Printed and Ebook

Human-Computer Interaction in Cyber Security Handbook


Buy the printed book for $139.95 / £110.00 Buy the ebook for $139.95 / £110.00 Order on Amazon

Key Features


Covers main areas of Human-Computer Interaction and Human Factors in cybersecurity SAVE 20%
Includes information for IT specialist who often desire (or IT specialists then desire) more knowledge about the human side of cybersecurity
Provides a reference for other disciplines such as psychology, behavioral science, software engineering, and security management offers a source of information for cybersecurity
Includes the review of laws and regulation in the new areas such as Internet of Things

From Preface

"This pioneering Handbook, the first of its kind in this field, fills a significant gap in an important domain of investigation, by reflecting recent developments, consolidating present knowledge and opening new perspectives for the future. It provides a structured guide for beginners, a reference collection for more experienced practitioners and researchers in the field, as well as an important educational tool for undergraduate and postgraduate students.

The book is structured in six parts and contains 18 Chapters written by 32 authors from 10 countries, coming from academia, research institutions, industry and public policy institutions. "


Constantine Stephanidis

Table of contents

PART 1 : AUTHENTICATION AND ACCESS MANAGEMENT
  1. User authentication: Alternatives, effectiveness and usability
  2. Biometrics
  3. Machine Identities – foundational to cyber-security
PART 2 : TRUST AND PRIVACY
  1. Trust
  2. New Challenges for User Privacy in Cyberspace
PART 3 : THREATS
  1. Insider Threat: The forgotten, yet formidable foe
  2. Social Engineering
  3. Money Laundering and Black Markets
PART 4 : SMART NETWOKS AND DEVICES
  1. Home Network
  2. Trusted IoT in Ambient Assisted Living Scenarios
  3. Smart Cities under Attack: Cybercrime and Technology Response
  4. Supervisory Control and Data Acquisition – SCADA
  5. Healthcare Information Security and Assurance
PART 5 : GOVERNANCE
  1. Home Network
  2. United States Cybersecurity and Privacy Regulations
  3. The Impact of Recent Legislative in the European Union on Information Security
  4. Privacy and Security in the IoT: Legal Issues Government and Security Agencies
  5. Security Agencies
  6. Enterprise Solutions and Technologies
PART 6 : PERSPECTIVES
  1. Future Perspective

Contibutor

1PART 1 : AUTHENTICATION AND ACCESS MANEMENT

1.Chapter 1: Steven Furnell

2. Chapter 2: Francisco Corella

3. Chapter 2:Karen Lewison

4. Chapter 3: Hari Nair

2PART 2 : TRUST AND PRIVACY

1. Chapter 4: Adam Wojtowicz

2. Chapter 4:Wojciech Cellary

3. Chapter: 5:David Schuster

4. Chapter 5: Scott Alexander

3PART 3 : THREATS

1. Chapter: 6: Maria Papadaki

2.Chapter 6: Stavros Shiaele

3. Cahpter 7: Abbas Moallem

4. Cahpter 8: Brita Sands Bayatmakou

4PART 4 : SMART NETWOKS AND DEVICES

1. Chapter 9: Elias Z. Tragos

2. Chapter 9: Aqeel Kazm

3. Chapter 9: Alexandros Fragkiadakis

4. Chapter 9: Martin Serrano.

5. Chapter 10: Ralf C. Staudemeyer

6. Chapter 10: Artemios G. Voyiatzis

7. Chapter 10: George Moldovan(M)

8. Chapter 10: Santiago Reinhard Suppan

9.Chapter 10: Athanasios Lioumpas

10. Chapter 10: Daniel Calvo

11. Chapter 11: Nathan Lau)

12. Chapter 11: Hao Wang

10. Chapter 12: Ryan Gerde

11.Chapter 13:Ulku Yaylacicegi Clark

12. Jeffrey G. Baltezegar

5PART 5 : GOVERNANCE

1. Home Network

2. Chapter 14: Mark Schertler

3. Chapter 14:Jill Bronfman

4. Chapter 15:Gerald Quirchmayr

5. Chapter 16:Rolf H. Weber

6. Chapter 17:Greg A. Ruppert

7. Chapter 18:Michael Cook

Editor

Abbas Moallem is an executive director of UX Experts, LLC, and an adjunct professor at San Jose State University and California State University, East Bay, where he teaches human-computer interaction (HCI), human factors, and cybersecurity. Dr. Moallem holds a Ph.D. in human factors and ergonomics from the University of Paris (Paris XIII) and has over 20 years of experience in the fields of human factors, ergonomics, HCI, and usability. He worked or consulted with numerous companies.


The book in numbers

403

Pages


Introduction. Authentication. Biometrics. Machine Entities. Privacy. Trust. Insider Threat. Social Engineering. Money Laundering. Black Market. Smart Cities. Smart Network and Devices. Healthcare Information Security and Assurance. Internet of Things. Privacy Regulations. US Government and Law Enforcement. Enterprise Solution and Technologies. The Perspective of the Future. Movies and Media.
20

Useful topics


This handbook is a source of information for the discipline of cybersecurity from a human factors perspective. It is an important and valuable resource for IT specialists, as well as other disciplines such as psychology, behavioral science, software engineering, and security management.

Book Review

"This excellent pioneering handbook on HCI aspects of cybersecurity is a must read for all who are concerned with computer information security."

Gavriel Salvendy, Member National Academy of Engineering, USA.

"This important book is very timely as cybersecurity becomes the most critical factor in assuring safe and effective communication and ultimately business success."

Waldemar Karwowski, Pegasus Professor, and Chair, Department of Industrial Engineering and Management Systems, University of Central Florida, USA

Play Cyber Games

  • Cyber Poker Card Game

    Excellent for employee security training programs Cyber awareness team meetings exhibitor giveaways to booth visitors. Event giveaways you can play alone or in groups of 2, 3, or 4 people.…

  • Phishing Email Card Game

    View cards one by one and sort them into two piles: Phishing and non-Phishing. As you do this, clearly think of the reasons why you qualify the card in its…

  • Path To Security Board Game

    The game covers various important topics of security and human interaction. We feel that these topics are the most pertinent and they need to be covered to a greater extent…


Trainings Workshops, Tutorials, and Talks

July 9, 2018

Human Computer Interaction in Cybersecurity

The “human agent” is at the center of all security research. Some people refer to human agents or users as the “weakest link in the security chain”. It is true that user behavior plays a part in many security failures. This introductory/intermediate course in the human aspects of cyber security […]
July 10, 2018

How to Design User-Friendly Dashboards, 2018, Las Vegas Nevada, USA

With a growing need for mass data visualization, most business and consumer applications display a dashboard page that includes an overview of the system status and content. Are all these dashboards effective? What are the basic principles behind designing effective and intuitive dashboards? This introductory/intermediate course in dashboard design will […]

Upcoming Conference

21st International Conference
on Human-Computer Interaction
Walt Disney World Swan and Dolphin Resort Orlando, Florida, USA 26 - 31 July 2019

Ten sang chanh o nha cho be 2017-2018free vector for designbest game android 2017 free download apkDownload theme wordpress free 2017Co Embed reviewsCo Embed reviewsMy Bikini Belly Program Reviews