Description
In the wake of fresh allegations that personal data of Facebook users have been illegally used to influence the outcome of the US general election and the Brexit vote, the debate over manipulation of social Big Data continues to gain more momentum. Cyber Influence and Cognitive Threats addresses various emerging challenges in response to cybersecurity, examining cognitive applications in decision-making, behaviour and basic human interaction. The book examines the role of psychology in cybersecurity by addressing each factor involved in the process: hackers, targets, cybersecurity practitioners, and the wider social context in which these groups operate.Cyber Influence and Cognitive Threats covers a variety of topics including information systems, psychology, sociology, human resources, leadership, strategy, innovation, law, finance and others.- Explains psychological factors inherent in machine learning and artificial intelligence- Explores attitudes towards data and privacy through the phenomena of digital hoarding and protection motivation theory- Discusses the role of social and communal factors in cybersecurity behaviour and attitudes- Investigates the factors that determine the spread and impact of information and disinformation
Table of Contents
1. Cybersecurity as a social phenomenonJohn McAlaney and Vladlena Benson2. Towards an integrated socio-technical approach for designing adaptive privacy aware services in cloud computingAngeliki Kitsiou, Eleni Tzortzaki, Christos Kalloniatis, and Stefanos Gritzalis3. Challenges of using machine learning algorithsm for cybersecurity: a study of threat-classification models applied to social media communication dataAndrei Queiroz Lima and Brian Keegan4. 'Nothing up my sleeve': information warfare and the magical mindsetK. Scott5. Digital hoarding behaviours: implications for cybersecurityNick Neave, Kerry McKellar, Elizabeth Sillence, and Pam Briggs6. A review of security awareness approaches: towards achieving communal awarenessAzma Alina Ali Zani, Azah Anir Norman, and Norjihan Abdu Ghani7. Understanding users' information security awareness and intentions: a full nomology of protection motivation theoryFarkhondeh Hassandoust and Angsana A. Techatassanasoontorn8. Social big data and its integrity: the effect of trust and personality traits on organic reach of facebook contentVladlena Benson and Tom Buchanan9. The impact of sentiment on content post popularity through emoji and text on social platformsWei-Lun Chang and Hsiao-Chiao Tseng10. Risk and social influence in sustainable smart home technologies: a persuasive systems design modelNataliya Shevchuk, Harri Oinas-Kukkonen, and Vladlena Benson



