As you pursue the basic questions, you'll find yourself looking at specific threats, and the means (mechanisms, technologies, techniques) of addressing them.
Bruce Schneier and Freedom to Tinker are other good starting points -- ports of entry, not your be-all, end-all.
More broadly, this "start from a broad question, follow the implications" approach to research is a useful one in general.
What is within control?
What is outside it?
What are the risks of both non-action and action.
Sean Gallagher's "Threaty McThreatface" model is actually among the better high-level approaches I've seen:
• Who am I, and what am I doing here?
• Who or what might try to mess with me, and how?
• How much can I stand to do about it?
• Rinse and repeat.
https://arstechnica.com/information-technology/2017/07/how-i...
See also EFF:
https://ssd.eff.org/en/module/introduction-threat-modeling
As you pursue the basic questions, you'll find yourself looking at specific threats, and the means (mechanisms, technologies, techniques) of addressing them.
Bruce Schneier and Freedom to Tinker are other good starting points -- ports of entry, not your be-all, end-all.
More broadly, this "start from a broad question, follow the implications" approach to research is a useful one in general.