icm2re logo. icm2:re (I Changed My Mind Reviewing Everything) is an 

ongoing web column edited and published by Brunella Longo

This column deals with some aspects of change management processes experienced almost in any industry impacted by the digital revolution: how to select, create, gather, manage, interpret, share data and information either because of internal and usually incremental scope - such learning, educational and re-engineering processes - or because of external forces, like mergers and acquisitions, restructuring goals, new regulations or disruptive technologies.

The title - I Changed My Mind Reviewing Everything - is a tribute to authors and scientists from different disciplinary fields that have illuminated my understanding of intentional change and decision making processes during the last thirty years, explaining how we think - or how we think about the way we think. The logo is a bit of a divertissement, from the latin divertere that means turn in separate ways.

Chronological Index | Subject Index

No, cyber security training does not solve the problem

What is really missing in the fight against cyber crime?

How to cite this article?
Longo, Brunella (2013). No, cyber security training does not solve the problem. What is really missing in the fight against cyber crime? icm2re [I Changed my Mind Reviewing Everything ISSN 2059-688X (Print)], 2.2 (May).

How to cite this article?
Longo, Brunella (2013). No, cyber security training does not solve the problem. What is really missing in the fight against cyber crime? icm2re [I Changed my Mind Reviewing Everything ISSN 2059-688X (Online)], 2.2 (May).
Full-text accessible at http://www.brunellalongo.co.uk/

1 May 2013 - How do we encourage 'good' behaviours and prevent bad ones in IT security and information or data management? Since there is no definitive reassurance from the technical level and even the most reliable standard can be easily compromised by corrupted, inept, distracted or otherwise oriented human behaviours, for about two decades I have been among those computer scientists, information professionals and engineers who considered the training and the people skills argument as a matter of priority in facilitating technological developments and reducing IT risks.

And yet once we have turned every stone with courses, certifications routes and computer licences for all, still in 2013 research shows that business owners, employees and even the same experts at the end of the day do not care as much as we would expect about information and computer security. We all trust our own processes and procedures are immune from the risks that affect others - or we need the job done anyway.

Has the rise of the cyber crime issue in economics, in politics, in management, in the legislative agenda (and even in its often trivialised media representation) caused any improvement or advancement? ....

Pay and continue reading:

  • Pay 1£ for a 24 hours password and access the fulltext of this article (issue 2.2)
  • Pay 10£ for the printed edition of this article (issue 2.2) sent to you via email (PDF) or printed and posted to your home or office as you prefer
  • Pay 100£ for the full access forever to the entire online icm2re collection (up to the whole of the entire current year in which you place your order)

Stats2