Cyber Influence and Cognitive Threats addresses the emerging challenges in cybersecurity, examining cognitive applications in decision-making, behavior and basic human interaction. The book examines the role of psychology by addressing each factor involved in the process: hackers, targets, cybersecurity practitioners, and the wider social context in which these groups operate. Readers will find interesting and useful sections on information systems, psychology, sociology, human resources, leadership, strategy, innovation, law, finance, and more.
- Explains psychological factors inherent in machine learning and artificial intelligence
- Discusses the social psychology of online radicalism and terrorist recruitment
- Examines the motivation and decision-making of hackers and hacktivists?
- Investigates the use of personality psychology to extract secure information from individuals
Contributors |
|
ix | |
Preface |
|
xi | |
|
1 Cybersecurity as a social phenomenon |
|
|
|
|
|
|
1 | (3) |
|
|
4 | (2) |
|
|
6 | (1) |
|
|
7 | (1) |
|
|
7 | (3) |
|
2 Towards an integrated socio-technical approach for designing adaptive privacy aware services in cloud computing |
|
|
|
|
|
|
|
Introduction: privacy as a socially constructed phenomenon |
|
|
10 | (3) |
|
Privacy risks within Cloud Computing Environments |
|
|
13 | (1) |
|
Social aspects of privacy in Cloud Computing Environments |
|
|
14 | (4) |
|
Technical aspects of privacy in Cloud Computing Environments |
|
|
18 | (2) |
|
The emergence of the adaptive privacy aware systems |
|
|
20 | (2) |
|
Towards an integrated socio-technical approach |
|
|
22 | (3) |
|
|
25 | (2) |
|
|
27 | (7) |
|
3 Challenges of using machine learning algorithms for cybersecurity: a study of threat-classification models applied to social media communication data |
|
|
|
|
|
|
34 | (16) |
|
|
50 | (1) |
|
|
50 | (2) |
|
|
52 | (1) |
|
4 `Nothing up my sleeve': information warfare and the magical mindset |
|
|
|
|
Introduction: welcome to the desert of the real |
|
|
53 | (3) |
|
From bullets to bytes: war in the information age |
|
|
56 | (7) |
|
`Pay no attention to the man behind the curtain' --- magic, misdirection and `misinformation warfare' |
|
|
63 | (7) |
|
Conclusion: a hogwarts for the cyber domain? |
|
|
70 | (1) |
|
|
71 | (5) |
|
|
76 | (2) |
|
5 Digital hoarding behaviours: implications for cybersecurity |
|
|
|
|
|
|
|
|
78 | (1) |
|
|
79 | (2) |
|
|
81 | (1) |
|
Personal information management |
|
|
82 | (1) |
|
Implications of digital hoarding |
|
|
83 | (2) |
|
|
85 | (3) |
|
Implications of digital hoarding behaviours |
|
|
88 | (2) |
|
Strategies for digital decluttering |
|
|
90 | (2) |
|
Directions for future work |
|
|
92 | (1) |
|
|
93 | (5) |
|
6 A review of security awareness approaches: towards achieving communal awareness |
|
|
|
|
|
|
|
98 | (1) |
|
Designing an effective approach to increasing security awareness |
|
|
99 | (1) |
|
Program content and delivery method |
|
|
100 | (1) |
|
|
101 | (1) |
|
|
102 | (1) |
|
|
102 | (1) |
|
|
103 | (1) |
|
|
104 | (1) |
|
Overview of theories used |
|
|
104 | (8) |
|
Program contents and delivery methods |
|
|
112 | (4) |
|
Attaining communal learning |
|
|
116 | (5) |
|
|
121 | (2) |
|
Conclusion and future work |
|
|
123 | (1) |
|
|
123 | (1) |
|
|
123 | (7) |
|
7 Understanding users' information security awareness and intentions: a full nomology of protection motivation theory |
|
|
|
|
Angsana A. Techatassanasoontorn |
|
|
|
130 | (2) |
|
|
132 | (2) |
|
Research model and hypotheses |
|
|
134 | (5) |
|
Research methodology and pilot data analysis |
|
|
139 | (1) |
|
|
140 | (1) |
|
|
141 | (1) |
|
|
142 | (1) |
|
|
142 | (4) |
|
8 Social big data and its integrity: the effect of trust and personality traits on organic reach of facebook content |
|
|
|
|
|
|
146 | (1) |
|
|
147 | (3) |
|
Case study: Buchanan and Benson (2019) |
|
|
150 | (5) |
|
|
155 | (1) |
|
|
156 | (1) |
|
|
156 | (2) |
|
|
158 | (2) |
|
9 The impact of sentiment on content post popularity through emoji and text on social platforms |
|
|
|
|
|
|
160 | (2) |
|
Sentiment analysis using emojis |
|
|
162 | (8) |
|
|
170 | (9) |
|
|
179 | (3) |
|
|
182 | (4) |
|
10 Risk and social influence in sustainable smart home technologies: a persuasive systems design model |
|
|
|
|
|
|
|
186 | (2) |
|
|
188 | (7) |
|
Research model and hypotheses |
|
|
195 | (4) |
|
|
199 | (1) |
|
Data analysis and results |
|
|
200 | (3) |
|
Structural model and hypotheses testing |
|
|
203 | (1) |
|
|
204 | (3) |
|
|
207 | (1) |
|
|
207 | (4) |
|
|
211 | (6) |
Index |
|
217 | |
Professor Vladlena Benson, leads the Cybersecurity and Innovation Partnership and the IS Research group of academics working in the areas of cyber security risk management, information and supply chain security. Professor Benson is a Founding member of the Neustar International Security Council - an industry leading forum of trust, integrity and confidentiality focused on defending against cyber threats. Vladlena has served on the Board of Directors of ISACA London and Central UK over the last three years. She has published over 100 journal papers, books, edited volumes and other publications. Vladlena's research encompasses areas of innovation actions across cybersecurity risk management, financial and VFA technologies. Her research at Aston has been supported by grants from the European Commission, GCRF, Ministry of Science and Technology (Taiwan), UK Strategic Priorities and the British Council. Having been recognized as a Women in IT Editor's Choice Award in 2017, Professor Benson continues her work in creating an inclusive space in cyber security careers. John McAlaney is a Chartered Psychologist, Chartered Scientist and Associate Professor of Psychology at Bournemouth University. He completed his undergraduate degree at the University of Stirling, his MSc at the University of Strathclyde and then his PhD at the University of West of Scotland in 2007. Dr. McAlaney's PhD was on the topic of social psychology and substance use, looking particularly at misperceptions of peer norms. Following this he worked on an AERC funded post-doc position at London School of Hygiene and Tropical Medicine before moving onto a lecturing post at the University of Bradford in 2008. He joined the Department of Psychology at Bournemouth University in 2014. Since joining Bournemouth he has collaborated extensively with colleagues in the Department of Computing and Informatics to explore psychological factors of cyber security, including participation in hacking and hacktivism, group dynamics in cyber security actors and decision making processes in relation to phishing emails and other mediums. As part of this work he collaborates extensively with government, military and commercial organisations. In 2018 he led the authorship of the British Psychological Societys briefing paper on the role of psychology in informing cybersecurity practices.