https://wonderful-field-06520ea00.3.azurestaticapps.net/ https://kuaci.southeastasia.cloudapp.azure.com/slot-starlight-princess/ https://sukuna.southeastasia.cloudapp.azure.com/slot-situs-jepang/ https://gojosatoru.southeastasia.cloudapp.azure.com/situs-slot-kamboja/ https://gojosatoru.southeastasia.cloudapp.azure.com/pola-slot-gacor/ https://sukuna.southeastasia.cloudapp.azure.com/slot-sensa/ https://gojosatoru.southeastasia.cloudapp.azure.com/slot-jarwo/ https://sukuna.southeastasia.cloudapp.azure.com/slot-pg-soft/ https://gojosatoru.southeastasia.cloudapp.azure.com/slot-terpercaya/ https://sukuna.southeastasia.cloudapp.azure.com/slot-tanpa-vpn/ https://sukuna.southeastasia.cloudapp.azure.com/ https://sukuna.southeastasia.cloudapp.azure.com/starlight-princess/ https://gojosatoru.southeastasia.cloudapp.azure.com/ https://gojosatoru.southeastasia.cloudapp.azure.com/slot-pg-soft/ https://migraineatwork.org/rtp-live/ https://kuaci.southeastasia.cloudapp.azure.com/ https://dorsekgacor.sgp1.cdn.digitaloceanspaces.com/mpored-slot.html https://makima.southeastasia.cloudapp.azure.com/pola-slot-starlight-princess/ https://panciwarteg.southeastasia.cloudapp.azure.com/mpored/ https://makima.southeastasia.cloudapp.azure.com/situs-slot-gacor/ https://slot-demo.southeastasia.cloudapp.azure.com/ https://berkah.southeastasia.cloudapp.azure.com/ https://cincinmas.sgp1.cdn.digitaloceanspaces.com/situs-slot-mahjong.html https://cincinmas.sgp1.cdn.digitaloceanspaces.com/pola-slot-starlight-princess.html https://makima.southeastasia.cloudapp.azure.com/ https://www.reparatucoche.com/slot-gacor-online/ https://panciwarteg.southeastasia.cloudapp.azure.com/ https://reparatucoche.com/slot-gates-of-olympus/ https://www.anjolee.com/slot-server-luar-negeri/index.html https://qolac.com/slot-server-luar-negeri/ https://derma-express.com/situs-slot-gacor/ https://www.devilstone.net/slot-gacor/index.html https://www.backlinesoccer.com/ situs slot gacor slot gacor hari ini

Open Access Opinion

Anthropological Take on Cyber-security: How a Legacy Security Belief System is Impacting Us Today

Susan Squires* and Jamie Johnson

Department of Anthropology, University of North Texas, USAa

Corresponding Author

Received Date: April 29, 2020;  Published Date: May 12, 2020

Abstract

Between 70% and 97% of all cyber breaches can be attributed directly or indirectly to human errors (Ponemon Institute 2018) [1]. In this opinion piece, we explore the archeology of cyber-security embedded in 20th century legacy belief and its artifacts.

Citation
Signup for Newsletter
Scroll to Top