security ceremonies
Recently Published Documents


TOTAL DOCUMENTS

13
(FIVE YEARS 5)

H-INDEX

4
(FIVE YEARS 0)

2020 ◽  
Vol 21 (2) ◽  
pp. 291-307
Author(s):  
Giampaolo Bella

PurposeSecurity ceremonies still fail despite decades of efforts by researchers and practitioners. Attacks are often a cunning amalgam of exploits for technical systems and of forms of human behaviour. For example, this is the case with the recent news headline of a large-scale attack against Electrum Bitcoin wallets, which manages to spread a malicious update of the wallet app. The author therefore sets out to look at things through a different lens.Design/methodology/approachThe author makes the (metaphorical) hypothesis that humans arrived on Earth along with security ceremonies from a very far planet, the Cybersecurity planet. The author’s hypothesis continues, in that studying (by huge telescopes) the surface of Cybersecurity in combination with the logical projection on that surface of what happens on Earth is beneficial for us earthlings.FindingsThe author has spotted four cities so far on the remote planet. Democratic City features security ceremonies that allow humans to follow personal paths of practice and, for example, make errors or be driven by emotions. By contrast, security ceremonies in Dictatorial City compel to comply, hence humans here behave like programmed automata. Security ceremonies in Beautiful City are so beautiful that humans just love to follow them precisely. Invisible City has security ceremonies that are not perceivable, hence humans feel like they never encounter any. Incidentally, the words “democratic” and “dictatorial” are used without any political connotation.Originality/valueA key argument the author shall develop is that all cities but Democratic City address the human factor, albeit in different ways. In the light of these findings, the author will also discuss security ceremonies of our planet, such as WhatsApp Web login and flight boarding, and explore room for improving them based upon the current understanding of Cybersecurity.


2014 ◽  
Vol 14 (2) ◽  
pp. 103-121 ◽  
Author(s):  
Jean Everson Martina ◽  
Eduardo dos Santos ◽  
Marcelo Carlomagno Carlos ◽  
Geraint Price ◽  
Ricardo Felipe Custódio

Author(s):  
Taciane Martimiano ◽  
Jean Everson Martina ◽  
M. Maina Olembo ◽  
Marcelo Carlomagno Carlos
Keyword(s):  

Author(s):  
Marcelo Carlomagno Carlos ◽  
Jean Everson Martina ◽  
Geraint Price ◽  
Ricardo Felipe Custódio

Sign in / Sign up

Export Citation Format

Share Document