (Imprint: Nova)

Preface

Author Biographies

Chapter 1. We’re Doomed! – And Your Problem Is? How I Learned to Stop Worrying and Love Cyber Insecurity
Keith Scott (De Montfort University, Leicester, UK)

Chapter 2. An Information Operations Perspective on Cyber-Security
John Ardis (Information Operations Consultant)

Chapter 3. Sensitising the Legal Industry to the Need for Robust, Risk-Conscious Organisational Behaviour
David Wood (IT Director for FDR Law LLP)

Chapter 4. 7 Maxims for an Information Security Age
Graham Palmer, MSc (Information Security, CISSP, ISSMP, MBCS)

Chapter 5. The Geek Shall Not Inherit the Earth: Why Senior Management Teams Already have the Answers to Effective Security in our Cyber World
Clint Barker, MBA (University of Northampton, UK)

Chapter 6. Towards Cyber-Resilient & Sustainable SMES: The Case Study of Added Value from a Large IT Re-Seller
Mils Hills and Louise Atkinson (Associate Professor in Risk, Resilience & Corporate Security / Research Fellow, Northampton Business School, University of Northampton, UK)

Chapter 7. Socio-Technical Gambits that Destroy Cyber Security & Organisational Resilience
Mils Hills (Associate Professor in Risk, Resilience & Corporate Security, Northampton Business School, University of Northampton, UK)

Chapter 8. Persuasion in the Microblog: Understanding and Identifying Persuasive Intent in Terse Text
Stefanie Hills, Thomas Jackson and Martin Sykora (Loughborough University, UK)

Chapter 9. Exercising Your Cyber Resilience Plan
Nick Simms (Director, Cornwood Risk Management, UK)

Chapter 10. Informing Business Strategists about the Cyber Threat: Why Not Play Serious Games?
Paul Théron (Thales Group)

Chapter 11. Swimming to the Strategic Vision: Lessons from Triumphing Over Adversity to Managing Cyber Crises
Guy Batchelor (Founder, MinervaElite Consulting, UK)

Chapter 12. Redefining Network Intrusions as Threat Systems: Towards a Socio Technical Approach to Threat Analysis
Stewart K. Bertram (School of International Relations - University of St Andrews, Scotland)

Chapter 13. A ‘Next Gen’ Approach to Cyber Attack Detection, Prevention and Response
Arun Warikoo (Founder, CyPro)

Index

You have not viewed any product yet.