University of Ottawa Press
The Security of Self
-
Edited by:
and -
With contributions by:
, , , , , , , , , , , , , , , , , , , and
About this book
Cybersecurity is a powerful concept often examined through the lens of national security and organizational risks. It however demands a deeper understanding to empower our societies—and ourselves—to thrive in the digital context.
This edited collection explores a new approach to human-centric cybersecurity: the security of self. It invites a paradigm shift where cybersecurity’s core purpose is to protect people—and society—from harm, and where empowering individual and collective rights defines what it means to provide a secure cyber environment.
With a distinct Canadian focus, and case studies spanning the Internet of Things, artificial intelligence, virtual reality and social media, this collection charts a path forward for cybersecurity, grounded in law, policy and practices that advance the security of self. This collection serves as a valuable resource for researchers, policymakers, regulators and individuals seeking to understand and shape the future of human-centric cybersecurity.
Topics
-
Download PDFPublicly Available
Frontmatter
i -
Download PDFPublicly Available
About the Cover Art
v -
Download PDFPublicly Available
Table of Contents
vii -
Download PDFPublicly Available
List of Figures
xi -
Download PDFPublicly Available
Acknowledgements
xiii -
Download PDFRequires Authentication UnlicensedLicensed
INTRODUCTION Conceptualizing Security of Self
1 - PART I: REFRAMING CYBERSECURITY NARRATIVES
-
Download PDFRequires Authentication UnlicensedLicensed
CHAPTER 1 Whose Security Are We Talking About Anyway? The Case of Amazon Ring
19 -
Download PDFRequires Authentication UnlicensedLicensed
CHAPTER 2 Bringing Security Home: The Need for a Human-Centric Approach to Securing Smart Homes
37 -
Download PDFRequires Authentication UnlicensedLicensed
CHAPTER 3 The Vulnerability of Emerging Technologies of the Self: A Critical Analysis of Virtual Reality Through Psychedelic Self-Hacking
57 -
Download PDFRequires Authentication UnlicensedLicensed
CHAPTER 4 Developing Human-Centric Informational Security
75 -
Download PDFRequires Authentication UnlicensedLicensed
CHAPTER 5 The Technology-Facilitated Insecurity of Public and Private Selves
97 - PART II: TOWARD THE SECURITY OF SELF
-
Download PDFRequires Authentication UnlicensedLicensed
CHAPTER 6 Achieving the Security of Self in Machine Learning: Empowering Individuals Through Self-Security Enhancing Technologies
121 -
Download PDFRequires Authentication UnlicensedLicensed
CHAPTER 7 Addressing the Harms of Data Security Breaches
135 -
Download PDFRequires Authentication UnlicensedLicensed
CHAPTER 8 Algorithmic Impact Assessment: From Risk Assessments to Community Research
149 -
Download PDFRequires Authentication UnlicensedLicensed
CHAPTER 9 Securing Public Interest Cybersecurity Researchers in Canadian Universities
161 -
Download PDFRequires Authentication UnlicensedLicensed
CHAPTER 10 The Online Mutual Help Practices of Romance Fraud Victims
179 -
Download PDFRequires Authentication UnlicensedLicensed
CHAPTER 11 When Victims Strike Back: Online Fraud Victims’ Response to their Victimization
195 -
Download PDFRequires Authentication UnlicensedLicensed
Biographies
217 -
Download PDFRequires Authentication UnlicensedLicensed
Series editor
223