Buy The Security of Self by Emily B. Laidlaw - Bookswagon
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Law > Laws of specific jurisdictions > Entertainment and media law > The Security of Self: A Human-Centric Approach to Cybersecurity
The Security of Self: A Human-Centric Approach to Cybersecurity

The Security of Self: A Human-Centric Approach to Cybersecurity


     0     
5
4
3
2
1



International Edition


X
About the Book

Cybersecurity is a powerful concept often examined through the lens of national security and organizational risks. It however demands a deeper understanding to empower our societies-and ourselves-to thrive in the digital context.

This edited collection explores a new approach to human-centric cybersecurity: the security of self. It invites a paradigm shift where cybersecurity's core purpose is to protect people-and society-from harm, and where empowering individual and collective rights defines what it means to provide a secure cyber environment.

With a distinct Canadian focus, and case studies spanning the Internet of Things, artificial intelligence, virtual reality and social media, this collection charts a path forward for cybersecurity, grounded in law, policy and practices that advance the security of self. This collection serves as a valuable resource for researchers, policymakers, regulators and individuals seeking to understand and shape the future of human-centric cybersecurity.



Table of Contents:

About the Cover Art
List of Figures
Acknowledgements

INTRODUCTION
Conceptualizing Security of Self
Emily B. Laidlaw and Florian Martin-Bariteau

PART I: REFRAMING CYBERSECURITY NARRATIVES

Chapter 1
Whose Security Are We Talking About Anyway?
The Case of Amazon Ring
Jane Bailey, Jacquelyn Burkell, and Kristen Thomasen

1.1. Technology-Facilitated Violence as a Matter of Cybersecurity
1.2. Internet-Connected Home “Security” Systems
1.3. Toward Harm-Centric Security Approaches

Chapter 2
Bringing Security Home: The Need for a Human-Centric
Approach to Securing Smart Homes
Matthew Bush and Atefeh Mashatan

2.1. Today’s Smart Home Systems
2.2. The Human Element in Smart Homes
2.3. Gap Analysis Between the State-of-the-Art and User Expectations
2.4. Toward Shared Responsibility and a Proactive Smart Home Security Framework

Chapter 3
The Vulnerability of Emerging Technologies of the Self:
A Critical Analysis of Virtual Reality Through Psychedelic
Self‑Hacking
Jordan Loewen-Colón, Sharday Mosurinjohn, and Amarnath Amarasingam

3.1. The Critical Vulnerabilities of the Self in Virtual Reality
3.2. Hacking from the Outside In
3.3. Hacking from the Inside Out: Foucault’s “Technologies of the Self”
3.4. Securing Technologies of the Self

Chapter 4
Developing Human-Centric Informational Security
Jonathon W. Penney

4.1. Information Manipulation as a Cybersecurity Threat
4.2. The Limits of the Existing Cybersecurity Paradigm
4.3. Framing Human-Centric Informational Security
4.4. Recommendations for Policy and Research

Chapter 5
The Technology-Facilitated Insecurity of Public and Private Selves
Chris Tenove and Heidi Tworek

5.1. Harassment, Technology-Facilitated Violence, and Cybersecurity
5.2. How Platforms Facilitate Insecurity and Harm
5.3. Systemic Suggestions to Address Technology‑Facilitated Insecurity

PART II: TOWARD THE SECURITY OF SELF

Chapter 6
Achieving the Security of Self in Machine Learning: Empowering
Individuals Through Self-Security Enhancing Technologies
Sébastien Gambs

6.1. Machine Learning Privacy and Security
6.2. Auditing and Watermarking Data
6.3. Poisoning Data
6.4. Unlearning Data
6.5. Toward a New Machine Learning Security of Self Paradigm

Chapter 7
Addressing the Harms of Data Security Breaches
Teresa Scassa

7.1. Legislative Context
7.2. Class Action Lawsuits
7.3. Privacy Law and Class Actions
7.4. Private Right of Action
7.5. An Uncertain Future

Chapter 8
Algorithmic Impact Assessment: From Risk Assessments to Community Research
Fenwick McKelvey, Nick Gertler, and Alex Megelas

8.1. Algorithmic Impact Assessments
8.2. Lessons Learned from the Limits of Canada’s AIA
8.3. Toward a Community-Based Approach
8.4. Enhancing the Security of Self with Community‑Based AIA

Chapter 9
Securing Public Interest Cybersecurity Researchers in Canadian Universities
Adam Molnar

9.1. The University as a Locus for Public Interest Cybersecurity Research
9.2. The Ubiquitous Use of Computer Security Methods
9.3. Coordinated Vulnerability Reporting
9.4. Assessing the Legal Risk
9.5. Securing Research

Chapter 10
The Online Mutual Help Practices of Romance Fraud Victims
Pascale-Marie Cantin, Fyscillia Ream, and Benoît Dupont

10.1. Online Mutual Help
10.2. Data and Methods
10.3. Supporting Victims by Helping them Regain a Voice, Overcome Isolation, and Access Personal Advice
10.4. Identifying Fraudulent Profiles
10.5. Raising Awareness
10.6. Incentivizing and Regulating Mutual Help

Chapter 11
When Victims Strike Back: Online Fraud Victims’ Response to their Victimization
Fyscillia Ream, Akim Laniel-Lanani, and Benoît Dupont

11.1. Overview of Online Fraud Victimization
11.2. Vigilantism, Digilantism, and Online Victimization
11.3. Fighting Cyberfraud on Facebook
11.4. From Victim Blaming to Victim Empowerment

Biographies
Editors
Contributors



About the Author :

Amarnath Amarasingam (Contributor)
Amarnath Amarasingam is Assistant Professor in the School of Religion, and is cross-appointed to the Department of Political Studies, at Queen's University. He is also Senior Fellow with the International Centre for the Study of Radicalisation. His research interests are in terrorism, radicalization and extremism, online communities, diaspora politics, post-war reconstruction, and the sociology of religion.

Jane Bailey (Contributor)
Jane Bailey is Full Professor in Faculty of Law, Common Law Section, at the University of Ottawa where she teaches Cyberfeminism, Technoprudence and Contracts. She co-leads The eQuality Project, a 7-year SSHRC funded partnership grant focused on young people's experiences in digitally-networked environments and is a working group co-leader on The Autonomy through Cyberjustice Technologies Project, a 4-year SSHRC funded partnership grant focused on use of technology to improve access to justice. Her research focuses on TFV, particularly as perpetrated through algorithmic profiling and other practices of technology corporations and governments. She co-edited The Emerald International Handbook on Technology-facilitated Violence and Abuse, an open access publication.

Jacquelyn Burkell (Contributor)
Jacquelyn Burkell is a Full Professor in the Faculty of Information and Media Studies at the University of Western Ontario. Her research focuses on the social implications of technology, with particular reference to privacy and equality impacts. She is a co-investigator on two SSHRC Partnership grants focused on the implications of technology: the eQuality Project co-lead by Jane Bailey and Valerie Steeves, and the Autonomy Through Cyberjustice Project, where she co-leads a working group with Jane Bailey. Her research focuses on the social implications of technology, with particular attention to issues of privacy and autonomy.

Matthew Bush (Contributor)
Matthew Bush is a master's student at Toronto Metropolitan University studying computer science. He also has a background in business technology management that provides him with a unique perspective to bridge the gap between technology and people. His current research is focused on adjusting state-of-the-art organizational cybersecurity practices to the unique needs of consumer IoT environments. This includes creating access control schemes for smart homes that give individual users more control over their own data. His other research interests include secure and privacy preserving AI, zero trust architecture, and privacy preserving technologies.

Pascale-Marie Cantin (Contributor)
Pascale-Marie Cantin holds a Master's degree in Criminology, with a specialisation in forensics and information, from the Universite de Montreal, and a Certificate in cyberinvestigation from cole Polytechnique. During her studies, she was particularly interested in economic crime and the dynamics between human beings and technology. Having graduated in 2021, she is currently a stock market crime investigator.

Benot Dupont (Contributor)
Benot Dupont is a Professor of criminology at the Universite de Montreal, where he holds the Canada Research Chair in Cyber-resilience and the Endowed Research Chair for the Prevention of Cybercrime. He is the Scientific Director of the Human-Centric Cybersecurity Partnership, an interdisciplinary network of academic, government and industry partners.

Sebastien Gambs (Contributor)
Sebastien Gambs is the Canada Research Chair in Privacy and Ethical Analysis of Massive Data and a Professor in the Department of Computer Science at the Universite du Quebec Montreal. His main research theme is privacy in the digital world. He is also interested in solving long-term scientific questions such as the existing tensions between massive data analysis and privacy as well as ethical issues
such as fairness, transparency and algorithmic accountability raised by personalized systems.

Nick Gertler (Contributor)
Nick Gertler is a master's student in Media Studies at Concordia University.

Akim Laniel-Lanani (Contributor)
Akim Laniel-Lanani is Director and Cofounder of the Cybercriminoly Clinic (Clinique de cyber-criminologie), where he is in charge of the everyday activities and the supervision of the student volunteer team. With a bachelor's degree in security and police studies from the School of Criminology at the University of Montreal, he is also a candidate for the Certified Financial Crime Specialist certification.

Jordan Loewen-Coln (Contributor)
Jordan Loewen-Coln is the AI, Ethics, and Data Justice Fellow at Queen's University. His research looks at philosophy, religion, and digital technology like virtual reality (VR) and artificial intelligence (AI) to answer questions about what it means to be and feel like a human in the 21st century.

Atefeh Mashatan (Contributor)
Atefeh Mashatan is the Canada Research Chair in Quality of Security (QoS) Framework and an Associate Professor at the Ted Rogers School of Information Technology Management and Founder and Director of the Cybersecurity Research Lab at Toronto Metropolitan University
(formerly Ryerson University). Her research is focused on the development of novel cybersecurity designs based on emerging technologies. She investigates challenges and opportunities brought forward by these new technologies and how they change the threat landscape of cybersecurity. Her expertise at the frontlines of the global cybersecurity field was recognized by SC Magazine in 2019, when she was named one of the top five Women of Influence in Security globally.

Fenwick McKelvey (Contributor)
Fenwick McKelvey is Associate Professor of Information and Communication Technology Policy in the Department of Communication Studies at Concordia University. He is Co-Director of the Applied AI Institute and leads Machine Agencies at the Milieux Institute.

Alex Megelas (Contributor)
Alex Megelas is Manager, Research Innovation and Business Development at the Applied AI Institute at Concordia University.

Adam Molnar (Contributor)
Adam Molnar is Assistant Professor of Sociology and Legal Studies and a member of the Cybersecurity and Privacy Institute at the University of Waterloo. His research involves a multidisciplinary approach, using theoretical approaches and methods from social theory, computer science, law, and socio-legal studies. At present he is principal investigator of a multi-year SSHRC funded project on employee monitoring applications and the regulation of workplace surveillance and privacy in Canada.

Sharday Mosurinjohn (Contributor)
Sharday Mosurinjohn is Associate Professor of Contemporary Religious Context at Queen's University. She studies the discursive construction of spirituality and religion as well as concepts of nonreligion and secularity; specific interests include the study of "new religious movements" (NRMs), ritual, and religion and/as media. Her broad interest in the material turn touches on contexts of contemporary (especially conceptual) art; museums; everyday aesthetics; digital contexts (eg. social media; surveillance cultures), and affect.

Jonathon W. Penney (Contributor)
Jonathon Penney is a legal scholar and social scientist with an expertise at the intersection of law, technology, and human rights. He is an Associate Professor at Osgoode Hall Law School; a Faculty Associate at Harvard's Berkman Klein Center for Internet & Society; and Research Fellow at the Citizen Lab based at the University of Toronto's Munk School of Global Affairs and Public Policy. His work on privacy, security, and technology law and policy has received national and international coverage including in the CBC, Globe and Mail, Washington Post, Reuters, New York Times, WIRED, The Guardian, and Le Monde, among others.

Fyscillia Ream (Contributor)
Fyscillia Ream is a Ph.D. candidate in criminology at the University of Montreal. She is also the Scientific Coordinator at the Research Chair in Cybercrime Prevention and a cofounder of the Cyberminology clinic (Clinique de cyber-criminologie). While her dissertation lies at the intersection of organizational deviance and insider threat, she has developed expertise in cybercrime victimization.

Teresa Scassa (Contributor)
Teresa Scassa is the Canada Research Chair in Information Law and Policy and a Full Professor in the Faculty of Law, Common Law Section
at the University of Ottawa, where she is a member of the Centre for Law, Technology and Society. Her research addresses digital and data governance issues. She has written widely in the areas of privacy law, data governance, intellectual property law, law and technology, artificial intelligence, and smart cities. She is Co-Editor of the books AI and the Law in Canada (2021), Law and the Sharing Economy (2017), and The Future of Open Data (2022), and Co-Author of Digital Commerce in Canada (2020) and Canadian Intellectual Property Law (2022).

Chris Tenove (Contributor)
Chris Tenove is the deputy director of the Centre for the Study of Democratic Institutions (CSDI), and a researcher and instructor in the School of Public Policy & Global Affairs, at the University of British Columbia (UBC). He writes on the challenges that digital media pose to democracy and human rights, focusing on topics such as electoral disinformation, social media regulation, and online harassment of politicians and health communicators. He has published policy reports, book chapters, and peer-reviewed articles in journals including like Political Communication, Political Research Quarterly, and International Journal of Press/Politics.

Kristen Thomasen (Contributor)
Kristen Thomasen is an Associate Professor and the Senior Chair of Law, Robotics and Society at the University of Windsor's Faculty of Law. Her research and teaching focus on the regulation of automated technologies, privacy, and tort law. She serves as a member of the RISE Women's Legal Center Board, the LEAF Tech-Facilitated Violence Sub-Committee, and the BC Law Institute Tort Law and AI Committee. She previously served as law clerk to the Honourable Madam Justice Rosalie Abella at the Supreme Court of Canada.

Heidi Tworek (Contributor)
Heidi Tworek is the Director of the Centre for the Study of Democratic Institutions and a Canada Research Chair (Tier II) and Associate Professor of Public Policy and History at the University of British Columbia. She has published the award-winning News from Germany: The Competition to Control World Communications, 19001945 (Harvard University Press, 2019), and co-edited several volumes. She has published over forty-five journal articles and book chapters as well as many policy reports on the history and policy of communications and media. She is Senior Fellow at the Centre for International Governance Innovation and a non-resident Fellow at the German Marshall Fund of the United States and the Canadian Global Affairs Institute.

Emily B. Laidlaw (Editor)
Emily B. Laidlaw is the Canada Research Chair in Cybersecurity Law and an Associate Professor in the Faculty of Law at the University of Calgary. She is also a Senior fellow at the Centre for International Governance Innovation. She researches at the intersection of technology regulation, cybersecurity, human rights and corporate governance. She actively contributes to law reform with recent projects on online harms, mis- and disinformation, defamation law, and intimate image abuse. At present, with funding from the National Cybersecurity Consortium, she co-leads a research project on protecting democracy from cyber threats, and a training grant in cybersecurity law.

Florian Martin-Bariteau (Editor)
Florian Martin-Bariteau is the University Research Chair in Technology and Society and an Associate Professor in the Faculty of
Law, Common Law Section at the University of Ottawa, where he is the director of the Centre for Law, Technology and Society. He is co-investigator of the Human-centric Cybersecurity Partnership where he leads the "Transparency and Accountability" stream, and also a Faculty Associate of the Berkman-Klein Center for Internet and Society at Harvard University.


Best Sellers


Product Details
  • ISBN-13: 9780776645605
  • Publisher: University of Ottawa Press
  • Publisher Imprint: University of Ottawa Press
  • Height: 229 mm
  • No of Pages: 240
  • Returnable: 03
  • Width: 152 mm
  • ISBN-10: 0776645609
  • Publisher Date: 09 Dec 2025
  • Binding: Paperback
  • Language: English
  • Returnable: 03
  • Sub Title: A Human-Centric Approach to Cybersecurity


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
The Security of Self: A Human-Centric Approach to Cybersecurity
University of Ottawa Press -
The Security of Self: A Human-Centric Approach to Cybersecurity
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

The Security of Self: A Human-Centric Approach to Cybersecurity

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!