Exploitation
- Gary Hinson
- Mar 4
- 1 min read
I've been pondering the book's audience again lately, begging questions such as:
Who benefits from the Cybersecurity Hyperglossary?
What are their interests, jobs and concerns?
How do they use it? What do they use it for? ... and ...
What do they get out of it?
I came up with the idea of preparing 'use cases', illustrative examples for various categories of reader. So far, I have identified and characterised 14 types of reader:
Technology professionals
IT administrators
Researchers
Executives/senior managers
Educators
Cybersecurity students
Other students
Recruiters
Librarians
Auditors
Consultants
Journalists
Authorities
Everyone else
Although there are similarities, there is a remakably wide range of readers and purposes or ways in which they exploit the book - and the list is not even complete, yet. I'm still pondering on.
I have covered my own use of the book too. I'm atypical (in several ways!) but ever since it first came into existence, I have been referring to the book, frequently, as well as working on the content.
Apologies for the generic stereotypical mugshots, courtesy of Gemini AI. I'll add the job titles once I figure out how to do that in Wix.



Comments