Skip to main content

What’s so Unique about Cyber Security?

  • Conference paper
  • First Online:
  • 894 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 530))

Abstract

The fields of Cyber Security and Privacy are among the fastest growing areas in technological development. With the increasing digitisation of key utilities and infrastructures, and the continuing exponential growth in the use of networked information and communications technologies (NICT) comes a concomitant growth in the need for security and privacy. While there are significant opportunities for profitable activity in these domains; the processes of innovation and garnering the requisite critical mass of users for a given system are fraught with difficulties some of which are unique to cyber security and privacy.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Castells, M.: The Rise of the Network Society. Blackwell Publishers Inc., Oxford (2000)

    Google Scholar 

  2. Van Dijk, J.: The Network Society: Social Aspects of New Media. Sage Publications Ltd., London (2005)

    Google Scholar 

  3. Castells, M.: End of the Millennium, p. 370. Blackwell Publishers Inc., Oxford (1998)

    Google Scholar 

  4. Whelan, E., Teigland, R.: Managing information overload: examining the role of the human filter (2010). SSRN 1718455

    Google Scholar 

  5. Sintef Big Data, for better or worse: 90 % of world’s data generated over last two years. Science Daily (2013)

    Google Scholar 

  6. Europol. https://www.europol.europa.eu/ec/cybercrime-growing

  7. IPACSO Innovation Framework for ICT Security Deliverable D2.2, Market and Regulatory Environment & Industry Analysis Report (2014)

    Google Scholar 

  8. IPACSO Innovation Framework for ICT Security Deliverable D2.3 PACS Technology and Research Spectrum Report (2014)

    Google Scholar 

  9. Jentzsch, N.: IPACSO Innovation Framework for ICT Security Deliverable D4.1 State-of-the-art of the Economics of Cyber security and Privacy (2014)

    Google Scholar 

  10. Kearney, P., Dooly, Z. (eds.): NIS Platform Working Group 3 (WG3) Business Cases and Innovation Paths (2014)

    Google Scholar 

  11. Castells, M.: The Rise of the Network Society. Blackwell Publishers Inc., Oxford (2000)

    Google Scholar 

  12. Yar, M.: Cybercrime and Society. Sage Publications Ltd., London (2006)

    Google Scholar 

  13. Steinmetz, K., Gerber, J.: It doesn’t have to be this way: hacker perspectives on privacy. Soc. Justice 41(3), 29–51 (2015)

    Google Scholar 

  14. Mann, I.: Hacking the Human: Social Engineering Techniques and Security Countermeasures. Ashgate Publishing, Aldershot (2008)

    Google Scholar 

  15. Sauter, M.: LOIC will tear us apart : the impact of tool design and media portrayals in the success of activist DDOS Attacks. Am. Behav. Sci. 57(7), 983–1007 (2013)

    Article  Google Scholar 

  16. Fox-Brewster, T.: ‘State sponsored’ Russian hacker group linked to cyber attacks on neighbours. The Guardian London (2014)

    Google Scholar 

  17. Stone, J.: China-Backed Hacking Group Axiom Said to Have Attacked 43,000 Computers. International Business Times USA (2014)

    Google Scholar 

  18. Murphy, M.: War in the fifth domain. Economist (2010). http://www.economist.com/node/16478792

  19. Fyffe, G.: Addressing the insider threat. Netw. Secur. 3, 11–14 (2008)

    Article  Google Scholar 

  20. Colwill, C.: Human factors in information security: the insider threat – who can you trust these days? Inf. Secur. Tech. Rep. 14(4), 186–196 (2009)

    Article  Google Scholar 

  21. IPACSO D2.2, Market and Regulatory Environment & Industry Analysis Report (2014)

    Google Scholar 

  22. Jentzcsh, N.: IPACSO Innovation Framework for ICT Security Deliverable D4.1. Market and Regulatory Environment & Industry Analysis Report (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kenny Doyle .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Doyle, K., Dooly, Z., Kearney, P. (2015). What’s so Unique about Cyber Security?. In: Cleary, F., Felici, M. (eds) Cyber Security and Privacy. CSP 2015. Communications in Computer and Information Science, vol 530. Springer, Cham. https://doi.org/10.1007/978-3-319-25360-2_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-25360-2_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-25359-6

  • Online ISBN: 978-3-319-25360-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics