000 | 03255nam a22003617a 4500 | ||
---|---|---|---|
001 | 31723 | ||
003 | OSt | ||
005 | 20250616142105.0 | ||
008 | 190930s2020 enk ob 001 0 eng d | ||
020 |
_a9780128165942 _q(electronic bk.) |
||
020 |
_a0128165944 _q(electronic bk.) |
||
020 | _z9780128162033 | ||
020 | _z0128162031 | ||
040 |
_aYDX _beng _epn _cYDX |
||
082 | 0 | 4 |
_a005.8 _223 _bE53 |
245 | 0 | 0 |
_aEmerging cyber threats and cognitive vulnerabilities / _cedited by Vladlena Benson, John Mcalaney. |
264 | 1 |
_aLondon, United Kingdom ; _aSan Diego, CA, United States : _bAcademic Press, _c2020. |
|
300 |
_axiii, 237 pages ; _c23 cm . |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
504 | _aIncludes bibliographical references and index. | ||
505 | 0 | _aContributors -- Preface -- 1. Factors leading to cyber victimization -- 2. Cyberterrorism -- the spectre that is the convergence of the physical and virtual worlds -- 3. Closed, safe and secure -- the Russian sense of information security -- 4. The social and psychological impact of cyberattacks -- 5. The relationship between user religiosity and preserved privacy in the context of social media and cybersecurity -- 6. Avoiding a cyber world war: rational moves for negative cooperation among the United States, China and Russia -- 7. Standard operating procedures for cybercirme investigations: a systematic literature review -- 8. Information and communication technologies: a curse or blessing for SMEs? -- 9. Cyber personalities in adaptive target audiences -- 10. Privacy issues and critical infrastructure protection -- Index. | |
520 | _aEmerging Cyber Threats and Cognitive Vulnerabilities identifies the critical role human behavior plays in cybersecurity and provides insights into how human decision-making can help address rising volumes of cyberthreats. The book examines the role of psychology in cybersecurity by addressing each actor involved in the process: hackers, targets, cybersecurity practitioners and the wider social context in which these groups operate. It applies psychological factors such as motivations, group processes and decision-making heuristics that may lead individuals to underestimate risk. The goal of this understanding is to more quickly identify threat and create early education and prevention strategies. This book covers a variety of topics and addresses different challenges in response to changes in the ways in to study various areas of decision-making, behavior, artificial intelligence, and human interaction in relation to cybersecurity. -- Provided by publisher. | ||
588 | 0 | _aPrint version record; online resource viewed February 22, 2021. | |
650 | 4 | _aComputer security. | |
655 | 4 | _aElectronic books. | |
700 | 1 |
_aBenson, Vladlena, _d1976- _eeditor. |
|
700 | 1 |
_aMcAlaney, John, _d1979- _eeditor. |
|
776 | 0 | 8 |
_iPrint version: _tEmerging cyber threats and cognitive vulnerabilities. _dLondon, United Kingdom ; San Diego, CA, United States : Academic Press, [2020] _z0128162031 _w(OCoLC)1098377180 |
910 | _asaja | ||
942 |
_2ddc _cBK |
||
999 |
_c31723 _d31723 |