Buch, Englisch, 196 Seiten, Format (B × H): 156 mm x 234 mm, Gewicht: 286 g
Human Behavior and Decision-Making Models
Buch, Englisch, 196 Seiten, Format (B × H): 156 mm x 234 mm, Gewicht: 286 g
ISBN: 978-1-032-54081-8
Verlag: CRC Press
This book:
• Elaborates cybersecurity concerns in the work environment and cybersecurity threats to individuals.
• Presents personality characteristics of cybersecurity attackers, cybersecurity behavior, and behavioral interventions.
• Highlights the applications of behavioral economics to cybersecurity.
• Captures the management and security of financial data through integrated software solutions.
• Examines the importance of studying fake news proliferation by detecting coordinated inauthentic behavior.
This title is an ideal read for senior undergraduates, graduate students, and professionals in fields including ergonomics, human factors, human-computer interaction, computer engineering, and psychology.
Zielgruppe
Postgraduate, Professional, and Undergraduate Advanced
Autoren/Hrsg.
Fachgebiete
Weitere Infos & Material
Section I. Cybersecurity Concerns in the Work Environment. 1. Management and Security of Financial Data Through Integrated Software Solutions. 2. An Efficient Scheme For Detecting And Mitigating Insider Threats. 3. (Figures query) Phishing Through URLs: An Instance Based Learning Model Approach to Detecting Phishing. Section II. Cybersecurity Threats to the Individual. 4. Video Games in Digital Forensics. 5. Dances with the Illuminati: Hands-On Social Engineering in Classroom Setting. 6. Studying Fake News Proliferation by Detecting Coordinated Inauthentic Behavior. 7. Refining the Sweeney Approach on Data Privacy. Section III. Cybersecurity Concerns in the Home and Work Environment. 8. Cybersecurity Hygiene: Blending Home and Work Computing. 9. Will a Cybersecurity Mindset shift build and sustain a Cybersecurity Pipeline?. Section IV. Ethical Behavior. 10. Cybersecurity Behavior and Behavioral Interventions. Section V. Differences in Languages in Cyberattacks. 11. Using Language Differences to Detect Cyberattacks: Ukrainian and Russian. Section VI. Applications of Behavioral Economics to Cybersecurity. 12. Using Economic Prospect Theory To Quantify Side Channel Attacks. 13. A Game-Theoretic Approach to Detecting Romance Scams. Section VII. New Approaches for Future Research. 14. (Unfinished?) Human-Centered Artificial intelligence: Threats and Opportunities for Cybersecurity.