SlideShare a Scribd company logo
EmilTan
Team Lead, Co-Founder
http://edgis-security.org
@EdgisSecurity
A Multidisciplinary Perspective on
Cybersecurity
Multidisciplinary Perspective
 Human Geography
 Psychology
 Political Science
 Behavioural Economics
Spatial Theory
 Space v. Place
 What is place?
 Building or a location. Geographical coordination point.
 “This is not a place for me.” “Know your place.”
 Sense of belonging
 Illogical; Neither are they rules or laws
 Expected behaviour
 Objective facts v. Subjective feelings
 Centre of meaning v. Context for action (interpretation)
 Society produces place and place reproduces society
Stanford Prison Experiment (SPE)
 Philip G. Zimbardo, Aug 1971
 Correctional Officer v. Numbered Prisoners
 7 – 14 days, $15 per day
 SPE stopped after 6 days
International Journal of Criminology & Penology
Website: http://prisonexp.org/
Observations in SPE
 Prisoners’ Conversation – 90% are prison-related issues
 Parole Interviews –Willing to forfeit the money
 Guards – Mr. Correctional Officer
 Hellmann’s Little Experiment –
 “I want to see what kind of abuse people can take before they
start objecting. No one said anything to me.”
 Participants produce the prison and the prison reproduces
the participants
Cyberspace v. Cyberplace
 Place-ness of Cyberspace
 Bad guys exploit how users read the cyberspace
 Expectation
 Behavioural
 Trust
Securing the Cyberspace
 Transgression – Connecting Place with Meaning
 Implications
 Meaning of the place will change
 The place itself will change
 The new meaning will be their meaning

More Related Content

PPTX
PDF
Stalking in the Cyberspace
PDF
Introduction to Honeypots
PPTX
Attacks on the cyber world
PDF
Securing Yourself in the Cyber World
PDF
Cyber Loss Model for the cost of a data breach.
PDF
Securing Mobile & Online Identity in the Cyber World
PPT
Cyber ppt
Stalking in the Cyberspace
Introduction to Honeypots
Attacks on the cyber world
Securing Yourself in the Cyber World
Cyber Loss Model for the cost of a data breach.
Securing Mobile & Online Identity in the Cyber World
Cyber ppt

Viewers also liked (18)

PDF
Introduction to Memory Analysis
PDF
ATME Travel Marketing Conference - How Big Data, Deep Web & Semantic Technolo...
DOCX
Ethical Dilemma/Issues is Cyberworld
PDF
5 Media Innovations From The Secret Deep Web
PPTX
Cyber Security in the Interconnected World
PPTX
A Brave New World of Cyber Security and Data Breach
PDF
Cyber Risk in Healthcare Industry- Are you Protected?
PPTX
Deep Web - what to do and what not to do
PPTX
The Deep Web, TOR Network and Internet Anonymity
PPT
A Guide to Human Geography
PPT
cyber terrorism
PPT
PPTX
Honeypot ppt1
PDF
Malaysia's National Cyber Security Policy
PPTX
Cyber Terrorism
PDF
The Emerging Global Web
PPT
Deep Web
PDF
DNS - Domain Name System
Introduction to Memory Analysis
ATME Travel Marketing Conference - How Big Data, Deep Web & Semantic Technolo...
Ethical Dilemma/Issues is Cyberworld
5 Media Innovations From The Secret Deep Web
Cyber Security in the Interconnected World
A Brave New World of Cyber Security and Data Breach
Cyber Risk in Healthcare Industry- Are you Protected?
Deep Web - what to do and what not to do
The Deep Web, TOR Network and Internet Anonymity
A Guide to Human Geography
cyber terrorism
Honeypot ppt1
Malaysia's National Cyber Security Policy
Cyber Terrorism
The Emerging Global Web
Deep Web
DNS - Domain Name System
Ad

Similar to A Multidisciplinary Perspective on Cybersecurity (10)

PDF
Social Roles In The Stanford Experiment
PDF
Why I Chose To Attend Stanford University
PDF
Stanford Prison Experiment Analysis
DOCX
Basics of Research Methods for Criminal Justice and Criminology.docx
PPT
Ethical Research
PPTX
Free Will
PDF
Psychology-Naturalistic Observation Essay
DOCX
Write a critical analysis post discussing the following questions .docx
PPTX
Human Sciences for ToK
PDF
GDC17 A Practical Guide to Doing Ethical Player Testing
Social Roles In The Stanford Experiment
Why I Chose To Attend Stanford University
Stanford Prison Experiment Analysis
Basics of Research Methods for Criminal Justice and Criminology.docx
Ethical Research
Free Will
Psychology-Naturalistic Observation Essay
Write a critical analysis post discussing the following questions .docx
Human Sciences for ToK
GDC17 A Practical Guide to Doing Ethical Player Testing
Ad

Recently uploaded (20)

PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Approach and Philosophy of On baking technology
PDF
cuic standard and advanced reporting.pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Big Data Technologies - Introduction.pptx
PDF
Electronic commerce courselecture one. Pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Modernizing your data center with Dell and AMD
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Empathic Computing: Creating Shared Understanding
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Approach and Philosophy of On baking technology
cuic standard and advanced reporting.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Review of recent advances in non-invasive hemoglobin estimation
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Per capita expenditure prediction using model stacking based on satellite ima...
Dropbox Q2 2025 Financial Results & Investor Presentation
Big Data Technologies - Introduction.pptx
Electronic commerce courselecture one. Pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Unlocking AI with Model Context Protocol (MCP)
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Modernizing your data center with Dell and AMD
Chapter 3 Spatial Domain Image Processing.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
Empathic Computing: Creating Shared Understanding
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf

A Multidisciplinary Perspective on Cybersecurity

  • 2. Multidisciplinary Perspective  Human Geography  Psychology  Political Science  Behavioural Economics
  • 3. Spatial Theory  Space v. Place  What is place?  Building or a location. Geographical coordination point.  “This is not a place for me.” “Know your place.”  Sense of belonging  Illogical; Neither are they rules or laws  Expected behaviour  Objective facts v. Subjective feelings  Centre of meaning v. Context for action (interpretation)  Society produces place and place reproduces society
  • 4. Stanford Prison Experiment (SPE)  Philip G. Zimbardo, Aug 1971  Correctional Officer v. Numbered Prisoners  7 – 14 days, $15 per day  SPE stopped after 6 days International Journal of Criminology & Penology Website: http://prisonexp.org/
  • 5. Observations in SPE  Prisoners’ Conversation – 90% are prison-related issues  Parole Interviews –Willing to forfeit the money  Guards – Mr. Correctional Officer  Hellmann’s Little Experiment –  “I want to see what kind of abuse people can take before they start objecting. No one said anything to me.”  Participants produce the prison and the prison reproduces the participants
  • 6. Cyberspace v. Cyberplace  Place-ness of Cyberspace  Bad guys exploit how users read the cyberspace  Expectation  Behavioural  Trust
  • 7. Securing the Cyberspace  Transgression – Connecting Place with Meaning  Implications  Meaning of the place will change  The place itself will change  The new meaning will be their meaning