Secure CheckoutPersonal information is secured with SSL technology.
Free ShippingFree global shipping
No minimum order.
In the wake of fresh allegations that personal data of Facebook users have been illegally used to influence the outcome of the US general election and the Brexit vote, the debate over manipulation of social Big Data continues to gain more momentum. Cyber Influence and Cognitive Threats addresses various emerging challenges in response to cybersecurity, examining cognitive applications in decision-making, behaviour and basic human interaction. The book examines the role of psychology in cybersecurity by addressing each factor involved in the process: hackers, targets, cybersecurity practitioners, and the wider social context in which these groups operate.
Cyber Influence and Cognitive Threats covers a variety of topics including information systems, psychology, sociology, human resources, leadership, strategy, innovation, law, finance and others.
- Explains psychological factors inherent in machine learning and artificial intelligence
- Explores attitudes towards data and privacy through the phenomena of digital hoarding and protection motivation theory
- Discusses the role of social and communal factors in cybersecurity behaviour and attitudes
- Investigates the factors that determine the spread and impact of information and disinformation
Researchers in psychology who study human factors, human-computer interaction, and applied psych. Secondary market: professionals in computer science, engineering, tech development, cyber security, and policy-making
1. Cybersecurity as a social phenomenon
John McAlaney and Vladlena Benson
2. Towards an integrated socio-technical approach for designing adaptive privacy aware services in cloud computing
Angeliki Kitsiou, Eleni Tzortzaki, Christos Kalloniatis, and Stefanos Gritzalis
3. Challenges of using machine learning algorithsm for cybersecurity: a study of threat-classification models applied to social media communication data
Andrei Queiroz Lima and Brian Keegan
4. 'Nothing up my sleeve': information warfare and the magical mindset
5. Digital hoarding behaviours: implications for cybersecurity
Nick Neave, Kerry McKellar, Elizabeth Sillence, and Pam Briggs
6. A review of security awareness approaches: towards achieving communal awareness
Azma Alina Ali Zani, Azah Anir Norman, and Norjihan Abdu Ghani
7. Understanding users' information security awareness and intentions: a full nomology of protection motivation theory
Farkhondeh Hassandoust and Angsana A. Techatassanasoontorn
8. Social big data and its integrity: the effect of trust and personality traits on organic reach of facebook content
Vladlena Benson and Tom Buchanan
9. The impact of sentiment on content post popularity through emoji and text on social platforms
Wei-Lun Chang and Hsiao-Chiao Tseng
10. Risk and social influence in sustainable smart home technologies: a persuasive systems design model
Nataliya Shevchuk, Harri Oinas-Kukkonen, and Vladlena Benson
- No. of pages:
- © Academic Press 2020
- 17th September 2019
- Academic Press
- Paperback ISBN:
- eBook ISBN:
Vladlena Benson is Professor of Information Systems at the Aston Business School. She is a specialist in technology governance, risk and compliance (GRC) and a Government Communications Headquarters (GCHQ)-certified Cyber Security Risk Management Frameworks practitioner. She is currently working with UK businesses on privacy and cyber security initiatives, such as the forthcoming General Data Protection Regulation (GDPR) and privacy compliance. Prof Benson’s research areas cover: information privacy; cyber victimisation; gender and culture differences in online behaviour; digital rights and the cyber vulnerability of young people. Her work also relates to religious orientation, digital behaviour and privacy on social media. She is a strong advocate for increasing diversity in the cyber security work force, and actively endeavours to bring more female talent into the digital economy. As part of her research, she currently runs a number of projects to help target the digital skills crisis – developing tools for opening up cyberspace entrepreneurship opportunities from an early age. As a result of her work in this area, Prof Benson was recognised at the Women in IT Awards 2017 for helping the development of career opportunities for women in cyber security.
Professor, School of Computing and Engineering, University of West London, UK
John McAlaney is a Chartered Psychologist, Chartered Scientist and Associate Professor of Psychology at Bournemouth University. He completed his undergraduate degree at the University of Stirling, his MSc at the University of Strathclyde and then his PhD at the University of West of Scotland in 2007. Dr. McAlaney's PhD was on the topic of social psychology and substance use, looking particularly at misperceptions of peer norms. Following this he worked on an AERC funded post-doc position at London School of Hygiene and Tropical Medicine before moving onto a lecturing post at the University of Bradford in 2008. He joined the Department of Psychology at Bournemouth University in 2014. Since joining Bournemouth he has collaborated extensively with colleagues in the Department of Computing and Informatics to explore psychological factors of cyber security, including participation in hacking and hacktivism, group dynamics in cyber security actors and decision making processes in relation to phishing emails and other mediums. As part of this work he collaborates extensively with government, military and commercial organisations. In 2018 he led the authorship of the British Psychological Society’s briefing paper on the role of psychology in informing cybersecurity practices.
Associate Professor of Psychology, Bournemouth University, UK
Elsevier.com visitor survey
We are always looking for ways to improve customer experience on Elsevier.com.
We would like to ask you for a moment of your time to fill in a short questionnaire, at the end of your visit.
If you decide to participate, a new browser tab will open so you can complete the survey after you have completed your visit to this website.
Thanks in advance for your time.