
The Security of Self
A Human-Centric Approach to Cybersecurity
- English
- ePUB (mobile friendly)
- Available on iOS & Android
The Security of Self
A Human-Centric Approach to Cybersecurity
About this book
Cybersecurity is a powerful concept often examined through the lens of national security and organizational risks. It however demands a deeper understanding to empower our societiesāand ourselvesāto thrive in the digital context.
This edited collection explores a new approach to human-centric cybersecurity: the security of self. It invites a paradigm shift where cybersecurity's core purpose is to protect peopleāand societyāfrom harm, and where empowering individual and collective rights defines what it means to provide a secure cyber environment.
With a distinct Canadian focus, and case studies spanning the Internet of Things, artificial intelligence, virtual reality and social media, this collection charts a path forward for cybersecurity, grounded in law, policy and practices that advance the security of self. This collection serves as a valuable resource for researchers, policymakers, regulators and individuals seeking to understand and shape the future of human-centric cybersecurity.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover
- Halftitle Page
- Title Page
- Copyright
- About the Cover Art
- Table of Contents
- List of Figures
- Acknowledgements
- Introduction: Conceptualizing Security of Self
- Part I: Reframing Cybersecurity Narratives
- Part II: Toward the Security of Self
- Biographies
- Backcover