Psychological and behavioral examinations in cyber security
"This book addresses the emerging importance of digital psychology and the opportunities offered by cyber researchers. It provides the resources necessary for academics, policy makers, technology developers and managers to improve cybersecurity and manage individual decision making more effecti...
Gespeichert in:
Weitere Verfasser: | , , |
---|---|
Format: | UnknownFormat |
Sprache: | eng |
Veröffentlicht: |
Hershey PA, USA
IGI Global, Information Science Reference
2018
|
Schriftenreihe: | Advances in digital crime, forensics, and cyber terrorism (ADCFCT) book series
Premier reference source |
Schlagworte: | |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | "This book addresses the emerging importance of digital psychology and the opportunities offered by cyber researchers. It provides the resources necessary for academics, policy makers, technology developers and managers to improve cybersecurity and manage individual decision making more effectively"-- Perceived privacy, security in social commerce : a comparison between UK and USA / Hemamali Tennakoon, Asia Pacific Institute of Information Technology (APIIT), City Campus -- Online decision making / Helen Wall, Edge Hill University, Linda Kaye, Edge Hill University -- Human factors leading to online fraud victimisation : literature review and exploring the role of personality traits / Jildau Borwell, Regional Intelligence Service, the National Police of the Netherlands, Jurjen Jansen, Open University of the Netherlands Cybersafety Research Group, Wouter Stol, Open University of the Netherlands, Cybersafety Research Group -- Introducing psychological concepts and methods to cybersecurity students / Jacqui Taylor, Bournemouth University, Helen Thackray, Bournemouth University, Sarah Hodge, Bournemouth University -- Volunteered surveillance, subhi sarigllü, istanbul bilgi university, erdem aksakal, istanbul bilgi university, yonca aslanbay, istanbul bilgi university -- A study of good enough security in the context of rural business process outsourcing / Reena Singh, MIT, Manipal, Hemant Jalota, DeepR Analytics -- Insiders attack analysis in building an effective cyber security for an organization / Sunita Dhavale, DIAT, Pune -- Online research methods / Linda Kaye, Edge Hill University -- Safe computing and data security / Akshay Mudgal, Manav Rachna International University, Shaveta Bhatia, Manav Rachna International University |
---|---|
Beschreibung: | Enthält 16 Beiträge |
Beschreibung: | xxiv, 334 Seiten |
ISBN: | 9781522540533 978-1-5225-4053-3 |