This article is published in the issue.

Cybersecurity- Transcending Physics, Technology, and Society