SlideShare a Scribd company logo
EmilTan
Team Lead, Co-Founder
http://edgis-security.org
@EdgisSecurity
A Multidisciplinary Perspective on
Cybersecurity
Multidisciplinary Perspective
 Human Geography
 Psychology
 Political Science
 Behavioural Economics
Spatial Theory
 Space v. Place
 What is place?
 Building or a location. Geographical coordination point.
 “This is not a place for me.” “Know your place.”
 Sense of belonging
 Illogical; Neither are they rules or laws
 Expected behaviour
 Objective facts v. Subjective feelings
 Centre of meaning v. Context for action (interpretation)
 Society produces place and place reproduces society
Stanford Prison Experiment (SPE)
 Philip G. Zimbardo, Aug 1971
 Correctional Officer v. Numbered Prisoners
 7 – 14 days, $15 per day
 SPE stopped after 6 days
International Journal of Criminology & Penology
Website: http://prisonexp.org/
Observations in SPE
 Prisoners’ Conversation – 90% are prison-related issues
 Parole Interviews –Willing to forfeit the money
 Guards – Mr. Correctional Officer
 Hellmann’s Little Experiment –
 “I want to see what kind of abuse people can take before they
start objecting. No one said anything to me.”
 Participants produce the prison and the prison reproduces
the participants
Cyberspace v. Cyberplace
 Place-ness of Cyberspace
 Bad guys exploit how users read the cyberspace
 Expectation
 Behavioural
 Trust
Securing the Cyberspace
 Transgression – Connecting Place with Meaning
 Implications
 Meaning of the place will change
 The place itself will change
 The new meaning will be their meaning

More Related Content

Viewers also liked

Introduction to Memory Analysis
Introduction to Memory AnalysisIntroduction to Memory Analysis
Introduction to Memory Analysis
Emil Tan
 
ATME Travel Marketing Conference - How Big Data, Deep Web & Semantic Technolo...
ATME Travel Marketing Conference - How Big Data, Deep Web & Semantic Technolo...ATME Travel Marketing Conference - How Big Data, Deep Web & Semantic Technolo...
ATME Travel Marketing Conference - How Big Data, Deep Web & Semantic Technolo...
Robert Cole
 
Ethical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is CyberworldEthical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is Cyberworld
Amae OlFato
 
5 Media Innovations From The Secret Deep Web
5 Media Innovations From The Secret Deep Web5 Media Innovations From The Secret Deep Web
5 Media Innovations From The Secret Deep Web
Amber Horsburgh
 
Cyber Security in the Interconnected World
Cyber Security in the Interconnected WorldCyber Security in the Interconnected World
Cyber Security in the Interconnected World
Russell_Kennedy
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data Breach
Jim Brashear
 
Cyber Risk in Healthcare Industry- Are you Protected?
Cyber Risk in Healthcare Industry- Are you Protected?  Cyber Risk in Healthcare Industry- Are you Protected?
Cyber Risk in Healthcare Industry- Are you Protected?
Mark Merrill
 
Deep Web - what to do and what not to do
Deep Web - what to do and what not to do	Deep Web - what to do and what not to do
Deep Web - what to do and what not to do
Cysinfo Cyber Security Community
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet Anonymity
Abhimanyu Singh
 
A Guide to Human Geography
A Guide to Human GeographyA Guide to Human Geography
A Guide to Human Geography
nefertari_1984
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
Accenture
 
Web 2.0
Web 2.0Web 2.0
Malaysia's National Cyber Security Policy
Malaysia's National Cyber Security PolicyMalaysia's National Cyber Security Policy
Malaysia's National Cyber Security Policy
Directorate of Information Security | Ditjen Aptika
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
loverakk187
 
The Emerging Global Web
The Emerging Global WebThe Emerging Global Web
The Emerging Global Web
yiibu
 
Deep Web
Deep WebDeep Web
Deep WebSt John
 
DNS - Domain Name System
DNS - Domain Name SystemDNS - Domain Name System
DNS - Domain Name System
Peter R. Egli
 

Viewers also liked (18)

Introduction to Memory Analysis
Introduction to Memory AnalysisIntroduction to Memory Analysis
Introduction to Memory Analysis
 
ATME Travel Marketing Conference - How Big Data, Deep Web & Semantic Technolo...
ATME Travel Marketing Conference - How Big Data, Deep Web & Semantic Technolo...ATME Travel Marketing Conference - How Big Data, Deep Web & Semantic Technolo...
ATME Travel Marketing Conference - How Big Data, Deep Web & Semantic Technolo...
 
Ethical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is CyberworldEthical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is Cyberworld
 
5 Media Innovations From The Secret Deep Web
5 Media Innovations From The Secret Deep Web5 Media Innovations From The Secret Deep Web
5 Media Innovations From The Secret Deep Web
 
Cyber Security in the Interconnected World
Cyber Security in the Interconnected WorldCyber Security in the Interconnected World
Cyber Security in the Interconnected World
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data Breach
 
Cyber Risk in Healthcare Industry- Are you Protected?
Cyber Risk in Healthcare Industry- Are you Protected?  Cyber Risk in Healthcare Industry- Are you Protected?
Cyber Risk in Healthcare Industry- Are you Protected?
 
Deep Web - what to do and what not to do
Deep Web - what to do and what not to do	Deep Web - what to do and what not to do
Deep Web - what to do and what not to do
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet Anonymity
 
A Guide to Human Geography
A Guide to Human GeographyA Guide to Human Geography
A Guide to Human Geography
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
Web 2.0
Web 2.0Web 2.0
Web 2.0
 
Honeypot ppt1
Honeypot ppt1Honeypot ppt1
Honeypot ppt1
 
Malaysia's National Cyber Security Policy
Malaysia's National Cyber Security PolicyMalaysia's National Cyber Security Policy
Malaysia's National Cyber Security Policy
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
The Emerging Global Web
The Emerging Global WebThe Emerging Global Web
The Emerging Global Web
 
Deep Web
Deep WebDeep Web
Deep Web
 
DNS - Domain Name System
DNS - Domain Name SystemDNS - Domain Name System
DNS - Domain Name System
 

Similar to A Multidisciplinary Perspective on Cybersecurity

Social Roles In The Stanford Experiment
Social Roles In The Stanford ExperimentSocial Roles In The Stanford Experiment
Social Roles In The Stanford Experiment
Joyce Williams
 
Why I Chose To Attend Stanford University
Why I Chose To Attend Stanford UniversityWhy I Chose To Attend Stanford University
Why I Chose To Attend Stanford University
Amanda Hengel
 
Stanford Prison Experiment Analysis
Stanford Prison Experiment AnalysisStanford Prison Experiment Analysis
Stanford Prison Experiment Analysis
Lindsey Campbell
 
Basics of Research Methods for Criminal Justice and Criminology.docx
Basics of Research Methods for Criminal Justice and Criminology.docxBasics of Research Methods for Criminal Justice and Criminology.docx
Basics of Research Methods for Criminal Justice and Criminology.docx
JASS44
 
Ethical Research
Ethical ResearchEthical Research
Ethical Researchwtidwell
 
Free Will
Free WillFree Will
Free Will
elwalia
 
Psychology-Naturalistic Observation Essay
Psychology-Naturalistic Observation EssayPsychology-Naturalistic Observation Essay
Psychology-Naturalistic Observation Essay
Order Custom Paper Cedar City
 
Write a critical analysis post discussing the following questions .docx
Write a critical analysis post discussing the following questions .docxWrite a critical analysis post discussing the following questions .docx
Write a critical analysis post discussing the following questions .docx
helzerpatrina
 
Human Sciences for ToK
Human Sciences for ToKHuman Sciences for ToK
Human Sciences for ToK
plangdale
 
GDC17 A Practical Guide to Doing Ethical Player Testing
GDC17 A Practical Guide to Doing Ethical Player TestingGDC17 A Practical Guide to Doing Ethical Player Testing
GDC17 A Practical Guide to Doing Ethical Player Testing
Mia Consalvo
 

Similar to A Multidisciplinary Perspective on Cybersecurity (10)

Social Roles In The Stanford Experiment
Social Roles In The Stanford ExperimentSocial Roles In The Stanford Experiment
Social Roles In The Stanford Experiment
 
Why I Chose To Attend Stanford University
Why I Chose To Attend Stanford UniversityWhy I Chose To Attend Stanford University
Why I Chose To Attend Stanford University
 
Stanford Prison Experiment Analysis
Stanford Prison Experiment AnalysisStanford Prison Experiment Analysis
Stanford Prison Experiment Analysis
 
Basics of Research Methods for Criminal Justice and Criminology.docx
Basics of Research Methods for Criminal Justice and Criminology.docxBasics of Research Methods for Criminal Justice and Criminology.docx
Basics of Research Methods for Criminal Justice and Criminology.docx
 
Ethical Research
Ethical ResearchEthical Research
Ethical Research
 
Free Will
Free WillFree Will
Free Will
 
Psychology-Naturalistic Observation Essay
Psychology-Naturalistic Observation EssayPsychology-Naturalistic Observation Essay
Psychology-Naturalistic Observation Essay
 
Write a critical analysis post discussing the following questions .docx
Write a critical analysis post discussing the following questions .docxWrite a critical analysis post discussing the following questions .docx
Write a critical analysis post discussing the following questions .docx
 
Human Sciences for ToK
Human Sciences for ToKHuman Sciences for ToK
Human Sciences for ToK
 
GDC17 A Practical Guide to Doing Ethical Player Testing
GDC17 A Practical Guide to Doing Ethical Player TestingGDC17 A Practical Guide to Doing Ethical Player Testing
GDC17 A Practical Guide to Doing Ethical Player Testing
 

Recently uploaded

Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 

Recently uploaded (20)

Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 

A Multidisciplinary Perspective on Cybersecurity

  • 1. EmilTan Team Lead, Co-Founder http://edgis-security.org @EdgisSecurity A Multidisciplinary Perspective on Cybersecurity
  • 2. Multidisciplinary Perspective  Human Geography  Psychology  Political Science  Behavioural Economics
  • 3. Spatial Theory  Space v. Place  What is place?  Building or a location. Geographical coordination point.  “This is not a place for me.” “Know your place.”  Sense of belonging  Illogical; Neither are they rules or laws  Expected behaviour  Objective facts v. Subjective feelings  Centre of meaning v. Context for action (interpretation)  Society produces place and place reproduces society
  • 4. Stanford Prison Experiment (SPE)  Philip G. Zimbardo, Aug 1971  Correctional Officer v. Numbered Prisoners  7 – 14 days, $15 per day  SPE stopped after 6 days International Journal of Criminology & Penology Website: http://prisonexp.org/
  • 5. Observations in SPE  Prisoners’ Conversation – 90% are prison-related issues  Parole Interviews –Willing to forfeit the money  Guards – Mr. Correctional Officer  Hellmann’s Little Experiment –  “I want to see what kind of abuse people can take before they start objecting. No one said anything to me.”  Participants produce the prison and the prison reproduces the participants
  • 6. Cyberspace v. Cyberplace  Place-ness of Cyberspace  Bad guys exploit how users read the cyberspace  Expectation  Behavioural  Trust
  • 7. Securing the Cyberspace  Transgression – Connecting Place with Meaning  Implications  Meaning of the place will change  The place itself will change  The new meaning will be their meaning