Atjaunināt sīkdatņu piekrišanu

E-grāmata: Cyber Influence and Cognitive Threats

Edited by (Professor, Aston Business School, Aston University, UK), Edited by (Associate Professor of Psychology, Bournemouth University, UK)
  • Formāts: EPUB+DRM
  • Izdošanas datums: 27-Sep-2019
  • Izdevniecība: Academic Press Inc
  • Valoda: eng
  • ISBN-13: 9780128192054
  • Formāts - EPUB+DRM
  • Cena: 151,21 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: EPUB+DRM
  • Izdošanas datums: 27-Sep-2019
  • Izdevniecība: Academic Press Inc
  • Valoda: eng
  • ISBN-13: 9780128192054

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

Cyber Influence and Cognitive Threats addresses the emerging challenges in cybersecurity, examining cognitive applications in decision-making, behavior and basic human interaction. The book examines the role of psychology by addressing each factor involved in the process: hackers, targets, cybersecurity practitioners, and the wider social context in which these groups operate. Readers will find interesting and useful sections on information systems, psychology, sociology, human resources, leadership, strategy, innovation, law, finance, and more.

  • Explains psychological factors inherent in machine learning and artificial intelligence
  • Discusses the social psychology of online radicalism and terrorist recruitment
  • Examines the motivation and decision-making of hackers and “hacktivists?
  • Investigates the use of personality psychology to extract secure information from individuals
Contributors ix
Preface xi
1 Cybersecurity as a social phenomenon
John McAlaney
Vladlena Benson
Social influence
1(3)
Heuristics and biases
4(2)
Exploitation
6(1)
Conclusion
7(1)
References
7(3)
2 Towards an integrated socio-technical approach for designing adaptive privacy aware services in cloud computing
Angeliki Kitsiou
Eleni Tzortzaki
Christos Kalloniatis
Stefanos Gritzalis
Introduction: privacy as a socially constructed phenomenon
10(3)
Privacy risks within Cloud Computing Environments
13(1)
Social aspects of privacy in Cloud Computing Environments
14(4)
Technical aspects of privacy in Cloud Computing Environments
18(2)
The emergence of the adaptive privacy aware systems
20(2)
Towards an integrated socio-technical approach
22(3)
Conclusion
25(2)
References
27(7)
3 Challenges of using machine learning algorithms for cybersecurity: a study of threat-classification models applied to social media communication data
Andrei Queiroz Lima
Brian Keegan
Introduction
34(16)
Acknowledgements
50(1)
References
50(2)
Further reading
52(1)
4 `Nothing up my sleeve': information warfare and the magical mindset
K. Scott
Introduction: welcome to the desert of the real
53(3)
From bullets to bytes: war in the information age
56(7)
`Pay no attention to the man behind the curtain' --- magic, misdirection and `misinformation warfare'
63(7)
Conclusion: a hogwarts for the cyber domain?
70(1)
References
71(5)
Further reading
76(2)
5 Digital hoarding behaviours: implications for cybersecurity
Nick Neave
Kerry McKellar
Elizabeth Sillence
Pam Briggs
Physical hoarding
78(1)
Digital possessions
79(2)
Digital hoarding
81(1)
Personal information management
82(1)
Implications of digital hoarding
83(2)
Our research
85(3)
Implications of digital hoarding behaviours
88(2)
Strategies for digital decluttering
90(2)
Directions for future work
92(1)
References
93(5)
6 A review of security awareness approaches: towards achieving communal awareness
Azma Alina Ali Zani
Azah Anir Norman
Norjihan Abdul Ghani
Introduction
98(1)
Designing an effective approach to increasing security awareness
99(1)
Program content and delivery method
100(1)
Underlying theory
101(1)
Methodology
102(1)
Search process
102(1)
Search terms
103(1)
Findings and discussions
104(1)
Overview of theories used
104(8)
Program contents and delivery methods
112(4)
Attaining communal learning
116(5)
Limitations
121(2)
Conclusion and future work
123(1)
Acknowledgements
123(1)
References
123(7)
7 Understanding users' information security awareness and intentions: a full nomology of protection motivation theory
Farkhondeh Hassandoust
Angsana A. Techatassanasoontorn
Introduction
130(2)
Literature review
132(2)
Research model and hypotheses
134(5)
Research methodology and pilot data analysis
139(1)
Expected contributions
140(1)
Limitations
141(1)
Conclusion
142(1)
References
142(4)
8 Social big data and its integrity: the effect of trust and personality traits on organic reach of facebook content
Vladlena Benson
Tom Buchanan
Introduction
146(1)
Conceptual background
147(3)
Case study: Buchanan and Benson (2019)
150(5)
Practical implications
155(1)
Conclusion
156(1)
References
156(2)
Further reading
158(2)
9 The impact of sentiment on content post popularity through emoji and text on social platforms
Wei-Lun Chang
Hsiao-Chiao Tseng
Introduction
160(2)
Sentiment analysis using emojis
162(8)
Methodological approach
170(9)
Discussion
179(3)
References
182(4)
10 Risk and social influence in sustainable smart home technologies: a persuasive systems design model
Nataliya Shevchuk
Harri Oinas-Kukkonen
Vladlena Benson
Introduction
186(2)
Theoretical background
188(7)
Research model and hypotheses
195(4)
Research methodology
199(1)
Data analysis and results
200(3)
Structural model and hypotheses testing
203(1)
Discussion
204(3)
Conclusion
207(1)
Appendix A survey
207(4)
References
211(6)
Index 217
Professor Vladlena Benson, leads the Cybersecurity and Innovation Partnership and the IS Research group of academics working in the areas of cyber security risk management, information and supply chain security. Professor Benson is a Founding member of the Neustar International Security Council - an industry leading forum of trust, integrity and confidentiality focused on defending against cyber threats. Vladlena has served on the Board of Directors of ISACA London and Central UK over the last three years. She has published over 100 journal papers, books, edited volumes and other publications. Vladlena's research encompasses areas of innovation actions across cybersecurity risk management, financial and VFA technologies. Her research at Aston has been supported by grants from the European Commission, GCRF, Ministry of Science and Technology (Taiwan), UK Strategic Priorities and the British Council. Having been recognized as a Women in IT Editor's Choice Award in 2017, Professor Benson continues her work in creating an inclusive space in cyber security careers. John McAlaney is a Chartered Psychologist, Chartered Scientist and Associate Professor of Psychology at Bournemouth University. He completed his undergraduate degree at the University of Stirling, his MSc at the University of Strathclyde and then his PhD at the University of West of Scotland in 2007. Dr. McAlaney's PhD was on the topic of social psychology and substance use, looking particularly at misperceptions of peer norms. Following this he worked on an AERC funded post-doc position at London School of Hygiene and Tropical Medicine before moving onto a lecturing post at the University of Bradford in 2008. He joined the Department of Psychology at Bournemouth University in 2014. Since joining Bournemouth he has collaborated extensively with colleagues in the Department of Computing and Informatics to explore psychological factors of cyber security, including participation in hacking and hacktivism, group dynamics in cyber security actors and decision making processes in relation to phishing emails and other mediums. As part of this work he collaborates extensively with government, military and commercial organisations. In 2018 he led the authorship of the British Psychological Societys briefing paper on the role of psychology in informing cybersecurity practices.