DEVIANT SECURITY EHAVANDESANDT.pdf


Aperçu du fichier PDF deviantsecurityehavandesandt.pdf - page 6/311

Page 1...4 5 678311



Aperçu texte


3.3
3.4

II

Legal Studies . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Interim Conclusion and Discussion . . . . . . . . . . . . . . . . .

Methodology

47

4 A Multidisciplinary Approach for Deviant Security
4.1 Descriptive: Grounded Theory for Deviant Security Practices
4.1.1 Cyber Criminal and Cyber Security Participants . . .
4.1.2 Secondary Data Sources . . . . . . . . . . . . . . . . .
4.1.3 Data Collection, Analysis and Writing . . . . . . . . .
4.2 Explanatory: Information Age & Microeconomic Theory . .
4.2.1 Deviant Security in the Information Age . . . . . . .
4.2.2 The Microeconomics of Deviant Security . . . . . . . .
4.3 Limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . .
4.4 Ethical issues . . . . . . . . . . . . . . . . . . . . . . . . . . .

III

42
45

.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.

Research Findings

48
50
52
55
59
61
61
64
66
71

73

5 What? - Basic Qualities of Deviant Security
5.1 Definition: What Makes Security Deviant? . . . . . .
5.2 Meaning: Subjective Condition . . . . . . . . . . . .
5.3 Provision: Club, Common, Private and Public Good
5.4 Function: An Asset To Protect Assets . . . . . . . .
5.5 Form: Intangible and Tangible Products & Services
5.6 Interim Conclusion and Discussion . . . . . . . . . .

.
.
.
.
.
.

.
.
.
.
.
.

.
.
.
.
.
.

.
.
.
.
.
.

.
.
.
.
.
.

.
.
.
.
.
.

74
. 76
. 83
. 86
. 89
. 96
. 102

6 Who? - Interactive Qualities of Deviant Security
6.1 Autarkic & Autonomous Referent Objects . . . . .
6.2 DevSec Providers & Services . . . . . . . . . . . .
6.3 Threat Agents & Attacks . . . . . . . . . . . . . .
6.4 Information Asymmetries in Intertwined Networks
6.5 Deception as Deviant Security Control . . . . . . .
6.6 Trust and Distrust as Deviant Security Controls .
6.7 Interim Conclusion and Discussion . . . . . . . . .

.
.
.
.
.
.
.

.
.
.
.
.
.
.

.
.
.
.
.
.
.

.
.
.
.
.
.
.

.
.
.
.
.
.
.

.
.
.
.
.
.
.

.
.
.
.
.
.
.

.
.
.
.
.
.
.

7 When & Where? - Temporal-Spatial Qualities of Deviant
curity
7.1 Countermeasures Against Data Volatility & Retention . . . .
7.2 Intercultural Communication as a Countermeasure . . . . . .
7.3 Distribution as a Countermeasure . . . . . . . . . . . . . . . .
7.4 Physical Deviant Security . . . . . . . . . . . . . . . . . . . .
7.5 Interim Conclusion and Discussion . . . . . . . . . . . . . . .

iv

105
106
108
113
117
125
132
144

Se148
. . 150
. . 157
. . 168
. . 178
. . 186