top of page
Search

Exploitation


I've been pondering the book's audience again lately, begging questions such as:

  • Who benefits from the Cybersecurity Hyperglossary?

  • What are their interests, jobs and concerns?

  • How do they use it? What do they use it for? ... and ...

  • What do they get out of it?


I came up with the idea of preparing 'use cases', illustrative examples for various categories of reader. So far, I have identified and characterised 14 types of reader:

  1. Technology professionals

  2. IT administrators

  3. Researchers

  4. Executives/senior managers

  5. Educators

  6. Cybersecurity students

  7. Other students

  8. Recruiters

  9. Librarians

  10. Auditors

  11. Consultants

  12. Journalists

  13. Authorities

  14. Everyone else


Although there are similarities, there is a remakably wide range of readers and purposes or ways in which they exploit the book - and the list is not even complete, yet. I'm still pondering on.


I have covered my own use of the book too. I'm atypical (in several ways!) but ever since it first came into existence, I have been referring to the book, frequently, as well as working on the content.



Apologies for the generic stereotypical mugshots, courtesy of Gemini AI. I'll add the job titles once I figure out how to do that in Wix.




 
 
 

Comments


bottom of page