Cyber Influence and Cognitive Threats

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

In the wake of fresh allegations that personal data of  Facebook users have been illegally used to influence the outcome of the US general election and the Brexit vote, the debate over manipulation of social Big Data continues to gain more momentum. Cyber Influence and Cognitive Threats addresses various emerging challenges in response to cybersecurity, examining cognitive applications in decision-making, behaviour and basic human interaction. The book examines the role of psychology in cybersecurity by addressing each factor involved in the process: hackers, targets, cybersecurity practitioners, and the wider social context in which these groups operate.

Cyber Influence and Cognitive Threats covers a variety of topics including information systems, psychology, sociology, human resources, leadership, strategy, innovation, law, finance and others.

Author(s): Vladlena Benson, John Mcalaney
Publisher: Academic Press
Year: 2019

Language: English
Pages: 238
City: London

Front-Matter_2020_Cyber-Influence-and-Cognitive-Threats
Cyber Influence and Cognitive ThreatsEdited byVladlena BensonUniversity of West London, London, United KingdomJohn Mcalaney ...
Copyright_2020_Cyber-Influence-and-Cognitive-Threats
Copyright
Contributors_2020_Cyber-Influence-and-Cognitive-Threats
Contributors
Preface_2020_Cyber-Influence-and-Cognitive-Threats
Preface
Chapter-1---Cybersecurity-as-a-social-ph_2020_Cyber-Influence-and-Cognitive-
1 . Cybersecurity as a social phenomenon
Social influence
Heuristics and biases
Exploitation
Conclusion
References
Chapter-2---Towards-an-integrated-socio-technical-appr_2020_Cyber-Influence-
2 . Towards an integrated socio-technical approach for designing adaptive privacy aware services in cloud computing
Introduction: privacy as a socially constructed phenomenon
Privacy risks within Cloud Computing Environments
Social aspects of privacy in Cloud Computing Environments
Social identity
Social capital
Technical aspects of privacy in Cloud Computing Environments
The emergence of the adaptive privacy aware systems
Towards an integrated socio-technical approach
Conclusion
References
Chapter-3---Challenges-of-using-machine-learning-algorith_2020_Cyber-Influen
3 . Challenges of using machine learning algorithms for cybersecurity: a study of threat-classification models applied to socia ...
Introduction
Cybersecurity using social media as open source of information
Why is social media communication important for cybersecurity?
Learning-based approaches and processing techniques applied to textual communications
Supervised approach
Unsupervised and semisupervised approach
Preprocessing social media content
Noise removal
Tokenization
Normalization
Stemming
Stop words removal
Vector transformation
Model evaluation and metrics
Use cases for learning-based model in cybersecurity problems
Detection of messages regarding vulnerabilities and exploitation of software products
Detection of hacker services and exploitation tools on marketplaces
The influential hackers of a forum are main topics
Sentiment analysis of hacker of hacker message
Challenges of data-driven research in cybersecurity and ethical considerations
Ethical consideration for using social media in cybersecurity research
Acknowledgements
References
Further reading
Chapter-4----Nothing-up-my-sleeve---Information-_2020_Cyber-Influence-and-Co
4 . ‘Nothing up my sleeve’: information warfare and the magical mindset
Introduction: welcome to the desert of the real
From bullets to bytes: war in the information age
‘Pay no attention to the man behind the curtain’ – magic, misdirection and ‘misinformation warfare'
Conclusion: a hogwarts for the cyber domain?
References
Further reading
Chapter-5---Digital-hoarding-behaviours--Implic_2020_Cyber-Influence-and-Cog
5 . Digital hoarding behaviours: implications for cybersecurity
Physical hoarding
Digital possessions
Digital hoarding
Personal information management
Implications of digital hoarding
Our research
Implications of digital hoarding behaviours
Strategies for digital decluttering
Directions for future work
References
Chapter-6---A-review-of-security-awareness-approac_2020_Cyber-Influence-and-
6 . A review of security awareness approaches: towards achieving communal awareness
Introduction
Designing an effective approach to increasing security awareness
Program content and delivery method
Underlying theory
Methodology
Search process
Search terms
Findings and discussions
Overview of theories used
RQ1: What theories are applied when designing the current approaches to increasing security awareness?
Program contents and delivery methods
RQ2: What program contents and delivery methods are used in the designs of the approaches to increasing security awareness?
Attaining communal learning
RQ3: Do the theory, content and delivery method chosen promote communal learning in an organization?
Limitations
Conclusion and future work
Acknowledgements
References
Chapter-7---Understanding-users--information-security-awareness_2020_Cyber-I
7 . Understanding users' information security awareness and intentions: a full nomology of protection motivation theory11The pr ...
Introduction
Literature review
Research model and hypotheses
Research methodology and pilot data analysis
Expected contributions
Limitations
Conclusion
References
Chapter-8---Social-big-data-and-its-integrity--The-effe_2020_Cyber-Influence
8 . Social big data and its integrity: the effect of trust and personality traits on organic reach of facebook content
Introduction
Conceptual background
Trust
Risk propensity
Personality traits
Case study: Buchanan and Benson (2019)
Practical implications
Conclusion
References
Further reading
Chapter-9---The-impact-of-sentiment-on-content-post-_2020_Cyber-Influence-an
9 . The impact of sentiment on content post popularity through emoji and text on social platforms
Introduction
Sentiment analysis using emojis
Sentiment and popularity model
Emoji sentiment expression
Textual sentiment factor
Article popularity
Individual article popularity model
Topic popularity model
Methodological approach
Data collection
Sentiment analysis
Popularity of individual topics and joint-topic articles
Influence of emoji and textual sentiments
Discussion
Implications for practice
Limitations
References
Chapter-10---Risk-and-social-influence-in-sustainable_2020_Cyber-Influence-a
10 . Risk and social influence in sustainable smart home technologies: a persuasive systems design model
Introduction
Theoretical background
Proenvironmental behaviour research in IS
Smart metering
Persuasive systems design
Self-disclosure
Perceived risk
Adaptation level theory
Theoretical framework
Research model and hypotheses
Research methodology
Instrument development and measurement of constructs
Data analysis and results
Assessment of measurement model
Structural model and hypotheses testing
Discussion
Conclusion
Appendix A survey
References
Index_2020_Cyber-Influence-and-Cognitive-Threats
Index
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
R
S
T
U
V
W