Within this Book Full site



Filter my results

ISBN of the Book

Material or Process Book or Chapter Title Author or Editor Publication dates

Human-Computer Interaction and Cybersecurity Handbook

Edited by: Abbas Moallem

Print publication date:  October  2018
Online publication date:  October  2018

Print ISBN: 9781138739161
eBook ISBN: 9781315184319
Adobe ISBN:

 Cite  Marc Record

Book description

<P><STRONG>Recipient of the SJSU San Jose State University Annual Author &amp; Artist Awards 2018</STRONG></P> <P>Cyber security, or information technology security, focuses on protecting computers and data from criminal behavior. The understanding of human performance, capability, and behavior is one of the main areas that experts in cyber security focus on, both from a human computer interaction point of view, and human factors. This handbook is a unique source of information from the human factors perspective that covers all topics related to the discipline. It includes new areas such as smart networking and devices and will be a source of information for IT specialists, as well as other disciplines such as psychology, behavioral science, software engineering, and security management.</P>

Table of contents

Prelims Download PDF
Introduction Download PDF
Chapter  1:  User authentication Download PDF
Chapter  2:  Biometrics Download PDF
Chapter  3:  Machine identities Download PDF
Chapter  4:  New challenges for user privacy in cyberspace Download PDF
Chapter  5:  Trust Download PDF
Chapter  6:  Insider threat Download PDF
Chapter  7:  Social engineering Download PDF
Chapter  8:  Money laundering and black markets Download PDF
Chapter  9:  Smart home network and devices Download PDF
Chapter  10:  Trusted IoT in ambient assisted living scenarios Download PDF
Chapter  11:  Smart cities under attack Download PDF
Chapter  12:  Securing supervisory control and data acquisition control systems Download PDF
Chapter  13:  Healthcare information security and assurance Download PDF
Chapter  14:  US cybersecurity and privacy regulations Download PDF
Chapter  15:  Impact of recent legislative developments in the European Union on information security Download PDF
Chapter  16:  Privacy and security in the IoT—Legal issues Download PDF
Chapter  17:  US government and law enforcement Download PDF
Chapter  18:  Enterprise solutions and technologies Download PDF
Chapter  19:  Perspectives on the future of human factors in cybersecurity Download PDF
Chapter  20:  Movies and media Download PDF
Chapter_10 Download PDF
Chapter_18 Download PDF
Chapter_3 Download PDF
Chapter_15 Download PDF
Chapter_9 Download PDF
Chapter_6 Download PDF
Chapter_12 Download PDF
Prelims1 Download PDF
Chapter_7 Download PDF
Chapter_4 Download PDF
Prelims2 Download PDF
Chapter_20 Download PDF
Chapter_19 Download PDF
Chapter_2 Download PDF
Chapter_11 Download PDF
Chapter_16 Download PDF
Chapter_1 Download PDF
Chapter_8 Download PDF
Chapter_13 Download PDF
Chapter_5 Download PDF
Chapter_14 Download PDF
Glossary Download PDF
Chapter_17 Download PDF
Index Download PDF
Search for more...

Back to top

Use of cookies on this website

We are using cookies to provide statistics that help us give you the best experience of our site. You can find out more in our Privacy Policy. By continuing to use the site you are agreeing to our use of cookies.