Emerging Cyber Threats and Cognitive Vulnerabilities identifies the critical role human behavior plays in cybersecurity and provides insights into how human decision-making can help address rising volumes of cyberthreats. The book examines the role of psychology in cybersecurity by addressing each actor involved in the process: hackers, targets, cybersecurity practitioners and the wider social context in which these groups operate. It applies psychological factors such as motivations, group processes and decision-making heuristics that may lead individuals to underestimate risk. The goal of this understanding is to more quickly identify threat and create early education and prevention strategies.
This book covers a variety of topics and addresses different challenges in response to changes in the ways in to study various areas of decision-making, behavior, artificial intelligence, and human interaction in relation to cybersecurity.
Please Note: This is an On Demand product, delivery may take up to 11 working days after payment has been received.
1. Human element in cybersecurity 2. Cognitive computing and cybersecurity 3. Factors leading to cyber victimization 4. Terrorism, ideology and radicalization 5. Context dependent user beahvior and cybersecurity controls 6. Cybersecurity analytics and big data 7. Securing the Internet of Things 8. Privacy modelling and protection 9. Ethics in the Digital Age 10. Blockchain and DLT technologies in cybersecurity 11. Online research methods 12. Robotics, AI and machine learning 13. Groups online: hacktivism and social protest 14. Script kiddies: How online tools may encourage criminal behavior 15. Other cyberpsychology topics
Professor Vladlena Benson, leads the Cybersecurity and Innovation Partnership and the IS Research group of academics working in the areas of cyber security risk management, information and supply chain security. Professor Benson is a Founding member of the Neustar International Security Council - an industry leading forum of trust, integrity and confidentiality focused on defending against cyber threats. Vladlena has served on the Board of Directors of ISACA London and Central UK over the last three years. She has published over 100 journal papers, books, edited volumes and other publications. Vladlena's research encompasses areas of innovation actions across cybersecurity risk management, financial and VFA technologies. Her research at Aston has been supported by grants from the European Commission, GCRF, Ministry of Science and Technology (Taiwan), UK Strategic Priorities and the British Council. Having been recognized as a Women in IT Editor's Choice Award in 2017, Professor Benson continues her work in creating an inclusive space in cyber security careers.
John Mcalaney Associate Professor of Psychology, Bournemouth University, UK.
John McAlaney is a Chartered Psychologist, Chartered Scientist and Associate Professor of Psychology at Bournemouth University. He completed his undergraduate degree at the University of Stirling, his MSc at the University of Strathclyde and then his PhD at the University of West of Scotland in 2007. Dr. McAlaney's PhD was on the topic of social psychology and substance use, looking particularly at misperceptions of peer norms. Following this he worked on an AERC funded post-doc position at London School of Hygiene and Tropical Medicine before moving onto a lecturing post at the University of Bradford in 2008. He joined the Department of Psychology at Bournemouth University in 2014. Since joining Bournemouth he has collaborated extensively with colleagues in the Department of Computing and Informatics to explore psychological factors of cyber security, including participation in hacking and hacktivism, group dynamics in cyber security actors and decision making processes in relation to phishing emails and other mediums. As part of this work he collaborates extensively with government, military and commercial organisations. In 2018 he led the authorship of the British Psychological Society's briefing paper on the role of psychology in informing cybersecurity practices.