New perspectives in behavioral cybersecurity : human behavior and decision-making models /: human behavior and decision-making models. (2023)
- Record Type:
- Book
- Title:
- New perspectives in behavioral cybersecurity : human behavior and decision-making models /: human behavior and decision-making models. (2023)
- Main Title:
- New perspectives in behavioral cybersecurity : human behavior and decision-making models
- Further Information:
- Note: Edted by Wayne Patterson.
- Editors:
- Patterson, Wayne, 1945-
- Contents:
- Section I. Cybersecurity Concerns in the Work Environment. 1. Management and Security of Financial Data Through Integrated Software Solutions. Rozalina Dimova, Rusko Filchev and Tihomir Dovramadjiev ; 2. An Efficient Scheme For Detecting And Mitigating Insider Threats. Michael Sone and Ange Taffo ; 3. Phishing Through URLs: An Instance Based Learning Model Approach to Detecting Phishing. Gerardo I Armenta and Palvi Aggarwal ; Section II. Cybersecurity Threats to the Individual. 4. Video Games in Digital Forensics. Heba Saleous and Marton Gergely ; 5. Dances with the Illuminati: Hands-On Social Engineering in Classroom Setting. Sten Mäses; Birgy Lorenz; Kaido Kikkas; Kristjan Karmo ; 6. Studying Fake News Proliferation by Detecting Coordinated Inauthentic Behavior. William Emmanuel S. Yu ; 7. Refining the Sweeney Approach on Data Privacy. Rodney H. Cooper and Wayne Patterson ; Section III. Cybersecurity Concerns in the Home and Work Environment. 8. Cybersecurity Hygiene: Blending Home and Work Computing. Thomas Morris and Jeremiah Still ; 9. Will a Cybersecurity Mindset shift build and sustain a Cybersecurity Pipeline?. Augustine Orgah ; Section IV. Ethical Behavior. 10. Cybersecurity Behavior and Behavioral Interventions. Brandon Sloane ; Section V. Differences in Languages in Cyberattacks. 11. Using Language Differences to Detect Cyberattacks: Ukrainian and Russian. Wayne Patterson ; Section VI. Applications of Behavioral Economics to Cybersecurity. 12. Using EconomicSection I. Cybersecurity Concerns in the Work Environment. 1. Management and Security of Financial Data Through Integrated Software Solutions. Rozalina Dimova, Rusko Filchev and Tihomir Dovramadjiev ; 2. An Efficient Scheme For Detecting And Mitigating Insider Threats. Michael Sone and Ange Taffo ; 3. Phishing Through URLs: An Instance Based Learning Model Approach to Detecting Phishing. Gerardo I Armenta and Palvi Aggarwal ; Section II. Cybersecurity Threats to the Individual. 4. Video Games in Digital Forensics. Heba Saleous and Marton Gergely ; 5. Dances with the Illuminati: Hands-On Social Engineering in Classroom Setting. Sten Mäses; Birgy Lorenz; Kaido Kikkas; Kristjan Karmo ; 6. Studying Fake News Proliferation by Detecting Coordinated Inauthentic Behavior. William Emmanuel S. Yu ; 7. Refining the Sweeney Approach on Data Privacy. Rodney H. Cooper and Wayne Patterson ; Section III. Cybersecurity Concerns in the Home and Work Environment. 8. Cybersecurity Hygiene: Blending Home and Work Computing. Thomas Morris and Jeremiah Still ; 9. Will a Cybersecurity Mindset shift build and sustain a Cybersecurity Pipeline?. Augustine Orgah ; Section IV. Ethical Behavior. 10. Cybersecurity Behavior and Behavioral Interventions. Brandon Sloane ; Section V. Differences in Languages in Cyberattacks. 11. Using Language Differences to Detect Cyberattacks: Ukrainian and Russian. Wayne Patterson ; Section VI. Applications of Behavioral Economics to Cybersecurity. 12. Using Economic Prospect Theory To Quantify Side Channel Attacks. Jeremy Blackstone ; 13. A Game-Theoretic Approach to Detecting Romance Scams. Ebelechukwu Nwafor; Section VII. New Approaches for Future Research. 14. Human-Centered Artificial intelligence: Threats and Opportunities for Cybersecurity. Gloria Washington; … (more)
- Edition:
- 1st
- Publisher Details:
- Boca Raton : CRC Press
- Publication Date:
- 2023
- Extent:
- 1 online resource (192 pages), illustrations (black and white)
- Subjects:
- 005.8019
Computer security -- Psychological aspects
Internet users -- Psychology
Computer networks -- Security measures - Languages:
- English
- ISBNs:
- 9781000932904
- Notes:
- Note: Includes bibliographical references and index.
Note: Description based on CIP data; resource not viewed. - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.809499
- Ingest File:
- 21_023.xml