Human dimensions of cybersecurity / by Terry Bossomaier, Steven D'Alessandro, Roger Bradbury.
Material type:
- text
- computer
- online resource
- 9781032400983
- 005.8 BOS 2020 23
- QA76.9.A25
Item type | Current library | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|
![]() |
Symbiosis International University, Dubai | 005.8 BOS 2020 (Browse shelf(Opens below)) | 1 | Available | SIU00203 | ||
![]() |
Symbiosis International University, Dubai | 005.8 BOS 2020 (Browse shelf(Opens below)) | 2 | Available | SIU00204 |
Browsing Symbiosis International University, Dubai shelves Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
005.758 AWA 2023 Data science and analytics strategy : an emergent design approach | 005.758 AWA 2023 Data science and analytics strategy : an emergent design approach | 005.758 BEA 2020 Learning SQL : generate, manipulate, and retrieve data / | 005.8 BOS 2020 Human dimensions of cybersecurity / | 005.8 BOS 2020 Human dimensions of cybersecurity / | 005.8 CHA 2020 Cybersecurity for information professionals : concepts and applications / | 005.8 CHA 2020 Cybersecurity for information professionals : concepts and applications / |
Includes bibliographical references and index.
Case studies -- Networks and norms -- Consumer choice -- Risk perspectives in cybersecurity -- Government policy and statecraft in cyber security -- Technical perspectives -- The future.
"The book identifies the technological features that give rise to security issues. It describes the structure of the Internet and how it is compromised by malware, and examines some of the more common security issues. It then looks at aspects of human persuasion and consumer choice, and how these affect cyber security. It argues that social networks and the related norms play a key role as does government policy, as each impact on individual behavior of computer use. The book identifies the most important human and social factors that affect cybersecurity. It illustrates each factor using case studies, and examines possible solutions from both technical and human acceptability viewpoints"-- Provided by publisher.
Description based on print version record and CIP data provided by publisher; resource not viewed.
There are no comments on this title.