The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Social Research Methods in Cybersecurity: From Criminology to Industrial Cybersecurity
Abstract
The application of social research methods in cybersecurity requires a multidisciplinary combination since the security of technologies and communication networks is made up of a set of uses, techniques, and results directly conditioned by the parameters of confidentiality, data availability, integrity, and privacy. However, each of these technological concepts is prepared and subject to conditions of use that involve ethical, sociological, economic, and legal aspects. Firstly, social engineering techniques in cybercrime tend to combine social investigation techniques with computational engineering and telecommunications elements. Secondly, research on cybersecurity phenomena in industrial environments implies the adaptation to the organizational specificity of each sector. In this chapter, the social research topics commonly addressed by leading companies and researchers in cybersecurity at a global level are analyzed from a comparative point of view, extracting a taxonomy of social research on cybersecurity.
Related Content
Tutita M. Casa, Fabiana Cardetti, Madelyn W. Colonnese.
© 2024.
14 pages.
|
R. Alex Smith, Madeline Day Price, Tessa L. Arsenault, Sarah R. Powell, Erin Smith, Michael Hebert.
© 2024.
19 pages.
|
Marta T. Magiera, Mohammad Al-younes.
© 2024.
27 pages.
|
Christopher Dennis Nazelli, S. Asli Özgün-Koca, Deborah Zopf.
© 2024.
31 pages.
|
Ethan P. Smith.
© 2024.
22 pages.
|
James P. Bywater, Sarah Lilly, Jennifer L. Chiu.
© 2024.
20 pages.
|
Ian Jones, Jodie Hunter.
© 2024.
20 pages.
|
|
|