Skip to main content

Introduction

  • Chapter
  • First Online:
  • 955 Accesses

Abstract

This chapter lays the foundation for the issues discussed in the book. We consider topical problems related to the paradigm shift in understanding our personal physical and digital rights as well as in rethinking business security and safety to fit the contemporary landscape of the global digital economy. We argue that in the current digital age, where rapid advances of technology reshape our understanding of secure and safe spaces, existing tools are no longer sufficient to safeguard personal data and commercial secrets. A new human-centered approach is necessary to successfully anticipate and address cybersecurity risks.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   29.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   37.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   37.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    See https://www.searchenginejournal.com/google-is-shutting-down-google-admits-low-consumer-adoption/273113/ for more detail.

References

  1. Edward Snowden Biography. Accessed September 2018. https://www.biography.com/people/edward-snowden-21262897.

  2. Greenwald, G. (2013, June 6). NSA collecting phone records of millions of Verizon customers daily. The Guardian. https://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order.

  3. Greenwald, G., MacAskill, E., & Poitras, L. (2013, June 11). Edward Snowden: The whistleblower behind the NSA surveillance revelations. The Guardian. https://www.theguardian.com/world/2013/jun/09/edward-snowden-nsa-whistleblower-surveillance.

  4. Franceschi-Bicchierai, L. (2014, June 5). The 10 biggest revelations from Edward Snowden’s leaks. MashablesUK. https://mashable.com/2014/06/05/edward-snowden-revelations/?europe=true#E9W_W2HdFPqV.

  5. Assange, J.,& Rusbridger, A. (2011, January). WikiLeaks: The Guardian’s role in the biggest leak in the history of the world. The Guardian. https://www.theguardian.com/media/2011/jan/28/wikileaks-julian-assange-alan-rusbridger.

  6. Chelsea Manning Biography. Accessed September 2018. https://www.biography.com/people/chelsea-manning-21299995.

  7. Ellison‚ S. (2011, February). The Man who spilled the secrets. Vanity Fair. https://www.vanityfair.com/news/2011/02/the-guardian-201102.

  8. Stempel, J., & Finkle, J. (2017, October ). Yahoo says all three billion accounts hacked in 2013 data theft. Reuters. https://www.reuters.com/article/us-yahoo-cyber/yahoo-says-all-three-billion-accounts-hacked-in-2013-data-theft-idUSKCN1C82O1.

  9. Perlroth, N. (2016, September). Yahoo says hackers stole data on 500 million users in 2014. New York Times. https://www.nytimes.com/2016/09/23/technology/yahoo-hackers.html.

  10. Evens, M. (2015, February). Hackers steal £650 million in world’s biggest bank raid. The Telegraph. https://www.telegraph.co.uk/news/uknews/crime/11414191/Hackers-steal-650-million-in-worlds-biggest-bank-raid.html.

  11. Palmer, D. (2018, May). WannaCry ransomware crisis, one year on: Are we ready for the next global cyber attack? zdnet. https://www.zdnet.com/article/wannacry-ransomware-crisis-one-year-on-are-we-ready-for-the-next-global-cyber-attack/.

  12. Ghena, B., Beyer, W., Hillaker, A., Pevarnek, J., & Halderman, J. A. (2014, August ) Green lights forever: Analyzing the security of traffic infrastructure. In Proceedings of the 8th USENIX Workshop on Offensive Technologies (WOOT’14).

    Google Scholar 

  13. Greenberg, A. (2015, July). Hackers remotely kill a jeep on the highway—With me in it. Wired. https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/.

  14. Perez, E. (2015, May 19). FBI: Hacker claimed to have taken over flight’s engine controls. CNN. https://edition.cnn.com/2015/05/17/us/fbi-hacker-flight-computer-systems/index.html.

  15. Valero, J. (2016, July). Hackers bombard aviation sector with over 1000 attacks per month. EuroActiv. https://www.euractiv.com/section/justice-home-affairs/news/hackers-bombard-aviation-sector-with-more-than-1000-attacks-per-month/.

  16. Jay J. (2018, May). Healthcare sector suffered more than half of all cyber-attacks in 2017. SC Media. https://www.scmagazineuk.com/healthcare-sector-suffered-half-cyber-attacks-2017/article/1472744.

  17. 2017 Cylance Threat Report. Accessed September 2018. https://pages.cylance.com/2018-03CylanceThreatReport2017.html.

  18. Hern, A. (2017, August 31). Hacking risk leads to recall of 500,000 pacemakers due to patient death fears. The Guardian. https://www.theguardian.com/technology/2017/aug/31/hacking-risk-recall-pacemakers-patient-death-fears-fda-firmware-update.

  19. Smith, R. (2018, July 23). Russian hackers reach U.S. utility control rooms, Homeland security officials say. Wall Street Journal. https://www.wsj.com/articles/russian-hackers-reach-u-s-utility-control-rooms-homeland-security-officials-say-1532388110.

  20. Rosenbush, S. (2017, November 16). The morning download: First AI-powered cyberattacks are detected. CIO Journal, Wall Street Journal. https://blogs.wsj.com/cio/2017/11/16/the-morning-download-first-ai-powered-cyberattacks-are-detected/.

  21. Giles, M. (2018, January). Six cyberthreats to really worry about in 2018. MIT Technology Review. https://www.technologyreview.com/s/609641/six-cyber-threats-to-really-worry-about-in-2018/.

  22. Ukraine power cut “was cyber-attack”. (2017, January 11). BBC. https://www.bbc.co.uk/news/technology-38573074.

  23. Dickinson, B. (2017, May 3). This is what fraud looks like in the age of Artificial Intelligence. The NextWeb. https://thenextweb.com/contributors/2017/05/03/what-fraud-looks-like-in-the-age-of-artificial-intelligence/.

  24. AI and ML curbing financial fraud. (2018, March 6). Fintech Futures. https://www.bankingtech.com/2018/03/ai-and-ml-curbing-financial-fraud/.

  25. Williams, S. (2017, May 12). Inside China’s phoney “click farm”: Tiny office uses 10,000 handsets to send fake ratings and “likes” for boosting clients’ online popularity. The DailyMail. https://www.dailymail.co.uk/news/article-4499730/click-farm-10-000-phones-boost-product-ratings.html.

  26. Tackling the challenges of securing a trillion connected devices at Arm TechCon 2017. (2017, September 6). ARM TechCon2017. https://www.arm.com/company/news/2017/09/tackling-the-challenges-of-securing-a-trillion-connected-devices-at-arm-techcon-2017.

  27. Secure-by-design. UK Government. Published 7 March 2018. https://www.gov.uk/government/publications/secure-by-design.

  28. Pratt, M. K. (2018, January 16). What is Zero Trust? A model for more effective security. CSO. https://www.csoonline.com/article/3247848/network-security/what-is-zero-trust-a-model-for-more-effective-security.html.

  29. Bird, J. (2018, September 26). AI is not a “silver bullet” against cyber attacks. Financial Times. https://www.ft.com/content/14cd2608-869d-11e8-9199-c2a4754b5a0e.

  30. The White House just issued a Defcon scale for cyber attacks. (2016, August 3). The Fanatical Futurist. https://www.fanaticalfuturist.com/2016/08/the-white-house-issued-a-defcon-scale-for-cyber-attacks/.

  31. Lee, D. (2018, September). Facebook security breach: Up to 50 m accounts attacked. BBC News. https://www.bbc.co.uk/news/technology-45686890.

  32. Kuckler, H. (2018, September 28). Facebook reveals cyber attack affecting up to 50 m users. Financial Times. https://www.ft.com/content/c5f13f30-c33f-11e8-8d55-54197280d3f7.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ganna Pogrebna .

Rights and permissions

Reprints and permissions

Copyright information

© 2019 The Author(s)

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Pogrebna, G., Skilton, M. (2019). Introduction. In: Navigating New Cyber Risks. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-030-13527-0_1

Download citation

Publish with us

Policies and ethics