Emerging cyber threats and cognitive vulnerabilities / edited by Vladlena Benson, John Mcalaney.
Material type:
- 0128162031
- 9780128162033
- 005.8 23
- QA76.9.A25 E4658 2020
Item type | Current library | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|
![]() |
KMTC:KANGUNDO CAMPUS General Stacks | QA76.9.A25 2020 (Browse shelf(Opens below)) | Available | KDO/422 |
Shelving location: General Stacks Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
QA76.8.O58 1999 Introduction to Microcomputers and Programming | QA76.8.O58 1999 Introduction to Microcomputers and Programming | QA76.8.O58 1999 Introduction to Microcomputers and Programming | QA76.9.A25 2020 Emerging cyber threats and cognitive vulnerabilities / | QA76.9.C643P38 2021 Computer organization and design : the hardware/software interface | QA76.9.D26 H355 2008 Information modeling and relational databases / | QA76.9.D26 H355 2008 Information modeling and relational databases / |
Includes bibliographical references and index.
Factors leading to cyber victimization -- Cyberterrorism : the spectre that is the convergence of the physical and virtual worlds -- Closed, safe and secure : the Russian sense of information security -- The social and psychological impact of cyberattacks -- The relationship between user religiosity and preserved privacy in the context of social media and cybersecurity -- Avoiding a cyber world war : rational motives for negative cooperation among the United States, China and Russia -- Standard operating procedures for cybercrime -- Information and communication technologies : a curse or blessing for SMEs? -- Cyber personalities in adaptive target audiences -- Privacy issues and critical infrastructure protection.
Emerging Cyber Threats and Cognitive Vulnerabilities identifies the critical role human behavior plays in cybersecurity and provides insights into how human decision-making can help address rising volumes of cyberthreats. The book examines the role of psychology in cybersecurity by addressing each actor involved in the process: hackers, targets, cybersecurity practitioners and the wider social context in which these groups operate. It applies psychological factors such as motivations, group processes and decision-making heuristics that may lead individuals to underestimate risk. The goal of this understanding is to more quickly identify threat and create early education and prevention strategies. This book covers a variety of topics and addresses different challenges in response to changes in the ways in to study various areas of decision-making, behavior, artificial intelligence, and human interaction in relation to cybersecurity. -- Provided by publisher.
There are no comments on this title.