All Narratives (355)
Find narratives by ethical themes or by technologies.
FILTERreset filters-
- TechCrunch+
- 2022
This article describes a cyberattack that leaked Revolut’s user’s data using social engineering.
- TechCrunch+
- 2022
-
- TechCrunch+
- 2022
Revolut confirms cyberattack exposed personal data of tens of thousands of users
This article describes a cyberattack that leaked Revolut’s user’s data using social engineering.
Who should be responsible for protecting against cyberattacks, specifically those which involve social engineering? Other than the customers of Revolut, who is impacted by this data leak? What are the harms that this data leak could cause these customers and other stakeholders?
-
- Center for Strategic and International Studies
- 2023
This article provides a timeline of significant cyber attacks since 2006 across the globe. It focuses on cyber attacks on government agencies, defense and high-tech companies, and economic crimes with losses of more than a million dollars.
- Center for Strategic and International Studies
- 2023
Significant Cyber Incidents
This article provides a timeline of significant cyber attacks since 2006 across the globe. It focuses on cyber attacks on government agencies, defense and high-tech companies, and economic crimes with losses of more than a million dollars.
What are the global impacts of these cyberattacks? What are the risks of the increased amount of both government and personal information online? How can cyberattacks isolated to one country have the potential to impact other nations?
-
- welivesercurity by eset
- 2022
This article reviews global impact of cybersecurity attacks and the steps the US and EU have taken to combat the issue. It explains the importance of collaboration between countries to fight this issue.
- welivesercurity by eset
- 2022
Cybersecurity: A global problem that requires a global answer
This article reviews global impact of cybersecurity attacks and the steps the US and EU have taken to combat the issue. It explains the importance of collaboration between countries to fight this issue.
Besides countries’ governments, who is responsible for preventing cyber threats? What are the benefits of collaboration between countries to prevent cybercrime? What are the roadblocks to this type of collaboration? What are important social factors to consider that may prevent governments from preventing cyber attacks originating from their own borders out to the global cyberspace?
-
- The Guardian
- 2022
This article goes over the impact cybercrime has had on technology spaces in Nigeria and stresses the importance of technology students receiving cybersecurity education.
- The Guardian
- 2022
-
- The Guardian
- 2022
Opinion- Cyber security the next generation of technology. Talent is vital
This article goes over the impact cybercrime has had on technology spaces in Nigeria and stresses the importance of technology students receiving cybersecurity education.
What are the benefits of increasing cybersecurity education and diversifying the backgrounds those who choose to major in cybersecurity? How does the quality of post-secondary CS education impact the growth of the technology sector and those who are general users of the technology ecosystem? Who is responsible for ensuring there are enough technology professionals educated in cybersecurity?
-
- 10 min
- Rest of World
- 2024
This article provides an overview of griefbot culture in China. Users there, according to this article, are very satisfied with the experiences they are having with the griefbots of their loved ones.
- Rest of World
- 2024
-
- 10 min
- Rest of World
- 2024
AI “deathbots” are helping people in China grieve
This article provides an overview of griefbot culture in China. Users there, according to this article, are very satisfied with the experiences they are having with the griefbots of their loved ones.
- Why might there be a difference in the way grief bots are received in China compared to the US?
- Could griefbot technology be more effective or ethical in cultural traditions that view ancestors in the longer context of family relationships? Why or Why not?
- Deloitte
- 2022
This article goes over the current state of cybersecurity in Nigeria. It talks about cybercrime that has interfered with personal and business data privacy over the past year, how it may increase, and what is being done to protect sensistive data. The article also goes over what a deepfake is and explains that there has been a rise in deepfake cybercrime in Nigeria in 2021.
- Deloitte
- 2022
- Deloitte
- 2022
Nigeria Cybersecurity Outlook 2022
This article goes over the current state of cybersecurity in Nigeria. It talks about cybercrime that has interfered with personal and business data privacy over the past year, how it may increase, and what is being done to protect sensistive data. The article also goes over what a deepfake is and explains that there has been a rise in deepfake cybercrime in Nigeria in 2021.
Who is impacted by digital activism and what are its benefits and harms? What are the benefits and harms of using AI to prevent AI cybersecurity attacks? Are there stakeholders impacted by Nigerian cybercrime outside of Nigeria, if so who? What are some ways to repair a global reputation and demonstrate safe and secure cybersystems? Whose responsibility is it to develop a culture of accountability and trust?