Category Archives: Human Elements

Strong Authentication is Good, Unless …

– … it results in your being arrested! In her September 28, 2019 article, “Army communication head at Mar-a-Lago sentenced for lying,” Jane Musgrave describes how an army officer in charge of communications at Mar-a-Lago had lied about posting a photograph of a young girl on a Russian…

The Cybersecurity Paradox

– In “Our Neurotic ‘Privacy’ Paradox” by Jennifer Senior, which appeared in The New York Times of May 19, 2019, the reporter makes the following statement: “Resignation [to the loss of privacy] also explains the privacy paradox. It’s a perfectly rational response to a situation in which…

Cyberspace’s Weapons of Mass Deconstruction

– The cyberworld is replete with exhibitionists and voyeurs, facilitated by social-network (or should I say social-engineering) technologies such as those provided by Facebook, Twitter, Google, Instagram, and others. Even seemingly staid news sources seduce the reader with teasers for titles. This…

Cybersecurity and the Government Shutdown

– I had originally thought of comparing the impact on cybersecurity of the December 2018/January 2019 35-day partial government shutdown to other forms of upheaval, bringing in references to my chapter “IAM Risks during Organizational Change and Other Forms of Major Upheaval,” in Digital…

Business-Technology Alignment

– My doctoral dissertation “The Allocation of Computing Resources in Organizations with Semi-Autonomous Users” and subsequent book “Computer Effectiveness: Bridging the Management-Technology Gap” focused on communications between information technology professionals and business management…