Contributors |
|
xi | |
|
I Social engineering, security, and cyber attacks |
|
|
|
1 Social engineering attacks and defenses in the physical world vs. cyberspace: A contrast study |
|
|
|
|
|
|
|
3 | (4) |
|
2 Terminology and methodology |
|
|
7 | (3) |
|
3 Characterizing social engineering attack model, techniques, and defenses in the physical world |
|
|
10 | (7) |
|
4 Characterizing social engineering attack model, techniques, and defenses in cyberspace |
|
|
17 | (14) |
|
|
31 | (2) |
|
|
33 | (10) |
|
|
34 | (1) |
|
|
34 | (9) |
|
2 A dual integrated dynamic intrusion detection system (DID-IDS) for protection against network and social engineering attacks |
|
|
|
|
|
|
|
43 | (1) |
|
2 Detection of information system and social engineering intrusion attacks |
|
|
44 | (1) |
|
3 Prior computer system intrusion detection systems |
|
|
45 | (1) |
|
4 Prior social engineering intrusion detection methods |
|
|
45 | (1) |
|
5 A new dual integrated dynamic intrusion detection system (DID-IDS) |
|
|
46 | (5) |
|
|
48 | (3) |
|
3 Working from home users at risk of COVID-19 ransomware attacks |
|
|
|
|
|
|
|
51 | (2) |
|
|
53 | (4) |
|
3 Challenges and issues with ransomware |
|
|
57 | (3) |
|
4 Ransomware attack vectors |
|
|
60 | (4) |
|
5 Existing defense mechanism and control gaps |
|
|
64 | (3) |
|
6 Mitigation model against ransomware |
|
|
67 | (13) |
|
7 Regular and consistent data backup |
|
|
80 | (1) |
|
|
81 | (8) |
|
|
83 | (6) |
|
4 Individual differences in cyber security behavior using personality-based models to predict susceptibility to sextortion attacks |
|
|
|
|
|
|
89 | (1) |
|
2 Social engineering and cyber sextortion |
|
|
90 | (3) |
|
3 Personality-based models |
|
|
93 | (3) |
|
|
96 | (1) |
|
|
97 | (4) |
|
|
101 | (7) |
|
|
108 | (3) |
|
|
111 | (4) |
|
|
111 | (4) |
|
5 Deconstructing security and privacy issues: The development of a logic for capturing mismorphisms |
|
|
|
|
|
|
|
115 | (3) |
|
2 A brief background on semiotics |
|
|
118 | (2) |
|
3 A semiotic model for mismorphisms |
|
|
120 | (1) |
|
|
121 | (1) |
|
5 A logic for mismorphisms |
|
|
122 | (4) |
|
6 A preliminary catalog of mismorphisms |
|
|
126 | (4) |
|
|
130 | (3) |
|
|
133 | (6) |
|
|
133 | (6) |
|
II Behavioral studies of cybersecurity |
|
|
|
6 Are you anonymous? Social-psychological processes of hacking groups |
|
|
|
|
|
139 | (1) |
|
|
140 | (2) |
|
|
142 | (2) |
|
4 Interpersonal perception |
|
|
144 | (2) |
|
|
146 | (5) |
|
6 Informed decision making |
|
|
151 | (1) |
|
|
152 | (5) |
|
|
152 | (5) |
|
7 On the relation between hacking and autism or autistic traits: A systematic review of the scientific evidence |
|
|
|
|
|
|
|
157 | (13) |
|
|
170 | (1) |
|
|
171 | (18) |
|
4 Conclusions and future directions |
|
|
189 | (8) |
|
|
192 | (4) |
|
|
196 | (1) |
|
8 An introduction to cyberbullying |
|
|
|
|
|
|
|
1 A brief overview of traditional bullying |
|
|
197 | (1) |
|
2 The emergence of digital technologies and cyberbullying |
|
|
198 | (1) |
|
3 Definitional issues of cyberbullying |
|
|
199 | (4) |
|
4 Unique features of cyberbullying |
|
|
203 | (2) |
|
5 The different forms of cyberbullying |
|
|
205 | (1) |
|
6 The prevalence of cyberbullying |
|
|
206 | (1) |
|
7 The impact of cyberbullying |
|
|
207 | (1) |
|
|
208 | (7) |
|
|
209 | (6) |
|
9 The impact of cyberbullying across the lifespan |
|
|
|
|
|
215 | (3) |
|
2 The impact of involvement in cyberbullying during the elementary years |
|
|
218 | (1) |
|
3 The impact of involvement in cyberbullying during adolescence |
|
|
219 | (6) |
|
4 The impact of involvement in cyberbullying during emerging adulthood |
|
|
225 | (1) |
|
5 The impact of involvement in cyberbullying during adulthood |
|
|
226 | (2) |
|
6 Challenges associated with understanding the impact of cyberbullying |
|
|
228 | (1) |
|
|
229 | (6) |
|
|
230 | (5) |
|
10 Cyber situational awareness issues and challenges |
|
|
|
|
|
|
|
|
|
|
235 | (3) |
|
2 The technological perspective |
|
|
238 | (6) |
|
3 The socio-cognitive perspective |
|
|
244 | (3) |
|
4 The organizational perspective |
|
|
247 | (2) |
|
5 Reasoning about adversarial behavior |
|
|
249 | (5) |
|
|
254 | (1) |
|
|
255 | (1) |
|
|
256 | (1) |
|
Appendix A Interview methodology |
|
|
256 | (11) |
|
|
259 | (8) |
|
11 Development and application of the Information Security Core Human Error Causes (IS-CHEC) technique |
|
|
|
|
|
|
|
|
267 | (2) |
|
|
269 | (20) |
|
|
289 | (2) |
|
4 Conclusions and future work |
|
|
291 | (8) |
|
|
292 | (7) |
|
III Machine learning and modeling applications to cybersecurity |
|
|
|
12 Machine learning for the security of healthcare systems based on Internet of Things and edge computing |
|
|
|
|
|
|
1 Big data in health care |
|
|
299 | (5) |
|
2 Privacy-preserving machine learning |
|
|
304 | (7) |
|
3 Securing IoMT from ML-based attacks |
|
|
311 | (10) |
|
|
318 | (1) |
|
|
318 | (3) |
|
13 Lying trolls: Detecting deception and text-based disinformation using machine learning |
|
|
|
|
|
|
|
321 | (1) |
|
|
322 | (2) |
|
|
324 | (8) |
|
|
332 | (4) |
|
|
336 | (3) |
|
|
337 | (2) |
|
14 Modeling the effects of network size in a deception game involving honeypots |
|
|
|
|
|
|
|
|
339 | (3) |
|
|
342 | (1) |
|
|
343 | (2) |
|
|
345 | (2) |
|
|
347 | (3) |
|
|
350 | (7) |
|
|
353 | (4) |
|
15 Computational modeling of decisions in cyber-security games in the presence or absence of interdependence information |
|
|
|
|
|
|
|
357 | (3) |
|
|
360 | (1) |
|
|
361 | (1) |
|
|
362 | (1) |
|
|
363 | (2) |
|
6 Execution of IBL model in the security game |
|
|
365 | (1) |
|
|
366 | (1) |
|
|
367 | (2) |
|
|
369 | (2) |
|
|
369 | (1) |
|
|
369 | (2) |
Index |
|
371 | |