Document Type
|
:
|
BL
|
Record Number
|
:
|
862175
|
Main Entry
|
:
|
International Conference on Human Factors in Cybersecurity(5th :2019 :, Washington, D.C.)
|
Title & Author
|
:
|
Advances in human factors in cybersecurity : : proceedings of the AHFE 2019 International Conference on Human Factors in Cybersecurity, July 24-28, 2019, Washington D.C., USA /\ editors: Tareq Ahram and Waldemar Karwowski.
|
Publication Statement
|
:
|
Cham, Switzerland :: Springer,, 2020.
|
Series Statement
|
:
|
Advances in intelligent systems and computing ;; v. 960
|
Page. NO
|
:
|
1 online resource
|
ISBN
|
:
|
303020488X
|
|
:
|
: 9783030204884
|
|
:
|
9783030204877
|
Bibliographies/Indexes
|
:
|
Includes bibliographical references and index.
|
Contents
|
:
|
Intro; Advances in Human Factors and Ergonomics 2019; Preface; Contents; Cybersecurity Applications and Privacy Research; Attempting to Reduce Susceptibility to Fraudulent Computer Pop-Ups Using Malevolence Cue Identification Training; Abstract; 1 Introduction; 2 Method; 2.1 Participants; 2.2 Design; 2.3 Materials; 2.4 Procedure; 3 Results and Discussion; 4 Limitations; 5 Implications; References; Cyber Resilient Behavior: Integrating Human Behavioral Models and Resilience Engineering Capabilities into Cyber Security; Abstract; 1 Introduction; 2 Resilience; 3 Human Behavior
|
|
:
|
4 Conceptual Framework of Resilient Behavior5 Pilot Study; 6 Discussion and Way Ahead; Funding and Acknowledgments; References; An International Extension of Sweeney's Data Privacy Research; Abstract; 1 Introduction; 2 Selection of Countries for Analysis; 3 Prevalence of Cyber Attacks; 4 Postal Code Systems; 5 "Pigeonholes"; 6 Comparing the Privacy Issues; 7 Conclusions; References; The Human Factor in Managing the Security of Information; Abstract; 1 Introduction; 2 Awareness of Threats; 3 Human Factor in Information Security Management
|
|
:
|
4 The Role of Management in Information Security Administration5 Conclusion; References; Beyond Passwords: Enforcing Username Security as the First Line of Defense; Abstract; 1 Introduction; 2 Related Work; 3 Human Factors in Username Practices; 3.1 Account Names Shown in Clear; 3.2 Social Exposure of Username; 3.3 Real-time Feedback About Duplicate Usernames; 3.4 E-mail Utilized as Account Name; 3.5 Account Names Based on Personal Information; 3.6 Account Name Reuse; 3.7 Strength Meters; 3.8 Enabling Account Name Change; 3.9 Forcing Account Name Expiration; 4 Study; 5 Results and Discussion
|
|
:
|
6 ConclusionReferences; Social Engineering and the Value of Data: The Need of Specific Awareness Programs; Abstract; 1 Introduction; 2 Methodology; 3 Results and Discussion; 4 Conclusions; References; Awareness and Cyber-Physical Security; Human Centered Cyber Situation Awareness; Abstract; 1 Introduction; 1.1 Purpose; 2 Method; 2.1 Materials; 2.2 Participants and Procedure; 3 Results; 3.1 Descriptive Statistics; 3.2 Overall Prioritization Rankings; 3.3 Across Organization Disagreement; 3.4 Within Organization Disagreement; 4 Discussion; 5 Implications; 6 Conclusions and Future Work
|
Abstract
|
:
|
This book reports on the latest research and developments in the field of cybersecurity, particularly focusing on personal security and new methods for reducing human error and increasing cyber awareness, as well as innovative solutions for increasing the security of advanced Information Technology (IT) infrastructures. It covers a broad range of topics, including methods for human training; novel cyber-physical and process-control systems; social, economic, and behavioral aspects of cyberspace; issues concerning the cybersecurity index; security metrics for enterprises; and risk evaluation. Based on the AHFE 2019 International Conference on Human Factors in Cybersecurity, held on July 24-28, 2019, in Washington D.C., USA, the book not only presents innovative cybersecurity technologies, but also discusses emerging threats, current gaps in the available systems, and future challenges that may be successfully overcome with the help of human factors research.
|
Subject
|
:
|
Computational intelligence, Congresses.
|
Subject
|
:
|
Computer security, Congresses.
|
Subject
|
:
|
Human-computer interaction, Congresses.
|
Subject
|
:
|
Management information systems, Congresses.
|
Subject
|
:
|
User interfaces (Computer systems), Congresses.
|
Subject
|
:
|
Computational intelligence.
|
Subject
|
:
|
Computer security.
|
Subject
|
:
|
COMPUTERS-- General.
|
Subject
|
:
|
Human-computer interaction.
|
Subject
|
:
|
Management information systems.
|
Subject
|
:
|
User interfaces (Computer systems)
|
Dewey Classification
|
:
|
006.3
|
LC Classification
|
:
|
QA76.9.A25
|
Added Entry
|
:
|
Ahram, Tareq Z.
|
|
:
|
Karwowski, Waldemar,1953-
|