New Perspectives in Behavioral Cybersecurity
New Perspectives in Behavioral Cybersecurity
Human Behavior and Decision-Making Models
Patterson, Wayne
Taylor & Francis Ltd
09/2023
176
Dura
Inglês
9781032414775
15 a 20 dias
Descrição não disponível.
Section I. Cybersecurity Concerns in the Work Environment. 1. Management and Security of Financial Data Through Integrated Software Solutions. 2. An Efficient Scheme For Detecting And Mitigating Insider Threats. 3. (Figures query) Phishing Through URLs: An Instance Based Learning Model Approach to Detecting Phishing. Section II. Cybersecurity Threats to the Individual. 4. Video Games in Digital Forensics. 5. Dances with the Illuminati: Hands-On Social Engineering in Classroom Setting. 6. Studying Fake News Proliferation by Detecting Coordinated Inauthentic Behavior. 7. Refining the Sweeney Approach on Data Privacy. Section III. Cybersecurity Concerns in the Home and Work Environment. 8. Cybersecurity Hygiene: Blending Home and Work Computing. 9. Will a Cybersecurity Mindset shift build and sustain a Cybersecurity Pipeline?. Section IV. Ethical Behavior. 10. Cybersecurity Behavior and Behavioral Interventions. Section V. Differences in Languages in Cyberattacks. 11. Using Language Differences to Detect Cyberattacks: Ukrainian and Russian. Section VI. Applications of Behavioral Economics to Cybersecurity. 12. Using Economic Prospect Theory To Quantify Side Channel Attacks. 13. A Game-Theoretic Approach to Detecting Romance Scams. Section VII. New Approaches for Future Research. 14. (Unfinished?) Human-Centered Artificial intelligence: Threats and Opportunities for Cybersecurity.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
information assurance;social engineering tactics;data privacy strategies;financial data security;coordinated inauthentic behavior;prospect theory applications;behavioral interventions in cybersecurity
Section I. Cybersecurity Concerns in the Work Environment. 1. Management and Security of Financial Data Through Integrated Software Solutions. 2. An Efficient Scheme For Detecting And Mitigating Insider Threats. 3. (Figures query) Phishing Through URLs: An Instance Based Learning Model Approach to Detecting Phishing. Section II. Cybersecurity Threats to the Individual. 4. Video Games in Digital Forensics. 5. Dances with the Illuminati: Hands-On Social Engineering in Classroom Setting. 6. Studying Fake News Proliferation by Detecting Coordinated Inauthentic Behavior. 7. Refining the Sweeney Approach on Data Privacy. Section III. Cybersecurity Concerns in the Home and Work Environment. 8. Cybersecurity Hygiene: Blending Home and Work Computing. 9. Will a Cybersecurity Mindset shift build and sustain a Cybersecurity Pipeline?. Section IV. Ethical Behavior. 10. Cybersecurity Behavior and Behavioral Interventions. Section V. Differences in Languages in Cyberattacks. 11. Using Language Differences to Detect Cyberattacks: Ukrainian and Russian. Section VI. Applications of Behavioral Economics to Cybersecurity. 12. Using Economic Prospect Theory To Quantify Side Channel Attacks. 13. A Game-Theoretic Approach to Detecting Romance Scams. Section VII. New Approaches for Future Research. 14. (Unfinished?) Human-Centered Artificial intelligence: Threats and Opportunities for Cybersecurity.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.