The Security of Self: A Human-Centric Approach to Cybersecurity
| dc.contributor.author | Laidlaw, Emily B. | |
| dc.contributor.author | Martin-Bariteau, Florian | |
| dc.date.accessioned | 2025-12-16T14:19:19Z | |
| dc.date.available | 2025-12-16T14:19:19Z | |
| dc.date.issued | 2025-12-09 | |
| dc.description.abstract | Cybersecurity is a powerful concept often examined through the lens of national security and organizational risks. It however demands a deeper understanding to empower our societies—and ourselves—to thrive in the digital context. This edited collection explores a new approach to human-centric cybersecurity: the security of self. It invites a paradigm shift where cybersecurity’s core purpose is to protect people—and society—from harm, and where empowering individual and collective rights defines what it means to provide a secure cyber environment. With a distinct Canadian focus, and case studies spanning the Internet of Things, artificial intelligence, virtual reality and social media, this collection charts a path forward for cybersecurity, grounded in law, policy and practices that advance the security of self. This collection serves as a valuable resource for researchers, policymakers, regulators and individuals seeking to understand and shape the future of human-centric cybersecurity. | |
| dc.description.tableofcontents | About the Cover Art List of Figures Acknowledgements INTRODUCTION Conceptualizing Security of Self Emily B. Laidlaw and Florian Martin-Bariteau PART I: REFRAMING CYBERSECURITY NARRATIVES Chapter 1 Whose Security Are We Talking About Anyway? The Case of Amazon Ring Jane Bailey, Jacquelyn Burkell, and Kristen Thomasen 1.1. Technology-Facilitated Violence as a Matter of Cybersecurity 1.2. Internet-Connected Home “Security” Systems 1.3. Toward Harm-Centric Security Approaches Chapter 2 Bringing Security Home: The Need for a Human-Centric Approach to Securing Smart Homes Matthew Bush and Atefeh Mashatan 2.1. Today’s Smart Home Systems 2.2. The Human Element in Smart Homes 2.3. Gap Analysis Between the State-of-the-Art and User Expectations 2.4. Toward Shared Responsibility and a Proactive Smart Home Security Framework Chapter 3 The Vulnerability of Emerging Technologies of the Self: A Critical Analysis of Virtual Reality Through Psychedelic Self‑Hacking Jordan Loewen-Colón, Sharday Mosurinjohn, and Amarnath Amarasingam 3.1. The Critical Vulnerabilities of the Self in Virtual Reality 3.2. Hacking from the Outside In 3.3. Hacking from the Inside Out: Foucault’s “Technologies of the Self” 3.4. Securing Technologies of the Self Chapter 4 Developing Human-Centric Informational Security Jonathon W. Penney 4.1. Information Manipulation as a Cybersecurity Threat 4.2. The Limits of the Existing Cybersecurity Paradigm 4.3. Framing Human-Centric Informational Security 4.4. Recommendations for Policy and Research Chapter 5 The Technology-Facilitated Insecurity of Public and Private Selves Chris Tenove and Heidi Tworek 5.1. Harassment, Technology-Facilitated Violence, and Cybersecurity 5.2. How Platforms Facilitate Insecurity and Harm 5.3. Systemic Suggestions to Address Technology‑Facilitated Insecurity PART II: TOWARD THE SECURITY OF SELF Chapter 6 Achieving the Security of Self in Machine Learning: Empowering Individuals Through Self-Security Enhancing Technologies Sébastien Gambs 6.1. Machine Learning Privacy and Security 6.2. Auditing and Watermarking Data 6.3. Poisoning Data 6.4. Unlearning Data 6.5. Toward a New Machine Learning Security of Self Paradigm Chapter 7 Addressing the Harms of Data Security Breaches Teresa Scassa 7.1. Legislative Context 7.2. Class Action Lawsuits 7.3. Privacy Law and Class Actions 7.4. Private Right of Action 7.5. An Uncertain Future Chapter 8 Algorithmic Impact Assessment: From Risk Assessments to Community Research Fenwick McKelvey, Nick Gertler, and Alex Megelas 8.1. Algorithmic Impact Assessments 8.2. Lessons Learned from the Limits of Canada’s AIA 8.3. Toward a Community-Based Approach 8.4. Enhancing the Security of Self with Community‑Based AIA Chapter 9 Securing Public Interest Cybersecurity Researchers in Canadian Universities Adam Molnar 9.1. The University as a Locus for Public Interest Cybersecurity Research 9.2. The Ubiquitous Use of Computer Security Methods 9.3. Coordinated Vulnerability Reporting 9.4. Assessing the Legal Risk 9.5. Securing Research Chapter 10 The Online Mutual Help Practices of Romance Fraud Victims Pascale-Marie Cantin, Fyscillia Ream, and Benoît Dupont 10.1. Online Mutual Help 10.2. Data and Methods 10.3. Supporting Victims by Helping them Regain a Voice, Overcome Isolation, and Access Personal Advice 10.4. Identifying Fraudulent Profiles 10.5. Raising Awareness 10.6. Incentivizing and Regulating Mutual Help Chapter 11 When Victims Strike Back: Online Fraud Victims’ Response to their Victimization Fyscillia Ream, Akim Laniel-Lanani, and Benoît Dupont 11.1. Overview of Online Fraud Victimization 11.2. Vigilantism, Digilantism, and Online Victimization 11.3. Fighting Cyberfraud on Facebook 11.4. From Victim Blaming to Victim Empowerment Biographies Editors Contributors | |
| dc.identifier.isbn | 9780776645636 | |
| dc.identifier.uri | https://press.uottawa.ca/en/9780776645605/the-security-of-self/ | |
| dc.identifier.uri | http://hdl.handle.net/10393/51181 | |
| dc.language.iso | en | |
| dc.relation.ispartofseries | Law, Technology, and Media | |
| dc.rights | Attribution-NonCommercial-NoDerivatives 4.0 International | en |
| dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/4.0/ | |
| dc.subject | cybersecurity | |
| dc.subject | national security | |
| dc.subject | data breaches | |
| dc.subject | social media | |
| dc.subject | security | |
| dc.subject | research | |
| dc.subject | laws | |
| dc.subject | policy | |
| dc.subject | privacy | |
| dc.subject | The internet of things | |
| dc.subject | Hacking | |
| dc.subject | Identity theft | |
| dc.subject | fraud | |
| dc.subject | Scam | |
| dc.subject | Phishing | |
| dc.subject | harassment | |
| dc.subject | Romance fraud | |
| dc.subject | security breaches | |
| dc.subject | Privacy law | |
| dc.subject | Private rights | |
| dc.subject | digital privacy | |
| dc.subject | technology | |
| dc.subject | Digital self-defence | |
| dc.subject | Online fraud | |
| dc.subject | Cyber fraud | |
| dc.subject | Fake profiles | |
| dc.title | The Security of Self: A Human-Centric Approach to Cybersecurity | |
| dc.type | Book |
