Wayne Patterson, Cynthia E. Winston-Proctor
Behavioral Cybersecurity
Fundamental Principles and Applications of Personality Psychology
Wayne Patterson, Cynthia E. Winston-Proctor
Behavioral Cybersecurity
Fundamental Principles and Applications of Personality Psychology
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book discusses the role of human personality in the study of behavioral cybersecurity for non-specialists.
Andere Kunden interessierten sich auch für
- Ning WangDevelopment of a Remote Laboratory for Engineering Education32,99 €
- Goutam PaulRC4 Stream Cipher and Its Variants94,99 €
- Visual Cryptography and Secret Image Sharing152,99 €
- Hu XiongIntroduction to Certificateless Cryptography69,99 €
- Ke HuangDesign and Analysis of Cryptographic Algorithms in Blockchain69,99 €
- Robert J. HanyokSkunks, Bogies, Silent Hounds, and the Flying Fish23,99 €
- Chintan PatelInternet of Things Security85,99 €
-
-
-
This book discusses the role of human personality in the study of behavioral cybersecurity for non-specialists.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: CRC Press
- Seitenzahl: 190
- Erscheinungstermin: 26. August 2024
- Englisch
- Abmessung: 216mm x 140mm x 10mm
- Gewicht: 247g
- ISBN-13: 9780367509804
- ISBN-10: 0367509806
- Artikelnr.: 71230424
- Verlag: CRC Press
- Seitenzahl: 190
- Erscheinungstermin: 26. August 2024
- Englisch
- Abmessung: 216mm x 140mm x 10mm
- Gewicht: 247g
- ISBN-13: 9780367509804
- ISBN-10: 0367509806
- Artikelnr.: 71230424
Dr. Wayne Patterson is a retired professor of computer science from Howard University. He is also currently co-principal investigator for the NSF-funded GEAR UP project at Howard, which has supported almost 300 STEM undergrads to do summer research in 15 developing countries. He has also been Director of the Cybersecurity Research Center, Associate Vice Provost for Research, and Senior Fellow for Research and International Affairs in the Graduate School at Howard. He has also been Professeur d'Informatique at the Université de Moncton, Chair of the Department of Computer Science at the University of New Orleans, and in 1988 Associate Vice Chancellor for Research there. In 1993, he was appointed Vice President for Research and Professional and Community Services, and Dean of the Graduate School at the College of Charleston, South Carolina. In 1998, he was selected by the Council of Graduate Schools, the national organization of graduate deans and graduate schools, as the Dean in Residence at the national office in Washington, DC. His other service to the graduate community in the United States has included being elected to the presidency of the Conference of Southern Graduate Schools, and to the Board of Directors of the Council of Graduate Schools. Dr. Patterson has published more than 50 scholarly articles primarily related to cybersecurity; one of the earliest cybersecurity textbooks, Mathematical Cryptology; and subsequently three other books. He has been the principal investigator on over 35 external grants valued at over $6,000,000. In August 2006, he was loaned by Howard University to the U.S. National Science Foundation to serve as the Foundation's Program Manager for International Science and Engineering in Developing Countries, and in 2017 was Visiting Scholar at Google. He received degrees from the University of Toronto (BSc and MSc in Mathematics), University of New Brunswick (MSc in Computer Science), and University of Michigan (PhD in Mathematics). He has also held postdoctoral appointments at Princeton University and the University of California, Berkeley. Dr. Cynthia E.Winston-Proctor is a widely respected and accomplished narrative personality psychologist and academic. She is Professor of Psychology and Principal Investigator of the Identity and Success Research Laboratory at Howard University. She is also founder of Winston Synergy LLC, a psychology and education consulting firm. Dr. Winston-Proctor earned her Bachelor of Science degree in psychology from Howard University and her Ph.D. in psychology and education from the University of Michigan. Recognized as an outstanding psychologist, research scientist, and teacher, Dr. Winston-Proctor was awarded the National Science Foundation Early Career Award for scientists and engineers, the Howard University Syllabus of the Year Award, the Howard University Emerging Scholar Award, and a Brown University Howard Hughes Medical Institute Research Professorship. Also, she was elected as a member of the Society of Personology, the oldest and most prominent society for scholars to develop, preserve, and promote theory and research that focuses on the study of individual lives and whole persons. As an academic, she has led the development of curricula across a spectrum of areas including undergraduate education in psychology, behavioral cybersecurity, qualitative inquiry in psychology, healthy living for women, culturally responsive computational thinking, and African ancestry education. Her theory and method development-focused research and education scholarship have resulted in publications in numerous journals and edited books, including Culture & Psychology; Qualitative Psychology; Journal of Research on Adolescence; Psych Critiques; New Directions in Childhood & Development; the Oxford Handbook of Cultural Psychology; and Culture, Learning, & Technology: Research and Practice. Dr. Winston-Proctor's professional service includes serving as an editor on the Editorial Board of the American Psychological Association Journal of Qualitative Psychology, President of the Society of STEM Women of Color, Member of the Board of Directors of the Alfred Harcourt Foundation, and Advisor to the Board of Directors of the Howard University Middle School of Mathematics and Science.
1. Recent Events. 2. Behavioral Cybersecurity. 3. Personality Psychology
Theory and Methods of Assessment. 4. Hacker Case Study Personality Analysis
and Ethical Hacking. 5. Profiling. 6. Access Control. 7. The First Step:
Authorization. 8. Origins of Cryptography. 9. Game Theory. 10. The
Psychology of Gender. 11. Turing Tests. 12. Modular Arithmetic and Other
Computational Methods. 13. Modern Cryptography. 14. Steganography and
Relation to Crypto. 15. A Metric to Measure Attacks/Defenses. 16 Behavioral
Economics. 17. Fake News. 18. Exercises: "Hack Labs". 19. Conclusions.
Theory and Methods of Assessment. 4. Hacker Case Study Personality Analysis
and Ethical Hacking. 5. Profiling. 6. Access Control. 7. The First Step:
Authorization. 8. Origins of Cryptography. 9. Game Theory. 10. The
Psychology of Gender. 11. Turing Tests. 12. Modular Arithmetic and Other
Computational Methods. 13. Modern Cryptography. 14. Steganography and
Relation to Crypto. 15. A Metric to Measure Attacks/Defenses. 16 Behavioral
Economics. 17. Fake News. 18. Exercises: "Hack Labs". 19. Conclusions.
1. Recent Events. 2. Behavioral Cybersecurity. 3. Personality Psychology
Theory and Methods of Assessment. 4. Hacker Case Study Personality Analysis
and Ethical Hacking. 5. Profiling. 6. Access Control. 7. The First Step:
Authorization. 8. Origins of Cryptography. 9. Game Theory. 10. The
Psychology of Gender. 11. Turing Tests. 12. Modular Arithmetic and Other
Computational Methods. 13. Modern Cryptography. 14. Steganography and
Relation to Crypto. 15. A Metric to Measure Attacks/Defenses. 16 Behavioral
Economics. 17. Fake News. 18. Exercises: "Hack Labs". 19. Conclusions.
Theory and Methods of Assessment. 4. Hacker Case Study Personality Analysis
and Ethical Hacking. 5. Profiling. 6. Access Control. 7. The First Step:
Authorization. 8. Origins of Cryptography. 9. Game Theory. 10. The
Psychology of Gender. 11. Turing Tests. 12. Modular Arithmetic and Other
Computational Methods. 13. Modern Cryptography. 14. Steganography and
Relation to Crypto. 15. A Metric to Measure Attacks/Defenses. 16 Behavioral
Economics. 17. Fake News. 18. Exercises: "Hack Labs". 19. Conclusions.