Published inHumanCyberHubCyber Security of Human Digital TwinsWho or What Are Human Digital Twins?Nov 13, 2020Nov 13, 2020
Published inHumanCyberHubRisk Taking in Cyber Spaces: “Scary” Wearables and “Friendly” AppsHow Do People Deal with Risk in Cyber Spaces?Nov 12, 2020Nov 12, 2020
Published inHumanCyberHubShould We “Hack Back”? The Many Faces of Active Cyber DefenceWhat is Active Cyber Defence?Nov 10, 2020Nov 10, 2020
Published inHumanCyberHubFrom Human Culture to Cyber CultureWhy Culture MattersNov 9, 2020Nov 9, 2020
Published inHumanCyberHub10 Behavioural Foundations of Business Cyber Security NegligenceWhy Businesses Fail to Defend Themselves Against Cyber ThreatsNov 6, 20201Nov 6, 20201
Published inHumanCyberHubThe Periodic Table of Cybersecurity Threatsthe modern digital economy cybersecurity threats constitute major challenges for the functioning of any business. For a business owner…Nov 5, 2020Nov 5, 2020
Published inHumanCyberHubMulti-layered Cybersecurity MarketingWhy “One-Size-Fits-All” Cybersecurity Fails to DeliverNov 4, 2020Nov 4, 2020
Published inBehavioral Design HubWhat Is Behavioral Data Science and How to Get into It?Behavioral Data Science as a Logical Evolution of Behavioral ScienceJul 12, 20209Jul 12, 20209