Printed and Ebook

Human-Computer Interaction in Cyber Security Handbook

Buy the printed book for $139.95 / £110.00 Buy the ebook for $139.95 / £110.00 Order on Amazon

Key Features

Covers main areas of Human-Computer Interaction and Human Factors in cybersecurity SAVE 20%
Includes information for IT specialist who often desire (or IT specialists then desire) more knowledge about the human side of cybersecurity
Provides a reference for other disciplines such as psychology, behavioral science, software engineering, and security management offers a source of information for cybersecurity
Includes the review of laws and regulation in the new areas such as Internet of Things

From Preface

"This pioneering Handbook, the first of its kind in this field, fills a significant gap in an important domain of investigation, by reflecting recent developments, consolidating present knowledge and opening new perspectives for the future. It provides a structured guide for beginners, a reference collection for more experienced practitioners and researchers in the field, as well as an important educational tool for undergraduate and postgraduate students.

The book is structured in six parts and contains 18 Chapters written by 32 authors from 10 countries, coming from academia, research institutions, industry and public policy institutions. "

Constantine Stephanidis

Table of contents

  1. User authentication: Alternatives, effectiveness and usability
  2. Biometrics
  3. Machine Identities – foundational to cyber-security
  1. Trust
  2. New Challenges for User Privacy in Cyberspace
  1. Insider Threat: The forgotten, yet formidable foe
  2. Social Engineering
  3. Money Laundering and Black Markets
  1. Home Network
  2. Trusted IoT in Ambient Assisted Living Scenarios
  3. Smart Cities under Attack: Cybercrime and Technology Response
  4. Supervisory Control and Data Acquisition – SCADA
  5. Healthcare Information Security and Assurance
  1. Home Network
  2. United States Cybersecurity and Privacy Regulations
  3. The Impact of Recent Legislative in the European Union on Information Security
  4. Privacy and Security in the IoT: Legal Issues Government and Security Agencies
  5. Security Agencies
  6. Enterprise Solutions and Technologies
  1. Future Perspective



1.Chapter 1: Steven Furnell

2. Chapter 2: Francisco Corella

3. Chapter 2:Karen Lewison

4. Chapter 3: Hari Nair


1. Chapter 4: Adam Wojtowicz

2. Chapter 4:Wojciech Cellary

3. Chapter: 5:David Schuster

4. Chapter 5: Scott Alexander


1. Chapter: 6: Maria Papadaki

2.Chapter 6: Stavros Shiaele

3. Cahpter 7: Abbas Moallem

4. Cahpter 8: Brita Sands Bayatmakou


1. Chapter 9: Elias Z. Tragos

2. Chapter 9: Aqeel Kazm

3. Chapter 9: Alexandros Fragkiadakis

4. Chapter 9: Martin Serrano.

5. Chapter 10: Ralf C. Staudemeyer

6. Chapter 10: Artemios G. Voyiatzis

7. Chapter 10: George Moldovan(M)

8. Chapter 10: Santiago Reinhard Suppan

9.Chapter 10: Athanasios Lioumpas

10. Chapter 10: Daniel Calvo

11. Chapter 11: Nathan Lau)

12. Chapter 11: Hao Wang

10. Chapter 12: Ryan Gerde

11.Chapter 13:Ulku Yaylacicegi Clark

12. Jeffrey G. Baltezegar


1. Home Network

2. Chapter 14: Mark Schertler

3. Chapter 14:Jill Bronfman

4. Chapter 15:Gerald Quirchmayr

5. Chapter 16:Rolf H. Weber

6. Chapter 17:Greg A. Ruppert

7. Chapter 18:Michael Cook


Abbas Moallem is an executive director of UX Experts, LLC, and an adjunct professor at San Jose State University and California State University, East Bay, where he teaches human-computer interaction (HCI), human factors, and cybersecurity. Dr. Moallem holds a Ph.D. in human factors and ergonomics from the University of Paris (Paris XIII) and has over 20 years of experience in the fields of human factors, ergonomics, HCI, and usability. He worked or consulted with numerous companies.

The book in numbers



Introduction. Authentication. Biometrics. Machine Entities. Privacy. Trust. Insider Threat. Social Engineering. Money Laundering. Black Market. Smart Cities. Smart Network and Devices. Healthcare Information Security and Assurance. Internet of Things. Privacy Regulations. US Government and Law Enforcement. Enterprise Solution and Technologies. The Perspective of the Future. Movies and Media.

Useful topics

This handbook is a source of information for the discipline of cybersecurity from a human factors perspective. It is an important and valuable resource for IT specialists, as well as other disciplines such as psychology, behavioral science, software engineering, and security management.

Book Review

"This excellent pioneering handbook on HCI aspects of cybersecurity is a must read for all who are concerned with computer information security."

Gavriel Salvendy, Member National Academy of Engineering, USA.

"This important book is very timely as cybersecurity becomes the most critical factor in assuring safe and effective communication and ultimately business success."

Waldemar Karwowski, Pegasus Professor, and Chair, Department of Industrial Engineering and Management Systems, University of Central Florida, USA

Cybersecurity Awareness Among Students and Faculty

In modern times, all individuals need to be knowledgeable about cybersecurity. They must have practical skills and abilities to protect themselves in cyberspace. What is the level of awareness among college students and faculty, who represent the most technologically active portion of the population in any society?

Read More About Book

Play Cyber Games

  • Cyber Poker Card Game

    Excellent for employee security training programs Cyber awareness team meetings exhibitor giveaways to booth visitors. Event giveaways you can play alone or in groups of 2, 3, or 4 people.…

  • Phishing Email Card Game

    View cards one by one and sort them into two piles: Phishing and non-Phishing. As you do this, clearly think of the reasons why you qualify the card in its…

  • Path To Security Board Game

    The game covers various important topics of security and human interaction. We feel that these topics are the most pertinent and they need to be covered to a greater extent…

Trainings Workshops, Tutorials, and Talks

July 9, 2018

Human Computer Interaction in Cybersecurity

The “human agent” is at the center of all security research. Some people refer to human agents or users as the “weakest link in the security chain”. It is true that user behavior plays a part in many security failures. This introductory/intermediate course in the human aspects of cyber security […]
July 10, 2018

How to Design User-Friendly Dashboards, 2018, Las Vegas Nevada, USA

With a growing need for mass data visualization, most business and consumer applications display a dashboard page that includes an overview of the system status and content. Are all these dashboards effective? What are the basic principles behind designing effective and intuitive dashboards? This introductory/intermediate course in dashboard design will […]

Upcoming Conference

3rd International Conference
on Human-Computer Interaction
Washington DC, USA., 24-29 July 2021 July 2021

News and Medias

June 20, 2020

Criminal ring of Chrome spyware extensions exposed, millions of users affected

Criminal ring of Chrome spyware extensions exposed, millions of users affected  
June 20, 2020

Billions of records exposed. Zack Whittaker@zackwhittaker / 7:30 am PDT•June 19, 2020 Comment

Oracle’s BlueKai tracks you across the web. That data spilled online
June 20, 2020

How Surveillance Has Always Reinforced Racism
May 26, 2019

Ransomware attacks in US cities are using a stolen NSA tool

Ransomware attacks in US cities are using a stolen NSA tool
April 6, 2019

Hacker group has been hijacking DNS traffic on D-Link routers for three months

Ten sang chanh o nha cho be 2017-2018free vector for designbest game android 2017 free download apkDownload theme wordpress free 2017Co Embed reviewsCo Embed reviewsMy Bikini Belly Program Reviews