Cyber Influence and Cognitive Threats

Cyber Influence and Cognitive Threats
Author :
Publisher : Academic Press
Total Pages : 240
Release :
ISBN-10 : 9780128192054
ISBN-13 : 0128192054
Rating : 4/5 (54 Downloads)

Synopsis Cyber Influence and Cognitive Threats by : Vladlena Benson

In the wake of fresh allegations that personal data of Facebook users have been illegally used to influence the outcome of the US general election and the Brexit vote, the debate over manipulation of social Big Data continues to gain more momentum. Cyber Influence and Cognitive Threats addresses various emerging challenges in response to cybersecurity, examining cognitive applications in decision-making, behaviour and basic human interaction. The book examines the role of psychology in cybersecurity by addressing each factor involved in the process: hackers, targets, cybersecurity practitioners, and the wider social context in which these groups operate. Cyber Influence and Cognitive Threats covers a variety of topics including information systems, psychology, sociology, human resources, leadership, strategy, innovation, law, finance and others. - Explains psychological factors inherent in machine learning and artificial intelligence - Explores attitudes towards data and privacy through the phenomena of digital hoarding and protection motivation theory - Discusses the role of social and communal factors in cybersecurity behaviour and attitudes - Investigates the factors that determine the spread and impact of information and disinformation

Emerging Cyber Threats and Cognitive Vulnerabilities

Emerging Cyber Threats and Cognitive Vulnerabilities
Author :
Publisher : Academic Press
Total Pages : 254
Release :
ISBN-10 : 9780128165942
ISBN-13 : 0128165944
Rating : 4/5 (42 Downloads)

Synopsis Emerging Cyber Threats and Cognitive Vulnerabilities by : Vladlena Benson

Emerging Cyber Threats and Cognitive Vulnerabilities identifies the critical role human behavior plays in cybersecurity and provides insights into how human decision-making can help address rising volumes of cyberthreats. The book examines the role of psychology in cybersecurity by addressing each actor involved in the process: hackers, targets, cybersecurity practitioners and the wider social context in which these groups operate. It applies psychological factors such as motivations, group processes and decision-making heuristics that may lead individuals to underestimate risk. The goal of this understanding is to more quickly identify threat and create early education and prevention strategies. This book covers a variety of topics and addresses different challenges in response to changes in the ways in to study various areas of decision-making, behavior, artificial intelligence, and human interaction in relation to cybersecurity. - Explains psychological factors inherent in machine learning and artificial intelligence - Discusses the social psychology of online radicalism and terrorist recruitment - Examines the motivation and decision-making of hackers and "hacktivists" - Investigates the use of personality psychology to extract secure information from individuals

Psychological and Behavioral Examinations in Cyber Security

Psychological and Behavioral Examinations in Cyber Security
Author :
Publisher : IGI Global
Total Pages : 358
Release :
ISBN-10 : 9781522540540
ISBN-13 : 1522540547
Rating : 4/5 (40 Downloads)

Synopsis Psychological and Behavioral Examinations in Cyber Security by : McAlaney, John

Cyber security has become a topic of concern over the past decade. As many individual and organizational activities continue to evolve digitally, it is important to examine the psychological and behavioral aspects of cyber security. Psychological and Behavioral Examinations in Cyber Security is a critical scholarly resource that examines the relationship between human behavior and interaction and cyber security. Featuring coverage on a broad range of topics, such as behavioral analysis, cyberpsychology, and online privacy, this book is geared towards IT specialists, administrators, business managers, researchers, and students interested in online decision making in cybersecurity.

Quantifying the Effect of Cognitive Biases on Security Decision-making

Quantifying the Effect of Cognitive Biases on Security Decision-making
Author :
Publisher :
Total Pages : 188
Release :
ISBN-10 : OCLC:1090354472
ISBN-13 :
Rating : 4/5 (72 Downloads)

Synopsis Quantifying the Effect of Cognitive Biases on Security Decision-making by : Tahani Albalawi

Recently, characteristics of human behavior have created a new important source for attackers. The attackers' attention shifted from the direct machine attacks that require breaking the underlying cryptography to target human vulnerability to get access to the information. Despite problems that human vulnerability has created, the human role has received too little attention in security domain. The role of humans is often neglected in favor of technical solutions in the cyber security equation. This may be due to a lack of understanding of human vulnerability. The technical side is clearly an essential part of cyber security, but people are also strongly involved in the information security. The technical side is more identifiable but human behavior is still very important. Fortunately, Social Engineering Security is changing the way we look at computer security. The main pillar of this field is how human psychological factors can influence humans to make bad or irrational decisions. People's irrational judgments (human error) are often caused by cognitive biases (CB) which are tendencies to think irrationally in certain types of situations. The awareness of CB goes back to the early 1970s when the psychologists Kahneman and Tversky showed there might be a gap between how humans should make a decision and how they actually make a decision. CB is often connected with two aspects first, some limitation in processing knowledge that caused by the Cognitive load (CL), which is related to human neutrality and the second aspect, is the usability of the system. Usability of a system is one of the causes of people's biases in decisions. On the other hand people's security decisions in the domain of cyber security are also closely tied to usability. The mismatch between security and usability goals contributes to making inappropriate security-related decisions. Clearly, we can see that the security decision-making is a result of three overlapping factors: security, usability and CB. Studies have been focused on evaluating the security polices and techniques. The focus of these evaluations is on the intentional threats that result from a malicious intent of access. The unintentional threat that results from human error has not received the necessary attention. Thus, this study focuses on the security threats that relate to human error with the non-malicious and legal intent. This dissertation has several contributions to current research in the security field: First, it pays attention to the security threats that relate to human error and result from non-malicious legal intent. It addresses the human error that leads to the unintentional threat by exploring human cognitive processes in the context of cyber security. Since the human error is resulting from three overlapping factors, security, usability and CB, this research also studies the relation between these factors. It explores the links between security decision-making and usability, as well as illustrating the cognitive processing and reasoning behind the end-user decision by depicting the concept set that leads the end-user to make a specific decision. For this part, a mental model has been proposed for peoples' decision-making toward security and usability. To construct the model, a crowd-sourcing technique and a cognitive map approach are used, and an experiment is performed to evaluate the findings using Amazon Mturk. Second, this dissertation quantifies the individual's security decision-making under the influence of cognitive biases, with full consideration of usability factors. For these purposes, another experiment is conducted involving 54 participants who performed multiple security tasks. An eye-tracking machine is used to record cognitive measurements that are used for decision analysis. The proposed model for security decision is derived from the Multi Criteria Decision Analysis (MCDA) approach. In the decision-making context, the MCDA is a technique, which provides formal methods to analyze decisions that involve different or contradicting factors.

Cyberspace and National Security

Cyberspace and National Security
Author :
Publisher : Georgetown University Press
Total Pages : 258
Release :
ISBN-10 : 9781589019195
ISBN-13 : 1589019199
Rating : 4/5 (95 Downloads)

Synopsis Cyberspace and National Security by : Derek S. Reveron

In a very short time, individuals and companies have harnessed cyberspace to create new industries, a vibrant social space, and a new economic sphere that are intertwined with our everyday lives. At the same time, individuals, subnational groups, and governments are using cyberspace to advance interests through malicious activity. Terrorists recruit, train, and target through the Internet, hackers steal data, and intelligence services conduct espionage. Still, the vast majority of cyberspace is civilian space used by individuals, businesses, and governments for legitimate purposes. Cyberspace and National Security brings together scholars, policy analysts, and information technology executives to examine current and future threats to cyberspace. They discuss various approaches to advance and defend national interests, contrast the US approach with European, Russian, and Chinese approaches, and offer new ways and means to defend interests in cyberspace and develop offensive capabilities to compete there. Policymakers and strategists will find this book to be an invaluable resource in their efforts to ensure national security and answer concerns about future cyberwarfare.

Cyber-Security and Threat Politics

Cyber-Security and Threat Politics
Author :
Publisher : Routledge
Total Pages : 336
Release :
ISBN-10 : 9781134086696
ISBN-13 : 1134086695
Rating : 4/5 (96 Downloads)

Synopsis Cyber-Security and Threat Politics by : Myriam Dunn Cavelty

This book explores the political process behind the construction of cyber-threats as one of the quintessential security threats of modern times in the US. Myriam Dunn Cavelty posits that cyber-threats are definable by their unsubstantiated nature. Despite this, they have been propelled to the forefront of the political agenda. Using an innovative theoretical approach, this book examines how, under what conditions, by whom, for what reasons, and with what impact cyber-threats have been moved on to the political agenda. In particular, it analyses how governments have used threat frames, specific interpretive schemata about what counts as a threat or risk and how to respond to this threat. By approaching this subject from a security studies angle, this book closes a gap between practical and theoretical academic approaches. It also contributes to the more general debate about changing practices of national security and their implications for the international community.

Cognitive Hack

Cognitive Hack
Author :
Publisher : CRC Press
Total Pages : 181
Release :
ISBN-10 : 9781498749824
ISBN-13 : 1498749828
Rating : 4/5 (24 Downloads)

Synopsis Cognitive Hack by : James Bone

This book explores a broad cross section of research and actual case studies to draw out new insights that may be used to build a benchmark for IT security professionals. This research takes a deeper dive beneath the surface of the analysis to uncover novel ways to mitigate data security vulnerabilities, connect the dots and identify patterns in the data on breaches. This analysis will assist security professionals not only in benchmarking their risk management programs but also in identifying forward looking security measures to narrow the path of future vulnerabilities.

Forensic Perspectives on Cybercrime

Forensic Perspectives on Cybercrime
Author :
Publisher : Taylor & Francis
Total Pages : 148
Release :
ISBN-10 : 9781003850625
ISBN-13 : 1003850626
Rating : 4/5 (25 Downloads)

Synopsis Forensic Perspectives on Cybercrime by : John McAlaney

Forensic Perspectives on Cybercrime is the first book to combine the disciplines of cyberpsychology and forensic psychology, helping to define this emergent area. It explores the psychological factors that influence the behaviour of all those involved in cybersecurity, drawing upon the research literatures in relevant areas including forensic, social, and cyberpsychology. Written by leading figures in the field, the book provides an introduction to the cybercrime ecosystem, before discussing the psychological manipulation of targets through social engineering techniques and highlighting the unique threats that this type of attack presents. The reasons why people become involved in hacking are explored, and the authors review research literature on risk factors of being a victim of cybercrime, along with the concept of resilience. Behaviour change and prevention strategies are also evaluated, as well as the role of emergent technologies such as artificial intelligence and what this may mean for the role of humans in cybersecurity. Case studies and real-world examples are woven throughout to illustrate key issues, opportunities, and challenges. This unique text is a must-read for students undertaking any degree that relates to behaviour and cybersecurity, including psychology, computing, law, and business management. It is also highly relevant to researchers, practitioners, and policymakers who work in cybersecurity and/or have an interest in empowering people to be safe online.

Transformational Interventions for Business, Technology, and Healthcare

Transformational Interventions for Business, Technology, and Healthcare
Author :
Publisher : IGI Global
Total Pages : 608
Release :
ISBN-10 : 9798369316351
ISBN-13 :
Rating : 4/5 (51 Downloads)

Synopsis Transformational Interventions for Business, Technology, and Healthcare by : Burrell, Darrell Norman

In today's complex world, the intersection of inclusion, equity, and organizational efficiency has reached unprecedented levels, driven by events like the great resignation, the emergence of workplace cultures such as #MeToo and Bro culture, and societal movements like Black Lives Matter and pandemic-exposed disparities. This convergence highlights the urgent need for transformative change in healthcare, education, business, and technology. Organizations grapple with issues like racial bias in Artificial Intelligence, fostering workplace psychological safety, and conflict management. The escalating demands for diversity and inclusivity present a pressing challenge, necessitating holistic solutions that harness collective perspectives to drive real progress. Transformational Interventions for Business, Technology, and Healthcare emerges as a beacon for academic scholars seeking actionable insights. Dr. Burrell's two decades of university teaching experience, combined with a prolific record of academic publications and presentations, uniquely positions them to lead the way. The book, through an interdisciplinary lens, addresses the intricate challenges of our times, offering innovative solutions to reshape organizations and promote inclusivity. Covering topics such as workplace intersectionality, technology's impact on equity, and organizational behavior dynamics, this comprehensive resource directly addresses scholars at the forefront of shaping our future. By dissecting problems and providing evidence-based solutions, the book empowers readers to contribute significantly to the ongoing dialogue on inclusion, equity, and organizational development, making it a guiding light as the call for change reverberates across industries.

Proceedings of the 5th Brazilian Technology Symposium

Proceedings of the 5th Brazilian Technology Symposium
Author :
Publisher : Springer Nature
Total Pages : 640
Release :
ISBN-10 : 9783030575489
ISBN-13 : 3030575489
Rating : 4/5 (89 Downloads)

Synopsis Proceedings of the 5th Brazilian Technology Symposium by : Yuzo Iano

This book presents the proceedings of the 5th Edition of the Brazilian Technology Symposium (BTSym). This event brings together researchers, students and professionals from the industrial and academic sectors, seeking to create and/or strengthen links between issues of joint interest, thus promoting technology and innovation at nationwide level. The BTSym facilitates the smart integration of traditional and renewable power generation systems, distributed generation, energy storage, transmission, distribution and demand management. The areas of knowledge covered by the event are Smart Designs, Sustainability, Inclusion, Future Technologies, IoT, Architecture and Urbanism, Computer Science, Information Science, Industrial Design, Aerospace Engineering, Agricultural Engineering, Biomedical Engineering, Civil Engineering, Control and Automation Engineering, Production Engineering, Electrical Engineering, Mechanical Engineering, Naval and Oceanic Engineering, Nuclear Engineering, Chemical Engineering, Probability and Statistics.