|
![]() |
|||
|
||||
OverviewThis book reports on the latest research and developments in the field of cybersecurity, particularly focusing on personal security and new methods for reducing human error and increasing cyber awareness, as well as innovative solutions for increasing the security of advanced Information Technology (IT) infrastructures. It covers a broad range of topics, including methods for human training; novel cyber-physical and process-control systems; social, economic, and behavioral aspects of cyberspace; issues concerning the cybersecurity index; security metrics for enterprises; and risk evaluation. Based on the AHFE 2019 International Conference on Human Factors in Cybersecurity, held on July 24-28, 2019, in Washington D.C., USA, the book not only presents innovative cybersecurity technologies, but also discusses emerging threats, current gaps in the available systems, and future challenges that may be successfully overcome with the help of human factors research. Full Product DetailsAuthor: Tareq Ahram , Waldemar KarwowskiPublisher: Springer Nature Switzerland AG Imprint: Springer Nature Switzerland AG Edition: 1st ed. 2020 Volume: 960 Weight: 0.454kg ISBN: 9783030204877ISBN 10: 3030204871 Pages: 138 Publication Date: 06 June 2019 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Manufactured on demand ![]() We will order this item for you from a manufactured on demand supplier. Table of ContentsAttempting to Reduce Susceptibility to Fraudulent Computer Pop-Ups Using Malevolence Cue Identification Training.- Cyber Resilient Behavior: Integrating Human Behavioral Models and Resilience Engineering Capabilities into Cyber Security.- An International Extension of Sweeney’s Data Privacy Research.- The Human Factor in Managing the Security of Information.- Beyond Passwords: Enforcing Username Security as the First Line of Defense.- Social Engineering and the Value of Data: The Need of Specific Awareness Programs.- Human Centered Cyber Situation Awareness.- Over-the-Shoulder Attack Resistant Graphical Authentication Schemes Impact on Working Memory.- Comparative Evaluation of Security and Convenience Trade-Offs in Password Generation Aiding Systems.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |