Complementary Cybersecurity
Author(s): POPESCU, Eugen F.
Author(s) keywords: adaptation needs, cyber ecology, cyber psychology, cyber sociology, holistic approach, phenomenological analysis, technology influences
Reference keywords: cybersecurity, information security
Abstract:
The paper presents the need for enhancing the classical Cybersecurity domain of study with a set of complementary perspectives that are meant to support and facilitate a proper long-term human evolution, as well as a balanced and healthy environment. It describes the influence of human decisions on the technology, in its entire lifecycle, and likewise the technological feedback that is experienced both by the human and the nature, in return. It emphasizes the need for profound analysis of the influences that technology brings on humans – as individuals and as society – and on the surrounding environment. In the same time, it points towards the importance of adaptation of our daily lives to the technological advancements. The paper concludes with a set of necessities for raising the awareness and knowledge on these matters, in order to document and support the decisions that shape our realities.
References:
Article Title: Complementary Cybersecurity
Author(s): POPESCU, Eugen F.
Date of Publication: 2020-12-30
Publication: International Journal of Information Security and Cybercrime
ISSN: 2285-9225 e-ISSN: 2286-0096
Digital Object Identifier: 10.19107/IJISC.2020.02.05
Issue: Volume 9, Issue 2, Year 2020
Section: Cyber-Attacks Evolution and Cybercrime Trends
Page Range: 33-37 (5 pages)
Copyright ©2012-2025
The International Journal of Information Security and Cybercrime (IJISC)
All rights reserved
The International Journal of Information Security and Cybercrime is a trademark of the Romanian Association for Information Security Assurance (RAISA).
No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.