Thursday, 7 May 2026
Subscribe
logo
  • AI Compute
  • Infrastructure
  • Power & Cooling
  • Security
  • Colocation
  • Cloud Computing
  • More
    • Sustainability
    • Industry News
    • About Data Center News
    • Terms & Conditions
Font ResizerAa
Data Center NewsData Center News
Search
  • AI Compute
  • Infrastructure
  • Power & Cooling
  • Security
  • Colocation
  • Cloud Computing
  • More
    • Sustainability
    • Industry News
    • About Data Center News
    • Terms & Conditions
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Cloud Computing > The Intersection of technology and human behaviour in cybersecurity
Cloud Computing

The Intersection of technology and human behaviour in cybersecurity

Last updated: April 12, 2025 10:02 am
Published April 12, 2025
Share
The Intersection of technology and human behaviour in cybersecurity
SHARE

Dr. Mary Aiken stands on the forefront of cyberpsychology, exploring the intricate relationship between know-how and human behaviour.

As a professor and chair of the Division of Cyberpsychology at Capitol Know-how College in Washington D.C., and a Professor of Forensic Cyberpsychology on the College of East London, she has devoted her profession to understanding the psychological implications of our digital lives.

A extremely sought-after cybersecurity speaker, Dr Aiken shares her experience on international phases, providing distinctive insights into cyber behaviour and digital danger. We spoke together with her to delve into the evolving panorama of cyberpsychology, the challenges posed by rising applied sciences, and the way people and organisations can navigate the complexities of the digital age.

In your view, how crucial is it that cybersecurity evolves to totally incorporate the human layer, and what are essentially the most urgent psychological elements that should now be addressed?

To start with, let’s speak about our on-line world. As cyber psychologists, folks like myself have been discussing our on-line world for one of the best a part of 20 years. Actually, in 2016, NATO formally ratified our on-line world as an setting — as a website — recognising that the battles of the longer term would happen not solely on land, sea, and air, but in addition throughout pc networks.

The US army conceptualises our on-line world as comprising three layers. Firstly, there’s the bodily community, which incorporates the {hardware}, cables, and infrastructure. Secondly, there’s the logical community, which facilitates communication throughout these networks. And at last, there’s the cyber persona layer—that’s us, the people.

Once we speak about incorporating the human layer into the cybersecurity equation, we have now to acknowledge that we’ve had 50 to 60 years of cybersecurity, and it has been very efficient in addressing the primary two layers: the bodily and logical networks. Nonetheless, the overwhelming majority of cyberattacks in the present day are pushed by social engineering — and social engineering has much more to do with psychology than with know-how.

Consequently, we’re now seeing the emergence of a brand new sector beneath the broader umbrella of cybersecurity: the net security know-how sector, or SafetyTech. I’m proud to be one of many founding members of this sector within the UK. Our mission is to develop technological options to technology-facilitated issues — specifically dangerous and legal behaviours on-line.

See also  Corning and US Conec to strengthen AI networks with PRIZM TMT technology

To summarise, we should issue the human into the cybersecurity equation — from the angle of customers, staff, and cyber attackers. And once we have a look at the spectrum of cyber risk actors — from state-sponsored to state-condoned, from hacktivists to activists, from organised cybercrime to classy risk teams — we want options that aren’t solely technically strong and resilient, but in addition account for human psychological resilience.

We would like our information methods and networks to be safe, however equally, we want the folks working these methods to be psychologically protected, strong, and resilient. That’s how we are able to ship on what I name 360-degree resilience.

As one of many foremost specialists in cyber psychology, how does the science underpinning this subject inform your public talking, significantly when partaking with sectors grappling with tech-driven behavioural change?

In cyber psychology, we examine particular results — for instance, the net disinhibition impact — which explains why folks usually behave in methods on-line that they might by no means think about in the true world. It’s a key behavioural driver in digital environments.

We additionally discover the facility of on-line anonymity, which will be useful in some contexts however can even act like a ‘superhuman energy of invisibility’. And, as with all powers, it comes with accountability — one thing not all the time exercised properly by people.

In fact, we additionally observe optimistic on-line behaviours, comparable to altruism, seen in actions like crowdsourced fundraising. The elemental precept is that human behaviour adjustments in on-line environments, and understanding the influence of those behavioural shifts is important.

By my talking engagements, I’ve the privilege of addressing a variety of sectors — know-how, cybersecurity, infosec, monetary companies, schooling, e-commerce, and healthcare. All of those industries profit from deeper insights into how know-how influences human behaviour, each from the consumer and operator views.

My analysis spans plenty of areas, together with cyberchondria — a type of well being anxiousness that manifests on-line. Many people have skilled this: a headache shortly spirals into Googling signs, resulting in panic over severe situations like mind tumours.

One other latest space of focus is cyber fraud. Within the UK, laws such because the On-line Security Act is geared toward addressing this sort of cyber-enabled criminality. I’ve contributed to quite a few info campaigns that target one in all my key areas of experience: cyber behavioural profiling.

See also  AI vs. AI: Prophet Security raises $30M to replace human analysts with autonomous defenders

Many campaigns inform folks, “Don’t click on the hyperlink.” I am going a step additional — I analyse the semantics of phishing messages, breaking down how attackers manipulate language and psychology to compel customers to behave. Understanding the emotional and cognitive triggers that cybercriminals exploit helps us higher educate the general public and defend towards such assaults.

When it comes to discuss subjects, I cowl a broad spectrum — from human elements in cybersecurity to cyber behavioural profiling, and more and more, the psychology of AI.

With the fast rise of generative AI and different superior applied sciences, how should stakeholders throughout trade and authorities recalibrate their pondering to successfully handle each danger and alternative?

With regards to applied sciences like AI, we’ve seen many false dawns — in addition to quite a lot of ethical panics. Take the emergence of ChatGPT, for example. Individuals turned excited by the novelty of chatbots, however in reality, chatbots have been round for many years.

The primary chatbot, Eliza, was developed within the Sixties. She was modelled on Rogerian psychology and was extremely efficient at eliciting info. When she requested questions like “How are you?” and adopted up with “Inform me extra about your day,” folks started sharing deeply private tales. The response was so robust that the programme was shut down pretty shortly — its inventor was reportedly horrified by how a lot folks disclosed.

Within the Nineties, I had the pleasure of working with one other chatbot, Jabberwacky, which was developed by a colleague of mine. It was an excellent and modern piece of know-how. What we’re witnessing now could be the continued evolution of this area.

As for the widespread concern that AI will replicate human intelligence and render us out of date, I stay sceptical. As a behavioural scientist, I’d level out that we don’t but totally perceive how the human mind works. The concept that we are able to replicate or substitute one thing we don’t totally comprehend is, to me, a flawed premise.

As a substitute of specializing in ‘synthetic intelligence’, I advocate for a distinct method: IIA (Intelligence Augmentation). This idea, impressed by Licklider’s Nineteen Fifties work Man-Laptop Symbiosis, proposes a mannequin wherein human and machine intelligence work symbiotically.

See also  AMD Strikes Blow in AI Chip War With OpenAI Deal

With IIA, we maintain the human on the centre of the method. That, I consider, is how we must always body our engagement with AI and machine studying – specializing in augmentation, not substitute.

Wanting forward, there are undoubtedly thrilling and important adjustments on the horizon. I’m significantly within the convergence of quantum computing, machine studying, and AI. That mixture often is the level at which we actually start to imitate points of human intelligence.

In delivering insights throughout international establishments, from NATO to the UN, what core message or shift in mindset do you most hope audiences will stroll away with after listening to you communicate?

As one of many world’s main specialists in cyber psychology, I’ve had the honour of being invited to talk at high-level boards around the globe — from the White Home to NATO, from the United Nations to INTERPOL.

When it comes to conferences, I’ve spoken at gatherings throughout the spectrum — cybersecurity, infosec, healthtech, fintech, regtech, edtech, in addition to coverage and policing boards. This breadth and depth replicate the common relevance of cyber psychology in in the present day’s digital world.

My position is to equip audiences with the data, instruments, and skillsets wanted to confront the complicated challenges that emerge on the intersection of people and know-how.

I assist folks assume in a different way — empowering them to design and deploy technology-based options to technology-facilitated issues, together with dangerous and legal on-line behaviours.

In the end, my aim is to make folks extra knowledgeable, extra assured, and higher ready to interact with know-how in a manner that’s protected, moral, and efficient.

And most significantly, I purpose to encourage collaboration, as a result of we’re all working on this shared setting of our on-line world. If we’re to make it safer and safer, it’s going to take collective accountability and international cooperation.

Photograph by Mostafa Saeed on Unsplash

This interview with Dr Mary Aiken was carried out by Mark Matthews.   

Wish to be taught extra about cybersecurity and the cloud from trade leaders? Try Cyber Security & Cloud Expo going down in Amsterdam, California, and London.

Discover different upcoming enterprise know-how occasions and webinars powered by TechForge here.

Source link

TAGGED: behaviour, Cybersecurity, Human, Intersection, technology
Share This Article
Twitter Email Copy Link Print
Previous Article Spot AI introduces the world’s first universal AI agent builder for security cameras Spot AI introduces the world’s first universal AI agent builder for security cameras
Next Article Keysource and ADCC are now officially part of the Salute brand Keysource and ADCC are now officially part of the Salute brand
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

The Wilmott Group joins Rehlko to advance critical power expertise and innovation

The Wilmott Group, a number one UK crucial specialist, has entered right into a tentative…

July 11, 2025

Accelsius partners with Nordik Data Centers

The challenge includes a co-innovation lab the place clients can validate efficiency metrics and effectivity…

February 12, 2025

How multi-link QR codes help share more with one scan

Creator: Chloe Inkspire. Chloe Inkspire is the Content material Author at Trueqrcode.Delivering the proper data…

June 12, 2025

EXFO launches native 24-fiber testers

In response to rising demand for scalable knowledge centre infrastructure, EXFO, an organization within the…

March 12, 2026

Busted by the em dash — AI’s favorite punctuation mark, and how it’s blowing your cover

Need smarter insights in your inbox? Join our weekly newsletters to get solely what issues…

August 24, 2025

You Might Also Like

Siemens enhances cybersecurity for energy infrastructures with MDR service
Infrastructure

Siemens enhances cybersecurity for energy infrastructures with MDR service

By saad
The role of AI in enterprise infrastructure operations
Cloud Computing

The role of AI in enterprise infrastructure operations

By saad
Keppel starts work on floating data centre in Singapore
Cloud Computing

Keppel starts work on floating data centre in Singapore

By saad
The last piece in the DC construction puzzle: Ongoing operations
Cloud Computing

The last piece in the DC construction puzzle: Ongoing operations

By saad

About Us

Data Center News is your dedicated source for data center infrastructure, AI compute, cloud, and industry news.

Top Categories

  • AI & Compute
  • Cloud Computing
  • Power & Cooling
  • Colocation
  • Security
  • Infrastructure
  • Sustainability
  • Industry News

Useful Links

  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

Find Us on Socials

© 2026 Data Center News. All Rights Reserved.

© 2026 Data Center News. All Rights Reserved.
Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.