139 research outputs found

    Overcoming the security quagmire: behavioural science and modern technology hold the key to solving the complex issue of law firm cyber security

    Get PDF
    While all industries that handle valuable data have been subject to increasing levels of cyber attack, there is a set of inter-related factors in the law firm cyber security ecosystem that makes such firms more susceptible to attack and also serves to prevent them from taking action to counteract attack vulnerability. As a result of the inter-related external and internal factors affecting law firm cyber security, the human element of firm security infrastructure has been neglected, thereby making humans, at once law firms’ greatest asset, their main cyber security weakness. 1There has been some movement of late, and regulators and clients alike are right to demand law firms do more to improve their cyber security posture.2 However, much of the scrutiny to which their conduct has been subjected has tended to overlook the complexities of the law firm cyber security quagmire, and unless these issues are addressed in the context of a potential solution, meaningful change is not While all industries that handle valuable data have been subject to increasing levels of cyber attack, there is a set of inter-related factors in the law firm cyber security ecosystem that makes such firms more susceptible to attack and also serves to prevent them from taking action to counteract attack vulnerability. As a result of the inter-related external and internal factors affecting law firm cyber security, the human element of firm security infrastructure has been neglected, thereby making humans, at once law firms’ greatest asset, their main cyber security weakness. 1There has been some movement of late, and regulators and clients alike are right to demand law firms do more to improve their cyber security posture.2 However, much of the scrutiny to which their conduct has been subjected has tended to overlook the complexities of the law firm cyber security quagmire, and unless these issues are addressed in the context of a potential solution, meaningful change is not While all industries that handle valuable data have been subject to increasing levels of cyber attack, there is a set of inter-related factors in the law firm cyber security ecosystem that makes such firms more susceptible to attack and also serves to prevent them from taking action to counteract attack vulnerability. As a result of the inter-related external and internal factors affecting law firm cyber security, the human element of firm security infrastructure has been neglected, thereby making humans, at once law firms’ greatest asset, their main cyber security weakness. 1There has been some movement of late, and regulators and clients alike are right to demand law firms do more to improve their cyber security posture.2 However, much of the scrutiny to which their conduct has been subjected has tended to overlook the complexities of the law firm cyber security quagmire, and unless these issues are addressed in the context of a potential solution, meaningful change is not likely. Part 1 of this paper outlines the current threat landscape and details the integral role of human error in successful cyber breaches before turning to discuss recent cyber security incidents involving law firms. In Part 2, we analyse elements of law firm short-termism and the underregulation of law firm cyber security conduct and how these, when combined, play a key role in shaping law firm cyber security posture. Finally, in Part 3 we outline a realistic solution, incorporating principles from behavioural science and modern technological developments

    The Politicization of Art on the Internet: From net.art to post-internet art

    Get PDF
    Este estudo tem como objetivo apresentar uma breve perspetiva sobre as manifestações socioculturais que se propagaram a partir do surgimento da Web; tendo como principal foco de análise o desenvolvimento da produção de Internet Arte na Europa e na América do Norte ao longo dos últimos 30 anos. Estruturado como um estudo de caso, três conceitos-chave fundamentam a base desta pesquisa: uma breve história da Internet, o desenvolvimento do termo hacker e a produção de arte web-based; da net.art até a Arte Pós-Internet. Em abordagem cronológica, estes campos serão descritos e posteriormente utilizados como guias para um final encadeamento comparativo que visa sustentar a hipótese da gradual dissolução de um ciberespaço utópico até o distópico cenário corporativo que constitui a Internet dos dias atuais.This study aims to present a brief perspective of the sociocultural manifestations that emerged after the Web birth, focusing on the development of Internet Art and the countercultural movements that emerged inside Europe and North America over the last 30 years. Under a case study structure, three fundamental subjects will be firstly explained: Internet history, the development of hacker concept and the web-based Art transformations: from net.art till Post-Internet Art. Chronologically described, these fields will lead to a final comparison of chained events that aim to sustain the hypothesis of the gradual dissolution of the early cyberspace utopias till the dystopic scene existent in nowadays Internet

    Fashion? Hackers!

    Get PDF
    The philosophy of hacking has been inspired me ever since I read the autobiographical novel La’mant by Marguerite Duras in my childhood, which may seem to have no connections whatsoever with hacking in a technical sense. However, her way of writing and the story she portraits in her book was unusually beautiful and outrageous. I recognised the story as a hack of love. In this thesis, a comparison of the fashion phenomenon before and after the internet will be discussed for a better understanding of fashion discourse within the information age. On the one hand, fashion itself holds no subversive power, the commodification and incorporation of a subculture usually begin with the fashion style that represented the subculture got adopted by popular culture, subsequently, the whole content of the subculture is isolated from its original meaning. On the other hand, the internet has created a rip in fashion history by breaking the traditional local fashion autonomy and forcing it to adapt to a global platform, where more opportunities are generated, along with risks of losing the original cultural meaning and brand longevity. The practical goal of the thesis is to study the hacker subculture, therefore extract its style, philosophy, and methodology to inspire an innovative way of thinking and doing fashion design. I designed a fashion collection based on the hacker wardrobe items to express my admiration towards the hacker subculture. Code and math have been used on generating the prints, as well as designing the clothing construction. The pattern-making and tailoring process is partially computer-aided, reinforced a streamlined production process. Meanwhile, the spirit of hacking serves as the underlying philosophy of the design and production process. Ideologically, the thesis raised a question mark on the fashion industry which placed in a technological industrialised society context. The question mark may be the answer towards a new way of considering fashion either as a passion or as a career. More broadly, the hacking spirit may inspire a new way of life

    Online Privacy, Vulnerabilities, and Threats: A Manager’s Perspective

    Get PDF
    There are many potential threats that come with conducting business in an online environment. Management must find a way to neutralize or at least reduce these threats if the organization is going to maintain viability. This chapter is designed to give managers an understanding, as well as the vocabulary needed to have a working knowledge of online privacy, vulnerabilities, and threats. The chapter also highlights techniques that are commonly used to impede attacks and protect the privacy of the organization, its customers, and employees. With the advancements in computing technology, any and all conceivable steps should be taken to protect an organization’s data from outside and inside threats

    All Your Data Are Belong to Us: Consumer Data Breach Rights and Remedies in an Electronic Exchange Economy

    Get PDF
    Consumers navigating the United States\u27 modern electronic exchange economy are uniquely vulnerable to injury from data breaches. Hackers run data breach operations on an industrial scale, with a worldwide underground economy supporting the processing and exploitation of stolen information. Economic damages from data breaches exceed millions of dollars annually in direct and indirect costs for consumers and businesses alike. While existing common law, statutory law, and regulatory law offer consumers affected by a data breach some degree of protection, that protection is largely inadequate in the face of the threat posed by consumer data breaches. This Comment argues that consumers can be better protected from the harm caused by data breaches by importing principles from European data privacy law into American law

    Investigating the relevance of effectiveness of cybersecurity measures in the Philippine maritime industry

    Get PDF

    Sandspur, Vol 115, No 04, September 19, 2008

    Get PDF
    Rollins College student newspaper, written by the students and published at Rollins College. The Sandspur started as a literary journal.https://stars.library.ucf.edu/cfm-sandspur/2864/thumbnail.jp

    The Paradoxes of Free Software

    Get PDF
    This paper describes the legal structure of open source software and analyzes the likely issues to arise. A combination of copyright law and trademark law serves to permit the free distribution of open source software. The software is kept under copyright, but freely licensed under one of various open source licenses. The legal structure of open source is an elegant and robust use of intellectual property law that turns the customary use of intellectual property on its head, by using intellectual property laws, which normally are used to guard exclusive rights, to safeguard free access to and use of software. The paper further discusses how open source challenges economic and philosophical theories of intellectual property. Ironically, the open source movement, with its early roots in a decidedly socialist view of software, appears to vindicate a rather free-market view of intellectual property--that market mechanisms are more efficient in overcoming market failure than corrective legal measures. Philosophically, open sources may fit best with a natural rights/personality theory, especially where open source authors frequently give away all rights except their rights to attribution and to prevent distortion. The paper further explores how open source may affect patent litigation, (especially with respect to the profound prior art problems in software patents) and other aspects of regulation of software (ranging from fair use in copyright to enforcement of licensing terms to restrictions on use of certain algorithms, like encryption). The openness of the software can cut both ways with respect to all those subjects

    The Ebenezers, 1843-1859

    Get PDF
    Students of history are actively engaged in processes and meanings of memory, heritage and history. The differences between memory, heritage and history generate constructive conflict and inquiry about the past. Contextualization and corroboration of primary sources accesses the past. Contextualization and corroboration of inquiry primary sources, as with other primary sources, informs understandings about the past. Construction of a webpage using primary sources of memory, heritage, history, and contextualized and corroborated inquiry may provide one model for inquiry within memory, heritage, and history
    • …
    corecore