ScienceOfTechnology.org
This is a website about the future; and the nature of the relationship(s) between human and machine. We shall consider the status and destiny of humankind, vis-à-vis technology; by means of a new logical, holistic and scientific approach to the design of machines, systems and computers. This site encapsulates the following topics/domains:
ScienceOfAI.com
ScienceOfVR.com
ScienceOfIoT.com
ScienceOfCybersecurity.com
ScienceOfTechnology.org
This site is dedicated to my dear friend Prof. Kim Veltman (1948-2020) who kindly inspired and supported this work over a period of 20 years. You can learn more about Kim and his amazing work here: www.sumscorp.com.
This site is also dedicated to my dear friend Prof. Francisco V. C. Ficarra who kindly supports these efforts. You can learn more about Francisco and his work here: www.alaipo.com.
N.B. PLEASE NOTE THAT THIS SITE IS NOT YET FINISHED – SEE BELOW FOR TOPIC STATUS:
Synergetic Technology: Partially complete.
Cybersecurity: Ready.
Artificial Intelligence: In preparation.
Robotics: Yet to begin.
Communication Networks: In preparation.
Virtual Reality: In preparation.
Knowledge Machines: In preparation.
Internet of Things (IoT): Ready.
ORIGINS
This site grew out of Alan Radley’s books: The Science of Cybersecurity: A Treatise on Communications Security and Self As Computer: Blueprints Visions and Dreams of Technopia. Furthermore two of Alan’s keynote papers were instrumental in the development and evolution of related ideas; including firstly: The Universal Knowledge Machine (2017); and also: The Lookable User Interface (2013).
Discussed in the aforementioned works has been how humans are merging with computers, and everywhere we see evidence of computers enabling, controlling, shaping and influencing everything we do, or can (possibly) do in both the physical and digital worlds.
Patently, computers are not doing so by themselves; but rather in every case where a computer touches/influences the human world; then a human designer, computer controller/user, lies behind the instantiated action/restriction/information-transaction etc. We are both inside and outside of computers; which surround/infuse us completely; and desired is Technopia; a ‘technological’ Gaia or nurturing home within which we can all live.
OPEN SCIENCE
Founding, building, and nurturing a Science of Technology for everyone.
We foster an open science approach to Technology; with logical concepts and accessible language that may be readily-understood by anyone; from beginners and the less technically oriented, to experienced practitioners, engineering minded professionals and advanced theoreticians/professors alike.
We extend a warm welcome to you, and an open invitation to get involved; no matter what your expertise level; and do contribute ideas, thoughts and experiences for the benefit of all.
CYBERSECURITY FRAMEWORK
In order to establish a logically coherent statement of basic theory, and to enable orderly progression of the same; we define the Science Of Cybersecurity Framework (SCF).
Whereby, the SCF comprises all of the fundamental Cybersecurity axioms, principles, concepts, events and processes etc. The upshot is a complete characterisation of the entire subject matter of Information Security.
The purpose of the SCF is not to list, in an exhaustive fashion, every possible instance of a Cybersecurity failure/vulnerability and/or protective measure; but rather to define all of the logical elements that could possibly comprise the same. In other words, the SCF seeks to identify all of the universals of Cybersecurity, in the belief that any particulars will naturally follow.
REVIEWERS
World Leading Cybersecurity Experts
Professor Richard Benham – Professor of Cybersecurity, University of Oxford.
Professor John Walker – Professor of Cybersecurity, University of Kent, University of Westminster.
Professor Paul Kearney – Professor of Cybersecurity, Birmingham University.
Professor Roy Maxion – Professor of Cybersecurity, Carnegie Mellon University.
Professor Michael Hopkins – Professor of Computer Social Responsibility, University of Geneva.
Professor Kim Veltman – Professor of New Media, Director Virtual Maastricht McLuhan Institute.
Professor Francisco V. Cipolla-Ficarra – Professor of New Media and HCI, ALAIPO.
Dr Derek S. Watchorn – Cybersecurity Researcher.
Dr Rizwan Ahmad – Cybersecurity Thought Leader.
Colonel John Doody – FCMI, FBCS, Strategic Advisor.
Commander Vic Hyder – COO, Silent Circle.
Sean McGurk – Director of the National Cybersecurity, Department of Homeland Security. Global Managing Principal for Verizon.
Ricardo Baretzky – President of European Centre for Information Policy and Security, President of The International Cyber Policing Organisation.
Arno Brok – CISM, CISSP, CISA, CEO and National Director – Australian Information Security Association (AISA).
Chuck Brooks – Principal Strategist – Cybersecurity, General Dynamics. Forbes Adviser.
Tony Collings OBE – Chairman of ECA Group Ltd, Fellow of the British Computer Society.
Bobby Woodard – Director, Information Security and Privacy, Department Of Transportation, USA.
Bruce Roberts – Director and Founder at Cyber Security Institute.
Leading Cybersecurity Experts
Kevin Hickey – President and CEO, Beyond Trust.
George Jahchan – CISA, CISM, CISSP.
Vitali Kremez – CISSP, CFE.
Pantazis Kourtis – CISM, CGEIT.
Ami (R.) Elazari – Chairmen and President – AMITEC Information Services.
Nihad Hassan – Cyber OSINT, Digital Forensics.
Michael Lester – CISO, CISM, CIPP-US/E, CIPM.
Sergiu Mesesan – Head of R&D Data Security.
David Nordell – Maritime Cybersecurity Expert.
Eugene Panferov – Thinker and Technology Philosopher.
Christian Rogan – CTO.
Harris Schwartz – CCFS.
Nigel Pugh – CEO, IMONT.
Frank Rowland – CIPS.
Michael Krausz – CSO/CISO.
Julian Cordingley – Head of Information Security at British Gas.
Kent Schramm – CISO.
Peter E. Sand – CPO.
Richard Stiennon – Chief Research Analyst.
Daniel McGarvey – CSO, Senior Principal Business Analyst.
Kevin T. McDonald – CISA, CISSP, CRISC, CBCP.
Jonathan Trull – CISO.
Marcus H. Sachs – CSO.
Ross Johnson – Infrastructure Security Manager.
Sunil Varkey – CTO.
David Jordan – CISO.
Benoit Piton – CISO / Compliance Officer.
Martin Lee – Manager (CISCO).
Laszlo Dellei – CEO, CSO. DPO, CISA, CRISC.
Ratan Jyoti – CISO.
Tony Robinson – CISO, CTO.
Ido Naor – Malware Researcher.
Anthony Scarola – CISSP, CISO.
Stuart Naisbett – Compliance Consultant.
Anand R. Prasad – Chief Security Architect.
Allan Watt – Digital Forensic Examiner.
Jonathan Coombes – CISSP, CISO.
David Marugan – Security Consultant.
Dave Brown – CISM, CISSP.
Martin Visser – General Chair – Infonomics Society.
Cedric Thevenet – Group Infrastructure CISO.
Paul Crespo – National Cybersecurity Expert, CPP.
Richard Redditt – Security Analyst.
Patric J.M.Versteeg – CISO.
Christophe Duhamel – Security Consultant.
Peter Bassill – CISO.
Carl Landwehr – Director, Centre for Democracy and Technology.
Dusko Pavlovic – Security Engineer.
Tim Burnett – Security and Compliance Officer.
Sanjay Basu – CTO, CDO.
Christophe Németh – CISSP/CISM.
Vishwa Saxena – CRISC.
BOOK SERIES
The Science of Cybersecurity – A Treatise On Communications Security – by Alan Radley.
The free digital edition is here, and the printed edition is avaliable on Amazon.
The Science of Smart Things – A Treatise On the Programmable World – by Alan Radley.
The free digital edition is here, and the printed edition is avaliable on Amazon
Sample Reviews
Excellent read! Succinct and accurate on a subject that normally wanders into tangential discussions confusing and diffusing the goal… Radley breaks down today’s hottest topic in a way that provides reference to students as well as guidance to the more learned… I found it spot on and a fine addition to the body of work on cyber-security but specifically to the discussion of privacy within communications… I see this as a reference document for students studying cyber security as well as an excellent read for CTOs, CSOs, CISOs, and CEOs laboring over how to analyze their needs for increased security… allows you to hit the highlights or dive deeper into the subject with your many charts, diagrams, and glossary of terms.
Vic Hyder – Chief Strategy Officer at Silent Circle. Commander, U.S. Navy (SEAL), retired.
Will no doubt be recognized as one of the seminal works on security, establishing definitions and clarity where others have dealt with assumptions… it is not very often that one is exposed to a work that is truly ground breaking in a field, but this is one of those works. Rather than expounding on the implementation of security as many do, Dr. Alan Radley astutely asks (and then suggests an answer for) the rather naive, yet deceptively complex question “What is security?”, or more precisely “How does one characterize a communication system for secure data transfer?” As Dr. Radley examines this question, the reader becomes aware that the answer is much more elusive than one first assumes.
As Dr. Radley builds a working compendium of definitions needed to examine the issue, the reader becomes more and more aware that the current vernacular is insufficient for discussing secure communication at a philosophical level, and if we cannot agree on what it means to be secure or private in thought, how can we accomplish it in act? It is here, laying the foundation of formal definition of socially secure communication, that Dr. Radley’s work is groundbreaking and will no doubt be referenced by many works to come.
Michael Lester – MSEE, MBA, CIPP/US, CISM. Chief Information Security-Officer/ Vice President, Magenic.
As cyber education evolves to meet the pace of change in our digital world so does the need for good reference books.. a timely and spot on publication that I shall be recommending to my students; well done Dr Radley.
Professor Richard Benham – National Cyber Skills Centre, UK.
An excellent read and would definitely recommend this to our AISA members as a way to get a different perspective on security.
Arno Brok – Chief Information Security Officer – Australian Information Security Association.
In a world full of privacy breaches, Radley timely develops a framework that delves into complexity of technical and human-centric factors that affect our perception of privacy and cybersecurity. I recommend this book to everyone who is interested in making our cyber world more secure.
Vitali Kremez – CyberCrime Investigative Analyst.
The book provides the reader with an accurate and objective view of the life-cycle of the exposures and vulnerabilities which are associated with the technological shadow cast over all individuals, and organisations. This is a unique piece of work… an excellent read, and deserves a place on every security professional’s bookshelf who is seeking a balanced and objective view of the current, and futuristic Cyber Security Landscape.
Professor John Walker – Nottingham Trent University.
Alan Radley makes sense of the complexities which ordinarily restrict this topic to IT people only… required reading for anyone focused on secure and private communication… What’s more, Alan’s no-nonsense approach and fearless honesty, is refreshing. I recommend this to those interested in making certain that their communication is more private, secure and resilient.
Bill Montgomery – CEO – Connect In Private.
A brilliant book! Did it make me wiser? Yes…
Pantazis Kourtis – Member of the Board of Directors at London Chapter at ISACA.
I commend this book to a wide readership. Well done Sir, more please.
Tony Collings OBE -Chairman – The ECA Group.
A very concise body of work, that belies its length for the practical application of useful data in a highly complex area… should be required reading for anyone providing third party services whereby their security claims cannot be held up without transparency. Ignore this work at your peril.
Christian Rogan – Vice President, Royal Holloway Enterprise Centre.
I highly recommend this book for individuals interested in understanding the challenges facing the security and information assurance specialist. Dr. Radley’s direct approach provides an excellent read and can enable valuable insights into an extremely complex topic such as security.
Dr Merrick S. Watchorn – DMIST – Chief Cyber Security Analysis (Cloud SME), Science Applications International Corporation (SAIC – [Technology Arm of NSA]), Virginia, USA.