Muutke küpsiste eelistusi

Advances in Human Factors in Cybersecurity: Proceedings of the AHFE 2016 International Conference on Human Factors in Cybersecurity, July 27-31, 2016, Walt Disney World®, Florida, USA 1st ed. 2016 [Pehme köide]

  • Formaat: Paperback / softback, 445 pages, kõrgus x laius: 235x155 mm, kaal: 6905 g, 65 Illustrations, color; 43 Illustrations, black and white; XII, 445 p. 108 illus., 65 illus. in color., 1 Paperback / softback
  • Sari: Advances in Intelligent Systems and Computing 501
  • Ilmumisaeg: 10-Jul-2016
  • Kirjastus: Springer International Publishing AG
  • ISBN-10: 3319419315
  • ISBN-13: 9783319419312
  • Pehme köide
  • Hind: 150,61 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 177,19 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 445 pages, kõrgus x laius: 235x155 mm, kaal: 6905 g, 65 Illustrations, color; 43 Illustrations, black and white; XII, 445 p. 108 illus., 65 illus. in color., 1 Paperback / softback
  • Sari: Advances in Intelligent Systems and Computing 501
  • Ilmumisaeg: 10-Jul-2016
  • Kirjastus: Springer International Publishing AG
  • ISBN-10: 3319419315
  • ISBN-13: 9783319419312
This book reports on the latest research and developments in the field of cybersecurity, giving a special emphasis on personal security and new methods for reducing human error and increasing cyber awareness, and innovative solutions for increasing the security of advanced Information Technology (IT) infrastructures. It covers a wealth of topics, including methods for human training, novel Cyber-Physical and Process-Control Systems, social, economic and behavioral aspects of the cyberspace, issues concerning the cyber security index, security metrics for enterprises, risk evaluation, and many others. Based on the AHFE 2016 International Conference on Human Factors in Cybersecurity, held on July 27-31, 2016, in Walt Disney World®, Florida, USA, this book not only presents innovative cybersecurity technologies, but also discusses emerging threats, current gaps in the available systems and future challenges that may be coped with through the help of human factors research.

Cybersecurity Interface and Metrics.- Cybersecurity Behavior.- Cybersecurity Situational Awareness for Critical Infrastructure.- Cybersecurity Training.- Cybersecurity Research for Human Effectiveness.- Cybersecurity - Personal Security.- Cybersecurity Tools.- Cultural Factors in Cybersecurity.
Part I Cybersecurity Interface and Metrics
A Rapid Serial Visual Presentation Method for Graphical Authentication
3(10)
Ashley A. Cain
Jeremiah D. Still
Information Security Application Design: Improving Signal-to-Noise Ratio
13(6)
Saurabh Dutta
Ger Joyce
Towards More Effective Cyber Operator Interfaces Through Semantic Modeling of User Context
19(14)
Rukman Senanayake
Grit Denker
Extended Password Security via Cloud: CloudPass
33(10)
James Eich
Lalu John
Kolin Smith
Ebru Celikel Cankaya
Biometric-Based Cybersecurity Techniques
43(12)
Phillip H. Griffin
Users' Privacy Perceptions About Wearable Technology: Examining Influence of Personality, Trust, and Usability
55(14)
Karen Lamb
Hsiao-Ying Huang
Andrew Marturano
Masooda Bashir
Cyber Operator Perspectives on Security Visualization
69(16)
Anita D'Amico
Laurin Buchanan
Drew Kirkpatrick
Paul Walczak
Part II Cybersecurity Behavior
Cyber-Security: Role of Deception in Cyber-Attack Detection
85(12)
Palvi Aggarwal
Cleotilde Gonzalez
Varun Dutt
Role of Intrusion-Detection Systems in Cyber-Attack Detection
97(14)
Varun Dutt
Frederic Moisan
Cleotilde Gonzalez
Understanding the Personality Characteristics of Cybersecurity Competition Participants to Improve the Effectiveness of Competitions as Recruitment Tools
111(12)
Colin Wee
Masooda Bashir
Integrating Cultural Factors into Human Factors Framework and Ontology for Cyber Attackers
123(16)
Diane Henshel
Char Sample
Mariana Cains
Blaine Hoffman
Cognitive Performance Impact of Augmented Reality for Network Operations Tasks
139(14)
Steve Beitzel
Josiah Dykstra
Sean Huver
Michael Kaplan
Michael Loushine
Jason Youzwak
Stress and Workload Profiles of Network Analysis: Not All Tasks Are Created Equal
153(16)
Eric T. Greenlee
Gregory J. Funke
Joel S. Warm
Ben D. Sawyer
Victor S. Finomore
Vince F. Mancuso
Matthew E. Funke
Gerald Matthews
Part III Cybersecurity Situational Awareness for Critical Infrastructure
Human Capability Evaluation Approach for Cyber Security in Critical Industrial Infrastructure
169(14)
Uchenna P. Daniel Ani
Hongmei Mary He
Ashutosh Tiwari
Cybersecurity Awareness in the Power Grid
183(12)
Jean Scholtz
Lyndsey Franklin
Katya Le Blanc
Eric Andersen
Human Factor of Online Social Media Cybersecurity Risk Impact on Critical National Information Infrastructure
195(16)
Nik Zulkarnaen Khidzir
Ahmad Rasdan Ismail
Khairul Azhar Mat Daud
Mohamad Shahfik Affendi Abdul Ghani
Suriatini Ismail
Asrul Hery Ibrahim
Part IV Cybersecurity Training
The Importance of Information Security Awareness for the Success of Business Enterprises
211(12)
Ebru Yildirim
Investigating the Relationship Between Need for Cognition and Skill in Ethical Hackers
223(6)
Katya Le Blanc
Sarah Freeman
A White Hat Approach to Identifying Gaps Between Cybersecurity Education and Training: A Social Engineering Case Study
229(10)
Kimberly Young-McLear
Grant Wyman
Joseph Benin
Yamasheka Young-McLear
Influence of Motivational Factors on Hackers' and Analysts' Decisions in Dynamic Security Games
239(14)
Zahid Maqbool
V.S. Chandrasekhar Pammi
Varun Dutt
Behavioral Cybersecurity: Human Factors in the Cybersecurity Curriculum
253(14)
Wayne Patterson
Cynthia Winston
Lorraine Fleming
Developing an Insider Threat Training Environment
267(14)
Eric Ortiz
Lauren Reinerman-Jones
Gerald Matthews
Part V Cybersecurity Research for Human Effectiveness
Applying Human Factors Research Towards Cyberspace Operations: A Practitioner's Perspective
281(14)
Scott D. Lathrop
Stoney Trent
Robert Hoffman
Contextualizing Mnemonic Phrase Passwords
295(10)
Pete McEvoy
Jeremiah D. Still
Research Directions in Authentication and Personal Data
305(10)
Kirsten E. Richards
Anthony F. Norcio
Part VI Cybersecurity---Personal Security
Multi-cultural Empirical Study of Password Strength Versus Ergonomic Utility
315(12)
Monte Hancock
Federico Calderon
Mendi Drayton
Edward Stapleton
John Nida
Sam Williamson
Arvil Easter
Steve Knight
Alexander Vazquez
Rodney Wade
David Woolfolk
Tracy Hollis
Payton Brown
Swipe Authentication: Exploring Over-the-Shoulder Attack Performance
327(10)
Ashley A. Cain
Liya Chiu
Felicia Santiago
Jeremiah D. Still
"Is This Cyberbullying or Not?": Intertwining Computational Detection with Human Perception (A Case Study)
337(10)
Edward Dillon
Jamie Macbeth
Robin Kowalski
Elizabeth Whittaker
Juan E. Gilbert
Increasing Software Security by Using Mental Models
347(16)
Heike Marki
Miriam Maas
Michaela Kauer-Franz
Marius Oberle
Part VII Cybersecurity Tools
Development and Validation of the Air Force Cyber Intruder Alert Testbed (CIAT)
363(14)
Gregory Funke
Gregory Dye
Brett Borghetti
Vincent Mancuso
Eric Greenlee
Brent Miller
Lauren Menke
Rebecca Brown
Alex Vieane
Cyber Epidemics: Modeling Attacker-Defender Dynamics in Critical Infrastructure Systems
377(14)
Elisa Canzani
Stefan Pickl
Intelligent Agent Representations of Malware: Analysis to Prepare for Future Cyber Threats
391(10)
Elizabeth Whitaker
Stephen Lee-Urban
Two Complementary Network Modeling and Simulation Approaches to Aid in Understanding Advanced Cyber Threats
401(14)
Stephen Lee-Urban
Elizabeth Whitaker
Mike Riley
Ethan Trewhitt
Malware Detection Based on New Implementations of the Moody-Darken Single-Layer Perceptron Architecture: When the Data Speak, Are We Listening?
415(16)
Barry Drake
Tiffany Huang
Cari Cistola
Part VIII Cultural Factors in Cybersecurity
Assessing Aptitude and Talent for Cyber Operations
431(8)
Lelyn D. Saner
Susan Campbell
Petra Bradley
Erica Michael
Nicholas Pandza
Michael Bunting
Computer Programming as a Second Language
439
Nick B. Pandza