Cyber Influence and Cognitive Threats /
Clasificación: | Libro Electrónico |
---|---|
Otros Autores: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
London, United Kingdom :
Academic Press,
2020.
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Front Cover; CYBER INFLUENCE AND COGNITIVE THREATS; CYBER INFLUENCE AND COGNITIVE THREATS; Copyright; Contents; Contributors; Preface; 1
- Cybersecurity as a social phenomenon; Social influence; Heuristics and biases; Exploitation; Conclusion; References; 2
- Towards an integrated socio-technical approach for designing adaptive privacy aware services in cloud computing; Introduction: privacy as a socially constructed phenomenon; Privacy risks within Cloud Computing Environments; Social aspects of privacy in Cloud Computing Environments; Social identity; Social capital
- Technical aspects of privacy in Cloud Computing EnvironmentsThe emergence of the adaptive privacy aware systems; Towards an integrated socio-technical approach; Conclusion; References; 3
- Challenges of using machine learning algorithms for cybersecurity: a study of threatclassification models applied to social media communication data; Introduction; Cybersecurity using social media as open source of information; Why is social media communication important for cybersecurity?; Learning-based approaches and processing techniques applied to textual communications; Supervised approach
- Unsupervised and semisupervised approachPreprocessing social media content; Noise removal; Tokenization; Normalization; Stemming; Stop words removal; Vector transformation; Model evaluation and metrics; Use cases for learning-based model in cybersecurity problems; Detection of messages regarding vulnerabilities and exploitation of software products; Detection of hacker services and exploitation tools on marketplaces; The influential hackers of a forum are main topics; Sentiment analysis of hacker of hacker message; Challenges of data-driven research in cybersecurity and ethical considerations
- Ethical consideration for using social media in cybersecurity researchAcknowledgements; References; Further reading; 4
- 'Nothing up my sleeve': information warfare and the magical mindset; Introduction: welcome to the desert of the real; From bullets to bytes: war in the information age; 'Pay no attention to the man behind the curtain'
- magic, misdirection and 'misinformation warfare'; Conclusion: a hogwarts for the cyber domain?; References; Further reading; 5
- Digital hoarding behaviours: implications for cybersecurity; Physical hoarding; Digital possessions; Digital hoarding
- Personal information managementImplications of digital hoarding; Our research; Implications of digital hoarding behaviours; Strategies for digital decluttering; Directions for future work; References; 6
- A review of security awareness approaches: towards achieving communal awareness; Introduction; Designing an effective approach to increasing security awareness; Program content and delivery method; Underlying theory; Methodology; Search process; Search terms; Findings and discussions; Overview of theories used