Me in 10 seconds
I am an
computer scientist whose work is focused at the intersection between humans and technology.
Outside of my academic life I write about societies increasing addiction to technology, and decreasing concern for privacy.
I love nature and the outdoors and spend most weekends on long walks or adventures with my family and pet Dalmatian.
Me in 10 minutes
I am a
computer scientist whose work primarily focuses on digital privacy and security. For my
PhD I explored the perception and awareness of secure and insecure behaviour and developed a multi-modal interface to improve cyber situational awareness. I currently teach digital privacy and security at Robert Gordon University
In addition to my academic research I also write about challenges at the intersection between humans and technology. Specifically, societies increasing addiction to technology, and decreasing concern for privacy. My aim with this writing is to inspire critical thinking. Thinking that is
informed by evidence. By promoting awareness of these issues and encouraging people to live more intentionally with technology, I hope to help people think before trading their freedom and privacy for convenience.
I would like to invite you to consider a new philosophy I propose called
Digital Balance. A philosophy which encourages you to rethink how you use technology, so you can become happier, healthier, and more productive. Specifically, I will show you how to optimise your use of technology to ensure that all your digital interactions are safe, secure and support the values and ambitions you hold.
This site is, however, more than a blog. It hosts all of my writing on Digital:
Minimalism. But, also highlights the concerns around digital health and the strategies you can use to achieve
Digital Balance. In addition, my aim is to engage in topical debate, and inspire critical thinking. Thinking that is clear, rational, open-minded, and informed by evidence.
Finally, if you would like receive exclusive advice and insights on this topic, you should definitely join my growing newsletter, the
McDermott Musings. Every Monday, I send out an exclusive email where I share some thoughts about subjects I’ve been pondering, along with links to books, articles and videos which I think you will find interesting.
Sign up for my Mailing list
Where did the name
aRtFuL eNiGmA come from
The name was inspired by a character in Charles Dickens' 1838 novel Oliver Twist. The Artful Dodger was a pickpocket, so called for his skill and cunning in that occupation.
Artful (adjective) in clever and skilful ways
Enigma (noun) a person or thing that is mysterious or difficult to understand
Since I value my freedom and privacy I try to cultivate skills which promote a healthy relationship with technology and protect my online prescence, thus maintain my privacy and security.
What I am thinking about
For those who are new to my work, I’ve created a short summary of the main ideas I explore in my writing.
Human-centred Security:By understanding humans and their interaction with technologies, controls and data I explore the circumstances where psychological-related errors may lead to security incidents. Attackers have been using methods of psychological manipulation to coerce humans into making errors for years. I seek to understand and manage psychological vulnerabilities, and explore technology and controls that are designed with human behaviour in mind.
Human commoditisation through technology:I am interested in exploring the mismatch between our natural human sensitivities and the exponential growth, power and influence of technology. I seek to raise awareness about the massive extraction and monetisation of our thoughts, emotions, and actions; and the resultant harmful side effects, such as our need for social validation, and breakdown of truth.
Human dependance on technology:Technology has permeated into every area of our lives. However, a severe over reliance, or an addiction to certain facets of its use, can have devastating effects on our health. While technology can fulfil our natural human need for stimulation and interaction, it can also impact the pleasure systems of the brain, and be used as a boredom buster, social lubricant, or escape from reality. I seek to explore ways to be more intentional with our use of technology, using it to support our goals and values, rather than letting it use us.
What I am working on now
I am currently exploring the issues highlighted above and assimilating these into an appropriate philosophy and associated strategies.
My aim is to help us optimise our use of technology such that all our digital interactions are safe, healthy and support the values and ambitions we each hold.
See more here: philosophy
Selected Published work
M. Nicho, C. D McDermott, “Dimensions of ‘Socio’ Vulnerabilities of Advanced Persistent Threats" In 2019 27th International Conference on Software, Telecommunications and Computer Networks (SoftCOM), 2019 (submitted)
McDermott, Christopher D, John P. Isaacs., 2019. Towards a Conversational Agent for Threat Detection in the Internet of Things. In 2019 International Conference On Cyber Situational Awareness, Data Analytics And Assessment, Cyber SA 2019.
McDermott, Christopher D., John P. Isaacs, and Andrei V. Petrovski., 2018. Evaluating User Awareness and Perception of Security and Privacy within the Internet of Things (IoT). Informatics (Human Factors in Security and Privacy in IoT (HFSP-IoT)), Vol. 5.
McDermott, C. D., Haynes, W. & Petrovski, A. V., 2018. Threat Detection and Analysis in the Internet of Things using Deep Packet Inspection. International Journal on Cyber Situational Awareness, Vol. 3, No. 1, pp. 61-83.
McDermott, C.D. et al., 2018. Towards Situational Awareness of Botnet Activity in the Internet of Things. In 2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment, Cyber SA 2018.
McDermott, C.D. et al., 2018. Botnet Detection in the internet of Things using Deep Learning Approaches. In 2018 International Joint Conference on Neural Networks.
McDermott, C.D., & Petrovski, A., 2017. Investigation of Computational Intelligence Techniques for Intrusion Detection in Wireless Sensor Networks. International Journal of Computer Networks & Communications (IJCNC), 9(4), pp.45-56.
Get in touch
Much of my time is taken up with my family life, academic career and personal writing. As such, I am harder to reach than most and don’t give out a general purpose email address or use any social media (apart from LinkedIn ).
The best way to get in touch is through my Mailing list