Cybercrime History: Virtually Reflecting Reality, Part 6
Cybercrimeology1 Marras 2020

Cybercrime History: Virtually Reflecting Reality, Part 6

More about Our Guest

https://faculty.nps.edu/dedennin/

From this Episode:

Morris Wilkes: https://en.wikipedia.org/wiki/Maurice_Wilkes

His book "Time-sharing computer systems" from 1968 provide for the Security of the System on page 91 noting that "Passwords, if used must be carefully guarded and changed frequently; the console printing should be switched off when the users is invited to type in his password". So perhaps we can give Bill Burr a break. I learned about that line from a Dorothy Denning Lecture

A Declaration of the Independence of Cyberspace by John Perry Barlow

https://www.eff.org/cyberspace-independence

the Cult of the Dead Cow

https://cultdeadcow.com/

https://en.wikipedia.org/wiki/Cult_of_the_Dead_Cow

CARNAVORE

https://en.wikipedia.org/wiki/Carnivore_(software)

https://computer.howstuffworks.com/carnivore.htm

Honeypots

https://en.wikipedia.org/wiki/Honeypot_(computing)

https://www.projecthoneypot.org/index.php

https://www.honeynet.org/

Napster

https://en.wikipedia.org/wiki/Napster

Did you know there were viral videos and memes before Facebook, YouTube and even Gmail?

Money Good. Napster Bad

https://tvtropes.org/pmwiki/pmwiki.php/WebAnimation/NapsterBad

Jaksot(127)

The Open Science Revolution: Building Trust with Transparency

The Open Science Revolution: Building Trust with Transparency

Episode NotesEpisode SummaryIntroduction to Open Science – Asier Moneva introduces open science, emphasizing transparency and replicability as essential to modern research.Importance of Transparency –...

1 Marras 202428min

Cinematic Cybersecurity: What are movies teaching us about passwords?

Cinematic Cybersecurity: What are movies teaching us about passwords?

Episode Notes:The research focuses on analyzing the representation of passwords and cyber threats in films, particularly how password guessing and hacking scenes influence public perceptions of securi...

1 Loka 202428min

Signals, Deception, and AI: Navigating Trust in the Digital World

Signals, Deception, and AI: Navigating Trust in the Digital World

About our Guest:Judith Donathhttps://cyber.harvard.edu/people/jdonathKey Discussion Points:Understanding Signaling Theory:The foundation of signaling theory in communication.The balance between honest...

1 Syys 202444min

Mapping the Digital Threat: The Geography of Cybercrime

Mapping the Digital Threat: The Geography of Cybercrime

Notes:Background in Sociology: Dr. Miranda Bruce started in sociology, focusing on the dynamics of power and institutions.PhD Research: Her PhD explored the Internet of Things (IoT) using post-structu...

1 Elo 202432min

Policing Street Trolls: Navigating Cop Baiting and Digital Extremism

Policing Street Trolls: Navigating Cop Baiting and Digital Extremism

Notes: Dual Research Focus: Dr. Huey historically focused on policing and victimization, particularly in marginalized communities.Burnout and Shift: Burnout from trauma research led her to shift focus...

1 Heinä 202433min

Timing is Everything: Context-Based Cybersecurity Training

Timing is Everything: Context-Based Cybersecurity Training

Notes:Joakim Kävrestad is an Assistant Professor of Computer Science at Jönköping University, with a background in networking and cybersecurity.He shifted his focus to the societal and psychological a...

1 Kesä 202434min

Hackting Out: Defacement and Hate Online amid Global Conflicts

Hackting Out: Defacement and Hate Online amid Global Conflicts

Notes:Introduction to Cybercrime Research: Dr. Hutchings and Ahn Vu introduce their work at the Cambridge Cybercrime Centre.Global Conflicts and Cyber Activities: Discussion on how global conflicts, s...

1 Touko 202424min

Bridging realities: The Convergence of Ideology and Cybercrime

Bridging realities: The Convergence of Ideology and Cybercrime

Episode Notes:Dr. Tom Holt discussed the nascent stages of cybercrime research during his doctoral studies, highlighting its evolution into a more recognized and competitive field.He emphasized the gr...

1 Huhti 202431min

Suosittua kategoriassa Koulutus

rss-murhan-anatomia
voi-hyvin-meditaatiot-2
psykopodiaa-podcast
rss-narsisti
adhd-podi
rahapuhetta
rss-rahamania
kesken
psykologia
rss-liian-kuuma-peruna
rss-niinku-asia-on
rss-eron-alkemiaa
rss-arkea-ja-aurinkoa-podcast-espanjasta
esa-saarinen-filosofia-ja-systeemiajattelu
rss-duodecim-lehti
rss-vapaudu-voimaasi
rss-luonnollinen-synnytys-podcast
rss-tietoinen-yhteys-podcast-2
rss-finnish-daily-dialogues
ihminen-tavattavissa-tommy-hellsten-instituutti