|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
SCIDIR_on1120697183 |
003 |
OCoLC |
005 |
20231120010413.0 |
006 |
m o d |
007 |
cr un|---aucuu |
008 |
190928s2020 enk o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d UKMGB
|d OCLCO
|d OPELS
|d OCLCQ
|d OCLCF
|d OCLCQ
|d N$T
|d OCLCQ
|d SFB
|d LVT
|d OCLCO
|d OCLCQ
|d OCLCO
|d K6U
|d OCLCQ
|d OCLCO
|
015 |
|
|
|a GBB9F6580
|2 bnb
|
016 |
7 |
|
|a 019541138
|2 Uk
|
019 |
|
|
|a 1224378865
|a 1229460329
|
020 |
|
|
|a 0128192054
|
020 |
|
|
|a 9780128192054
|q (electronic bk.)
|
020 |
|
|
|a 0128192046
|
020 |
|
|
|a 9780128192047
|
020 |
|
|
|z 9780128192047
|q (pbk.)
|
035 |
|
|
|a (OCoLC)1120697183
|z (OCoLC)1224378865
|z (OCoLC)1229460329
|
050 |
|
4 |
|a T14.5
|
082 |
0 |
4 |
|a 303.483
|2 23
|
245 |
0 |
0 |
|a Cyber Influence and Cognitive Threats /
|c edited by Vladlena Benson, John Mcalaney.
|
260 |
|
|
|a London, United Kingdom :
|b Academic Press,
|c 2020.
|
300 |
|
|
|a 1 online resource (240 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Front Cover; CYBER INFLUENCE AND COGNITIVE THREATS; CYBER INFLUENCE AND COGNITIVE THREATS; Copyright; Contents; Contributors; Preface; 1 -- Cybersecurity as a social phenomenon; Social influence; Heuristics and biases; Exploitation; Conclusion; References; 2 -- Towards an integrated socio-technical approach for designing adaptive privacy aware services in cloud computing; Introduction: privacy as a socially constructed phenomenon; Privacy risks within Cloud Computing Environments; Social aspects of privacy in Cloud Computing Environments; Social identity; Social capital
|
505 |
8 |
|
|a Technical aspects of privacy in Cloud Computing EnvironmentsThe emergence of the adaptive privacy aware systems; Towards an integrated socio-technical approach; Conclusion; References; 3 -- Challenges of using machine learning algorithms for cybersecurity: a study of threatclassification models applied to social media communication data; Introduction; Cybersecurity using social media as open source of information; Why is social media communication important for cybersecurity?; Learning-based approaches and processing techniques applied to textual communications; Supervised approach
|
505 |
8 |
|
|a Unsupervised and semisupervised approachPreprocessing social media content; Noise removal; Tokenization; Normalization; Stemming; Stop words removal; Vector transformation; Model evaluation and metrics; Use cases for learning-based model in cybersecurity problems; Detection of messages regarding vulnerabilities and exploitation of software products; Detection of hacker services and exploitation tools on marketplaces; The influential hackers of a forum are main topics; Sentiment analysis of hacker of hacker message; Challenges of data-driven research in cybersecurity and ethical considerations
|
505 |
8 |
|
|a Ethical consideration for using social media in cybersecurity researchAcknowledgements; References; Further reading; 4 -- 'Nothing up my sleeve': information warfare and the magical mindset; Introduction: welcome to the desert of the real; From bullets to bytes: war in the information age; 'Pay no attention to the man behind the curtain' -- magic, misdirection and 'misinformation warfare'; Conclusion: a hogwarts for the cyber domain?; References; Further reading; 5 -- Digital hoarding behaviours: implications for cybersecurity; Physical hoarding; Digital possessions; Digital hoarding
|
505 |
8 |
|
|a Personal information managementImplications of digital hoarding; Our research; Implications of digital hoarding behaviours; Strategies for digital decluttering; Directions for future work; References; 6 -- A review of security awareness approaches: towards achieving communal awareness; Introduction; Designing an effective approach to increasing security awareness; Program content and delivery method; Underlying theory; Methodology; Search process; Search terms; Findings and discussions; Overview of theories used
|
500 |
|
|
|a RQ1: What theories are applied when designing the current approaches to increasing security awareness?
|
650 |
|
0 |
|a Technology
|x Psychological aspects.
|
650 |
|
0 |
|a Computer security
|x Psychological aspects.
|
650 |
|
0 |
|a Computer security
|x Social aspects.
|
650 |
|
0 |
|a Decision making
|x Data processing.
|
650 |
|
6 |
|a Technologie
|0 (CaQQLa)201-0017702
|x Aspect psychologique.
|0 (CaQQLa)201-0373794
|
650 |
|
6 |
|a S�ecurit�e informatique
|0 (CaQQLa)201-0061152
|x Aspect psychologique.
|0 (CaQQLa)201-0373794
|
650 |
|
6 |
|a S�ecurit�e informatique
|0 (CaQQLa)201-0061152
|x Aspect social.
|0 (CaQQLa)201-0374080
|
650 |
|
6 |
|a Prise de d�ecision
|0 (CaQQLa)201-0007575
|x Informatique.
|0 (CaQQLa)201-0380011
|
650 |
|
7 |
|a Computer security
|x Social aspects
|2 fast
|0 (OCoLC)fst01983772
|
650 |
|
7 |
|a Decision making
|x Data processing
|2 fast
|0 (OCoLC)fst00889041
|
650 |
|
7 |
|a Technology
|x Psychological aspects
|2 fast
|0 (OCoLC)fst01145177
|
700 |
1 |
|
|a Benson, Vladlena,
|d 1976-
|
700 |
1 |
|
|a McAlaney, John,
|d 1979-
|
776 |
0 |
8 |
|i Print version:
|a Benson, Vladlena.
|t Cyber Influence and Cognitive Threats.
|d San Diego : Elsevier Science & Technology, �2019
|z 9780128192047
|
856 |
4 |
0 |
|u https://sciencedirect.uam.elogim.com/science/book/9780128192047
|z Texto completo
|