Muutke küpsiste eelistusi

E-raamat: Psychological and Behavioral Examinations in Cyber Security

Edited by , Edited by , Edited by
  • Formaat: PDF+DRM
  • Ilmumisaeg: 09-Mar-2018
  • Kirjastus: IGI Global
  • Keel: eng
  • ISBN-13: 9781522540540
Teised raamatud teemal:
  • Formaat - PDF+DRM
  • Hind: 277,88 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: PDF+DRM
  • Ilmumisaeg: 09-Mar-2018
  • Kirjastus: IGI Global
  • Keel: eng
  • ISBN-13: 9781522540540
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Cyber security has become a topic of concern over the past decade. As many individual and organizational activities continue to evolve digitally, it is important to examine the psychological and behavioral aspects of cyber security.

Psychological and Behavioral Examinations in Cyber Security is a critical scholarly resource that examines the relationship between human behavior and interaction and cyber security. Featuring coverage on a broad range of topics, such as behavioral analysis, cyberpsychology, and online privacy, this book is geared towards IT specialists, administrators, business managers, researchers, and students interested in online decision making in cybersecurity.
Foreword xv
Preface xvii
Acknowledgment xxiv
Chapter 1 Online Decision Making: Online Influence and Implications for Cyber Security
1(25)
Helen Joanne Wall
Linda K. Kaye
Chapter 2 Human Factors Leading to Online Fraud Victimisation: Literature Review and Exploring the Role of Personality Traits
26(20)
Jildau Borwell
Chapter 3 The "Human Factor" in Cybersecurity: Exploring the Accidental Insider
46(18)
Lee Hadlington
Chapter 4 Cyber + Culture: Exploring the Relationship
64(16)
Char Sample
Jennifer Cowley
Jonathan Z. Bakdash
Chapter 5 Examinations of Email Fraud Susceptibility: Perspectives From Academic Research and Industry Practice
80(18)
Helen S. Jones
John Towse
Chapter 6 Introducing Psychological Concepts and Methods to Cybersecurity Students
98(11)
Jacqui Taylor
Helen Thackray
Sarah E. Hodge
John McAlaney
Chapter 7 The Role of Psychology in Understanding Online Trust
109(24)
Helen S. Jones
Wendy Moncur
Chapter 8 Volunteered Surveillance
133(18)
Subhi Can Sangollu
Erdem Aksakal
Mine Galip Koca
Ece Akten
Yonca Aslanbay
Chapter 9 Psychological and Behavioral Examinations of Online Terrorism
151(21)
Sheryl Prentice
Paul J. Taylor
Chapter 10 The Role of Religiosity in Technology Acceptance: The Case of Privacy in Saudi Arabia
172(22)
Rami Mohammed Baazeem
Chapter 11 Groups Online: Hacktivism and Social Protest
194(16)
Helen Thackray
John McAlaney
Chapter 12 A Cyber-Psychological and Behavioral Approach to Online Radicalization
210(12)
Reyhan Topal
Chapter 13 Insider Attack Analysis in Building Effective Cyber Security for an Organization
222(17)
Sunita Vikrant Dhavale
Chapter 14 A Study of Good-Enough Security in the Context of Rural Business Process Outsourcing
239(14)
Reena Singh
Hemant Jalota
Chapter 15 Online Research Methods
253(13)
Linda K. Kaye
Chapter 16 Emerging Threats for the Human Element and Countermeasures in Current Cyber Security Landscape
266(6)
Vladlena Benson
John McAlaney
Lara A. Frumkin
Compilation of References 272(55)
About the Contributors 327(5)
Index 332