Emerging Cyber Threats and Cognitive Vulnerabilities 1st edition Vladlena Benson – Ebook Instant Download/Delivery ISBN(s): 9780128162033,0128162031,9780128165942, 0128165944
Product details:
- ISBN 10:0128165944
- ISBN 13: 9780128165942
- Author:Vladlena Benson
Emerging Cyber Threats and Cognitive Vulnerabilities identifies the critical role human behavior plays in cybersecurity and provides insights into how human decision-making can help address rising volumes of cyberthreats. The book examines the role of psychology in cybersecurity by addressing each actor involved in the process: hackers, targets, cybersecurity practitioners and the wider social context in which these groups operate. It applies psychological factors such as motivations, group processes and decision-making heuristics that may lead individuals to underestimate risk. The goal of this understanding is to more quickly identify threat and create early education and prevention strategies.
Table contents:
Chapter 1. Factors leading to cyber victimization
Chapter 2. Cyberterrorism – the spectre that is the convergence of the physical and virtual worldsv
Chapter 3. Closed, safe and secure – the Russian sense of information security
Chapter 4. The social and psychological impact of cyberattacks
Chapter 5. The relationship between user religiosity and preserved privacy in the context of social media and cybersecurity
Chapter 6. Avoiding a cyber world war: rational motives for negative cooperation among the United States, China and Russia
Chapter 7. Standard operating procedures for cybercrime investigations: a systematic literature review
Chapter 8. Information and communication technologies: a curse or blessing for SMEs?
Chapter 9. Cyber personalities in adaptive target audiences
Chapter 10. Privacy issues and critical infrastructure protection
People also search:
a survey of emerging threats in cybersecurity
the emerging threat of ai-driven cyber attacks a review
what is emerging threats in cyber security
cyber security emerging threats
emerging technologies in cybersecurity