New Perspectives in Behavioral Cybersecurity
Human Behavior and Decision-Making Models
Herausgeber: Patterson, Wayne
New Perspectives in Behavioral Cybersecurity
Human Behavior and Decision-Making Models
Herausgeber: Patterson, Wayne
- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
New Perspectives in Behavioral Cybersecurity offers direction for readers in areas related to human behavior and cybersecurity, by exploring some of the new ideas and approaches in this subject, specifically with new techniques in this field coming from a diverse range of scholars.
Andere Kunden interessierten sich auch für
- Thomas B. SheridanTelepresence70,99 €
- Human Factors in Engineering152,99 €
- Artificial Intelligence and Blockchain in Industry 4.0114,99 €
- V. PriyaComputational Techniques for Text Summarization based on Cognitive Intelligence122,99 €
- Smart Innovation of Web of Things114,99 €
- Ron C. McKinnon (Safety Professional, Author, Motivator and PresentA Practical Guide to Effective Workplace Accident Investigation113,99 €
- Soft Computing122,99 €
-
-
-
New Perspectives in Behavioral Cybersecurity offers direction for readers in areas related to human behavior and cybersecurity, by exploring some of the new ideas and approaches in this subject, specifically with new techniques in this field coming from a diverse range of scholars.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis Ltd
- Seitenzahl: 176
- Erscheinungstermin: 27. September 2023
- Englisch
- Abmessung: 234mm x 156mm x 13mm
- Gewicht: 412g
- ISBN-13: 9781032414775
- ISBN-10: 1032414774
- Artikelnr.: 68099609
- Verlag: Taylor & Francis Ltd
- Seitenzahl: 176
- Erscheinungstermin: 27. September 2023
- Englisch
- Abmessung: 234mm x 156mm x 13mm
- Gewicht: 412g
- ISBN-13: 9781032414775
- ISBN-10: 1032414774
- Artikelnr.: 68099609
Dr. Wayne Patterson is a retired Professor of Computer Science at Howard University. He is also currently Co-Principal Investigator for the GEAR UP project at Howard. He has also been Director of the Cybersecurity Research Center, Associate Vice Provost for Research, and Senior Fellow for Research and International Affairs in the Graduate School at Howard. He has also been Professeur d'Informatique at the Université de Moncton, Chair of the Department of Computer Science at the University of New Orleans, and in 1988 Associate Vice Chancellor for Research there. In 1993, he was appointed Vice President for Research and Professional and Community Services, and Dean of the Graduate School at the College of Charleston, South Carolina. In 1998, he was selected by the Council of Graduate Schools, the national organization of graduate deans and graduate schools, as the Dean in Residence at the national office in Washington, DC. His other service to the graduate community in the United States has included being elected to the Presidency of the Conference of Southern Graduate Schools, and also to the Board of Directors of the Council of Graduate Schools. Dr. Patterson has published more than 50 scholarly articles primarily related to cybersecurity, one of the earliest textbooks in cybersecurity, Mathematical Cryptology (Rowman and Littlefield, 1986), and recently the first book in this aspect of cybersecurity (with co-author Cynthia K. Winston), Behavioral Cybersecurity (CRC Press, 2018) . He has been the principal investigator on over 35 external grants valued at over $6,000,000. In August 2006, he was loaned by Howard University to the US National Science Foundation to serve as the Foundation's Program Manager for International Science and Engineering in Developing Countries, and in 2017 was Visiting Scholar at Google. He received degrees from the University of Toronto (BSc and MSc in Mathematics), University of New Brunswick (MSc in Computer Science), and the University of Michigan (PhD in Mathematics). He also held Post-Doctoral appointments at Princeton University and the University of California - Berkeley.
Section I. Cybersecurity Concerns in the Work Environment. 1. Management
and Security of Financial Data Through Integrated Software Solutions. 2. An
Efficient Scheme For Detecting And Mitigating Insider Threats. 3. (Figures
query) Phishing Through URLs: An Instance Based Learning Model Approach to
Detecting Phishing. Section II. Cybersecurity Threats to the Individual. 4.
Video Games in Digital Forensics. 5. Dances with the Illuminati: Hands-On
Social Engineering in Classroom Setting. 6. Studying Fake News
Proliferation by Detecting Coordinated Inauthentic Behavior. 7. Refining
the Sweeney Approach on Data Privacy. Section III. Cybersecurity Concerns
in the Home and Work Environment. 8. Cybersecurity Hygiene: Blending Home
and Work Computing. 9. Will a Cybersecurity Mindset shift build and sustain
a Cybersecurity Pipeline?. Section IV. Ethical Behavior. 10. Cybersecurity
Behavior and Behavioral Interventions. Section V. Differences in Languages
in Cyberattacks. 11. Using Language Differences to Detect Cyberattacks:
Ukrainian and Russian. Section VI. Applications of Behavioral Economics to
Cybersecurity. 12. Using Economic Prospect Theory To Quantify Side Channel
Attacks. 13. A Game-Theoretic Approach to Detecting Romance Scams. Section
VII. New Approaches for Future Research. 14. (Unfinished?) Human-Centered
Artificial intelligence: Threats and Opportunities for Cybersecurity.
and Security of Financial Data Through Integrated Software Solutions. 2. An
Efficient Scheme For Detecting And Mitigating Insider Threats. 3. (Figures
query) Phishing Through URLs: An Instance Based Learning Model Approach to
Detecting Phishing. Section II. Cybersecurity Threats to the Individual. 4.
Video Games in Digital Forensics. 5. Dances with the Illuminati: Hands-On
Social Engineering in Classroom Setting. 6. Studying Fake News
Proliferation by Detecting Coordinated Inauthentic Behavior. 7. Refining
the Sweeney Approach on Data Privacy. Section III. Cybersecurity Concerns
in the Home and Work Environment. 8. Cybersecurity Hygiene: Blending Home
and Work Computing. 9. Will a Cybersecurity Mindset shift build and sustain
a Cybersecurity Pipeline?. Section IV. Ethical Behavior. 10. Cybersecurity
Behavior and Behavioral Interventions. Section V. Differences in Languages
in Cyberattacks. 11. Using Language Differences to Detect Cyberattacks:
Ukrainian and Russian. Section VI. Applications of Behavioral Economics to
Cybersecurity. 12. Using Economic Prospect Theory To Quantify Side Channel
Attacks. 13. A Game-Theoretic Approach to Detecting Romance Scams. Section
VII. New Approaches for Future Research. 14. (Unfinished?) Human-Centered
Artificial intelligence: Threats and Opportunities for Cybersecurity.
Section I. Cybersecurity Concerns in the Work Environment. 1. Management
and Security of Financial Data Through Integrated Software Solutions. 2. An
Efficient Scheme For Detecting And Mitigating Insider Threats. 3. (Figures
query) Phishing Through URLs: An Instance Based Learning Model Approach to
Detecting Phishing. Section II. Cybersecurity Threats to the Individual. 4.
Video Games in Digital Forensics. 5. Dances with the Illuminati: Hands-On
Social Engineering in Classroom Setting. 6. Studying Fake News
Proliferation by Detecting Coordinated Inauthentic Behavior. 7. Refining
the Sweeney Approach on Data Privacy. Section III. Cybersecurity Concerns
in the Home and Work Environment. 8. Cybersecurity Hygiene: Blending Home
and Work Computing. 9. Will a Cybersecurity Mindset shift build and sustain
a Cybersecurity Pipeline?. Section IV. Ethical Behavior. 10. Cybersecurity
Behavior and Behavioral Interventions. Section V. Differences in Languages
in Cyberattacks. 11. Using Language Differences to Detect Cyberattacks:
Ukrainian and Russian. Section VI. Applications of Behavioral Economics to
Cybersecurity. 12. Using Economic Prospect Theory To Quantify Side Channel
Attacks. 13. A Game-Theoretic Approach to Detecting Romance Scams. Section
VII. New Approaches for Future Research. 14. (Unfinished?) Human-Centered
Artificial intelligence: Threats and Opportunities for Cybersecurity.
and Security of Financial Data Through Integrated Software Solutions. 2. An
Efficient Scheme For Detecting And Mitigating Insider Threats. 3. (Figures
query) Phishing Through URLs: An Instance Based Learning Model Approach to
Detecting Phishing. Section II. Cybersecurity Threats to the Individual. 4.
Video Games in Digital Forensics. 5. Dances with the Illuminati: Hands-On
Social Engineering in Classroom Setting. 6. Studying Fake News
Proliferation by Detecting Coordinated Inauthentic Behavior. 7. Refining
the Sweeney Approach on Data Privacy. Section III. Cybersecurity Concerns
in the Home and Work Environment. 8. Cybersecurity Hygiene: Blending Home
and Work Computing. 9. Will a Cybersecurity Mindset shift build and sustain
a Cybersecurity Pipeline?. Section IV. Ethical Behavior. 10. Cybersecurity
Behavior and Behavioral Interventions. Section V. Differences in Languages
in Cyberattacks. 11. Using Language Differences to Detect Cyberattacks:
Ukrainian and Russian. Section VI. Applications of Behavioral Economics to
Cybersecurity. 12. Using Economic Prospect Theory To Quantify Side Channel
Attacks. 13. A Game-Theoretic Approach to Detecting Romance Scams. Section
VII. New Approaches for Future Research. 14. (Unfinished?) Human-Centered
Artificial intelligence: Threats and Opportunities for Cybersecurity.