Atjaunināt sīkdatņu piekrišanu

E-grāmata: Psychological and Behavioral Examinations in Cyber Security

Edited by , Edited by , Edited by
  • Formāts: PDF+DRM
  • Izdošanas datums: 09-Mar-2018
  • Izdevniecība: IGI Global
  • Valoda: eng
  • ISBN-13: 9781522540540
Citas grāmatas par šo tēmu:
  • Formāts - PDF+DRM
  • Cena: 267,68 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: PDF+DRM
  • Izdošanas datums: 09-Mar-2018
  • Izdevniecība: IGI Global
  • Valoda: eng
  • ISBN-13: 9781522540540
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

Cyber security has become a topic of concern over the past decade. As many individual and organizational activities continue to evolve digitally, it is important to examine the psychological and behavioral aspects of cyber security.

Psychological and Behavioral Examinations in Cyber Security is a critical scholarly resource that examines the relationship between human behavior and interaction and cyber security. Featuring coverage on a broad range of topics, such as behavioral analysis, cyberpsychology, and online privacy, this book is geared towards IT specialists, administrators, business managers, researchers, and students interested in online decision making in cybersecurity.
Foreword xv
Preface xvii
Acknowledgment xxiv
Chapter 1 Online Decision Making: Online Influence and Implications for Cyber Security
1(25)
Helen Joanne Wall
Linda K. Kaye
Chapter 2 Human Factors Leading to Online Fraud Victimisation: Literature Review and Exploring the Role of Personality Traits
26(20)
Jildau Borwell
Chapter 3 The "Human Factor" in Cybersecurity: Exploring the Accidental Insider
46(18)
Lee Hadlington
Chapter 4 Cyber + Culture: Exploring the Relationship
64(16)
Char Sample
Jennifer Cowley
Jonathan Z. Bakdash
Chapter 5 Examinations of Email Fraud Susceptibility: Perspectives From Academic Research and Industry Practice
80(18)
Helen S. Jones
John Towse
Chapter 6 Introducing Psychological Concepts and Methods to Cybersecurity Students
98(11)
Jacqui Taylor
Helen Thackray
Sarah E. Hodge
John McAlaney
Chapter 7 The Role of Psychology in Understanding Online Trust
109(24)
Helen S. Jones
Wendy Moncur
Chapter 8 Volunteered Surveillance
133(18)
Subhi Can Sangollu
Erdem Aksakal
Mine Galip Koca
Ece Akten
Yonca Aslanbay
Chapter 9 Psychological and Behavioral Examinations of Online Terrorism
151(21)
Sheryl Prentice
Paul J. Taylor
Chapter 10 The Role of Religiosity in Technology Acceptance: The Case of Privacy in Saudi Arabia
172(22)
Rami Mohammed Baazeem
Chapter 11 Groups Online: Hacktivism and Social Protest
194(16)
Helen Thackray
John McAlaney
Chapter 12 A Cyber-Psychological and Behavioral Approach to Online Radicalization
210(12)
Reyhan Topal
Chapter 13 Insider Attack Analysis in Building Effective Cyber Security for an Organization
222(17)
Sunita Vikrant Dhavale
Chapter 14 A Study of Good-Enough Security in the Context of Rural Business Process Outsourcing
239(14)
Reena Singh
Hemant Jalota
Chapter 15 Online Research Methods
253(13)
Linda K. Kaye
Chapter 16 Emerging Threats for the Human Element and Countermeasures in Current Cyber Security Landscape
266(6)
Vladlena Benson
John McAlaney
Lara A. Frumkin
Compilation of References 272(55)
About the Contributors 327(5)
Index 332