Abstract
The fields of Cyber Security and Privacy are among the fastest growing areas in technological development. With the increasing digitisation of key utilities and infrastructures, and the continuing exponential growth in the use of networked information and communications technologies (NICT) comes a concomitant growth in the need for security and privacy. While there are significant opportunities for profitable activity in these domains; the processes of innovation and garnering the requisite critical mass of users for a given system are fraught with difficulties some of which are unique to cyber security and privacy.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Castells, M.: The Rise of the Network Society. Blackwell Publishers Inc., Oxford (2000)
Van Dijk, J.: The Network Society: Social Aspects of New Media. Sage Publications Ltd., London (2005)
Castells, M.: End of the Millennium, p. 370. Blackwell Publishers Inc., Oxford (1998)
Whelan, E., Teigland, R.: Managing information overload: examining the role of the human filter (2010). SSRN 1718455
Sintef Big Data, for better or worse: 90 % of world’s data generated over last two years. Science Daily (2013)
Europol. https://www.europol.europa.eu/ec/cybercrime-growing
IPACSO Innovation Framework for ICT Security Deliverable D2.2, Market and Regulatory Environment & Industry Analysis Report (2014)
IPACSO Innovation Framework for ICT Security Deliverable D2.3 PACS Technology and Research Spectrum Report (2014)
Jentzsch, N.: IPACSO Innovation Framework for ICT Security Deliverable D4.1 State-of-the-art of the Economics of Cyber security and Privacy (2014)
Kearney, P., Dooly, Z. (eds.): NIS Platform Working Group 3 (WG3) Business Cases and Innovation Paths (2014)
Castells, M.: The Rise of the Network Society. Blackwell Publishers Inc., Oxford (2000)
Yar, M.: Cybercrime and Society. Sage Publications Ltd., London (2006)
Steinmetz, K., Gerber, J.: It doesn’t have to be this way: hacker perspectives on privacy. Soc. Justice 41(3), 29–51 (2015)
Mann, I.: Hacking the Human: Social Engineering Techniques and Security Countermeasures. Ashgate Publishing, Aldershot (2008)
Sauter, M.: LOIC will tear us apart : the impact of tool design and media portrayals in the success of activist DDOS Attacks. Am. Behav. Sci. 57(7), 983–1007 (2013)
Fox-Brewster, T.: ‘State sponsored’ Russian hacker group linked to cyber attacks on neighbours. The Guardian London (2014)
Stone, J.: China-Backed Hacking Group Axiom Said to Have Attacked 43,000 Computers. International Business Times USA (2014)
Murphy, M.: War in the fifth domain. Economist (2010). http://www.economist.com/node/16478792
Fyffe, G.: Addressing the insider threat. Netw. Secur. 3, 11–14 (2008)
Colwill, C.: Human factors in information security: the insider threat – who can you trust these days? Inf. Secur. Tech. Rep. 14(4), 186–196 (2009)
IPACSO D2.2, Market and Regulatory Environment & Industry Analysis Report (2014)
Jentzcsh, N.: IPACSO Innovation Framework for ICT Security Deliverable D4.1. Market and Regulatory Environment & Industry Analysis Report (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Doyle, K., Dooly, Z., Kearney, P. (2015). What’s so Unique about Cyber Security?. In: Cleary, F., Felici, M. (eds) Cyber Security and Privacy. CSP 2015. Communications in Computer and Information Science, vol 530. Springer, Cham. https://doi.org/10.1007/978-3-319-25360-2_11
Download citation
DOI: https://doi.org/10.1007/978-3-319-25360-2_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-25359-6
Online ISBN: 978-3-319-25360-2
eBook Packages: Computer ScienceComputer Science (R0)