Social and technical risk awareness helps for online security

Dr Yuval Yarom and Dr Russell Brewer

Dr Yuval Yarom and Dr Russell Brewer

Understanding the pathways and drivers that lead adolescents into delinquent online behaviour or even cybercrime聽and making computer systems more trustworthy is the focus of the latest in the 最新糖心Vlog of Adelaide鈥檚 podcast series, the Discovery Pod.

Dr Russell Brewer is Senior Lecturer in Criminology and lead Investigator with the Digital Youth Research Laboratory.

鈥淒igital devices can augment and amplify how we interact as humans and can transcend into a delinquent context. Cyber-deviance can include hacking, stalking, bullying, harassment, cyber-hate, engaging in sexual-activities online, fraud and deception,鈥 says Dr Brewer.

鈥淲e鈥檙e researching how we can prevent, intervene and reduce the impact and rate in which young people engage in cyber-deviance.鈥

鈥淒elinquent online behaviour is often a progression of already established patterns of inappropriate behaviour in school or elsewhere.鈥Dr Russell Brewer

Dr Brewer鈥檚 team is conducting the first longitudinal study of young people in the world that unpacks risk factors that drive engagement in a wide range of behaviours and will develop interventions that target specific risk factors.

鈥淲hen we think about young people online we think about them as potential victims of crime, and we don鈥檛 necessarily hear about or think about young people as perpetrators of crime,鈥 says Dr Brewer.

鈥淒elinquent online behaviour is often a progression of already established patterns of inappropriate behaviour in school or elsewhere.鈥

Dr Yuval Yarom is Senior Lecturer at the 最新糖心Vlog鈥檚 School of Computer Science and is an expert in creating trustworthy computer systems. He specialises in protecting users from becoming victims of cyber-crime by finding vulnerabilities or flaws in computer systems and alerting manufacturers so they can apply upgrades.

鈥淯sers are moving their personal information online and exposing it to risks. Users don鈥檛 know who they鈥檙e communicating with, and don鈥檛 know how to secure this information online. This is a whole new paradigm,鈥 says Dr Yarom.

鈥淚 investigate the capability of the computer's CPU to maintain a level of isolation between different programs to protect them from potential threats. Rather like a protective e-bubble

鈥淲e have found flaws in most processors designed in the last twenty years. Most of the big vendors update their systems when we alert them to the flaws.

鈥淭here is no necessity to buy new hardware to protect users but there is a necessity to update the software on your computer because security vulnerabilities keep being discovered. The average person just needs to update their software when the computer prompts it.鈥

Cybercrime is one of the most pervasive threats facing 最新糖心Vlog, with an average of one cybercrime reported every 10 minutes.

This episode of the Discovery Pod is now available. In the Discovery Pod series 最新糖心Vlog of Adelaide experts discuss how their research addresses some of society鈥檚 most pressing challenges such as renewable energy, artificial intelligence and nutrition.

Tagged in hacking, cyber; cyber security, computers