MARC

LEADER 00000cam a2200000 a 4500
001 SCIDIR_on1120697183
003 OCoLC
005 20231120010413.0
006 m o d
007 cr un|---aucuu
008 190928s2020 enk o 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d UKMGB  |d OCLCO  |d OPELS  |d OCLCQ  |d OCLCF  |d OCLCQ  |d N$T  |d OCLCQ  |d SFB  |d LVT  |d OCLCO  |d OCLCQ  |d OCLCO  |d K6U  |d OCLCQ  |d OCLCO 
015 |a GBB9F6580  |2 bnb 
016 7 |a 019541138  |2 Uk 
019 |a 1224378865  |a 1229460329 
020 |a 0128192054 
020 |a 9780128192054  |q (electronic bk.) 
020 |a 0128192046 
020 |a 9780128192047 
020 |z 9780128192047  |q (pbk.) 
035 |a (OCoLC)1120697183  |z (OCoLC)1224378865  |z (OCoLC)1229460329 
050 4 |a T14.5 
082 0 4 |a 303.483  |2 23 
245 0 0 |a Cyber Influence and Cognitive Threats /  |c edited by Vladlena Benson, John Mcalaney. 
260 |a London, United Kingdom :  |b Academic Press,  |c 2020. 
300 |a 1 online resource (240 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
505 0 |a Front Cover; CYBER INFLUENCE AND COGNITIVE THREATS; CYBER INFLUENCE AND COGNITIVE THREATS; Copyright; Contents; Contributors; Preface; 1 -- Cybersecurity as a social phenomenon; Social influence; Heuristics and biases; Exploitation; Conclusion; References; 2 -- Towards an integrated socio-technical approach for designing adaptive privacy aware services in cloud computing; Introduction: privacy as a socially constructed phenomenon; Privacy risks within Cloud Computing Environments; Social aspects of privacy in Cloud Computing Environments; Social identity; Social capital 
505 8 |a Technical aspects of privacy in Cloud Computing EnvironmentsThe emergence of the adaptive privacy aware systems; Towards an integrated socio-technical approach; Conclusion; References; 3 -- Challenges of using machine learning algorithms for cybersecurity: a study of threatclassification models applied to social media communication data; Introduction; Cybersecurity using social media as open source of information; Why is social media communication important for cybersecurity?; Learning-based approaches and processing techniques applied to textual communications; Supervised approach 
505 8 |a Unsupervised and semisupervised approachPreprocessing social media content; Noise removal; Tokenization; Normalization; Stemming; Stop words removal; Vector transformation; Model evaluation and metrics; Use cases for learning-based model in cybersecurity problems; Detection of messages regarding vulnerabilities and exploitation of software products; Detection of hacker services and exploitation tools on marketplaces; The influential hackers of a forum are main topics; Sentiment analysis of hacker of hacker message; Challenges of data-driven research in cybersecurity and ethical considerations 
505 8 |a Ethical consideration for using social media in cybersecurity researchAcknowledgements; References; Further reading; 4 -- 'Nothing up my sleeve': information warfare and the magical mindset; Introduction: welcome to the desert of the real; From bullets to bytes: war in the information age; 'Pay no attention to the man behind the curtain' -- magic, misdirection and 'misinformation warfare'; Conclusion: a hogwarts for the cyber domain?; References; Further reading; 5 -- Digital hoarding behaviours: implications for cybersecurity; Physical hoarding; Digital possessions; Digital hoarding 
505 8 |a Personal information managementImplications of digital hoarding; Our research; Implications of digital hoarding behaviours; Strategies for digital decluttering; Directions for future work; References; 6 -- A review of security awareness approaches: towards achieving communal awareness; Introduction; Designing an effective approach to increasing security awareness; Program content and delivery method; Underlying theory; Methodology; Search process; Search terms; Findings and discussions; Overview of theories used 
500 |a RQ1: What theories are applied when designing the current approaches to increasing security awareness? 
650 0 |a Technology  |x Psychological aspects. 
650 0 |a Computer security  |x Psychological aspects. 
650 0 |a Computer security  |x Social aspects. 
650 0 |a Decision making  |x Data processing. 
650 6 |a Technologie  |0 (CaQQLa)201-0017702  |x Aspect psychologique.  |0 (CaQQLa)201-0373794 
650 6 |a S�ecurit�e informatique  |0 (CaQQLa)201-0061152  |x Aspect psychologique.  |0 (CaQQLa)201-0373794 
650 6 |a S�ecurit�e informatique  |0 (CaQQLa)201-0061152  |x Aspect social.  |0 (CaQQLa)201-0374080 
650 6 |a Prise de d�ecision  |0 (CaQQLa)201-0007575  |x Informatique.  |0 (CaQQLa)201-0380011 
650 7 |a Computer security  |x Social aspects  |2 fast  |0 (OCoLC)fst01983772 
650 7 |a Decision making  |x Data processing  |2 fast  |0 (OCoLC)fst00889041 
650 7 |a Technology  |x Psychological aspects  |2 fast  |0 (OCoLC)fst01145177 
700 1 |a Benson, Vladlena,  |d 1976- 
700 1 |a McAlaney, John,  |d 1979- 
776 0 8 |i Print version:  |a Benson, Vladlena.  |t Cyber Influence and Cognitive Threats.  |d San Diego : Elsevier Science & Technology, �2019  |z 9780128192047 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9780128192047  |z Texto completo