Who Are We In the Cyber World?

Mary Aiken is the world’s leading expert in forensic cyber-psychology, a discipline that combines psychology, criminology, and technology to investigate the intersection where technology and human behavior meet.

In this, her first book, Aiken has created a starting point for all future conversations about how the Internet is shaping development and behavior, societal norms and values, children, safety, security, and our perception of the world. Cyberspace is an environment full of surveillance, but who is looking out for us? The Cyber Effect offers a fascinating and chilling look at a future we can still do something about.

Drawing on her own research and extensive experience with law enforcement, Mary Aiken covers a wide range of subjects from the impact of screens on the developing child to the explosion of teen sexting, and the acceleration of compulsive and addictive behaviors online, gaming, shopping, pornography.

She examines the escalation of cyber-chondria (anxiety produced by self-diagnosing online), cyberstalking, and organized cybercrime in the Deep Web.

Aiken provides surprising statistics and incredible-but-true case studies of hidden trends that are shaping our culture and raising troubling questions about where the digital revolution is taking us.
 
The Cyber Effect will upend your assumptions about your online life and forever change the way you think about the technology you, your friends, and family use. Readers will gain a new understanding of the rapid change taking shape around us and come away with critical tools to become part of this very necessary conversation.

Amazon: 

« Thai Cyber Bank Fraud Gang Busted
Cyber Vulnerability Identified In Major Weapons Systems »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

BaseN

BaseN

BaseN is a full stack IoT Operator. We control the full value chain in order to provide ultimate scalability, fault tolerance and security to our customers.

Armadillo Sec

Armadillo Sec

Armadillo provide penetration testing and vulnerability assessment services.

CSI

CSI

CSI is a Managed Service Provider (MSP) delivering Hybrid Multi-Cloud, Data Protection, and Cyber Security solutions to highly regulated industries.

RevenueStream

RevenueStream

RevenueStream uses an innovative algorithmic approach to intercept and prevent payment fraud before it even happens.

Vaulto Technologies

Vaulto Technologies

Vaulto protects critical business processes that are conducted via the cellular network.

MACH37

MACH37

MACH37 is a market-centric cybersecurity accelerator program designed to facilitate the creation of the next generation of cybersecurity product companies.

Data Terminator

Data Terminator

Data Terminator provide a comprehensive range of secure data destruction equipment and services are in compliance to US Department of Defense (DoD) and National Security Agency (NSA) standards.

Cysiv

Cysiv

Cysiv SOC-as-a-Service combines all the elements of an advanced, proactive, threat hunting SOC, with a managed security stack for hybrid cloud, network, and endpoint security.

Adlumin

Adlumin

Adlumin Inc. provides the enterprise-grade security operations platform and managed detection and response services that keep mid-market organizations secure.

Communicate Technology

Communicate Technology

Communicate Technology are IT, telecoms and cyber-security specialists, keeping over 500 businesses and 50,000 users connected and secure across the UK.

NXM Labs

NXM Labs

NXM is a leader in a leader in advanced cybersecurity software for connected devices.

Guardz

Guardz

Guardz helps small and growing businesses to go from zero or low cyber protection to having comprehensive security – in the quickest and most straightforward way.

TrueBees

TrueBees

TrueBees is the first deepfakes detector able to detect AI-generated portraits shared on social media and to prevent their diffusion across the web.

L&T Technology Services (LTTS)

L&T Technology Services (LTTS)

L&T Technology Services Limited (LTTS) is a global leader in Engineering and R&D (ER&D) services.

Viatel Technology Group

Viatel Technology Group

Viatel Technology Group is a complete digital services provider. We have over 26 years’ experience delivering fully managed security, networking, cloud and communications services.

Elitery

Elitery

Elitery is an IT-managed service company that focuses on cloud and cybersecurity services.