ebook img

Human-computer interaction and cybersecurity handbook PDF

459 Pages·2019·24.654 MB·English
by  MoallemAbbas
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Human-computer interaction and cybersecurity handbook

Human-Computer Interaction and Cybersecurity Handbook Human Factors and Ergonomics Series Editors Waldemar Karwowski University of Central Florida, Orlando, USA Pamela McCauley University of Central Florida, Orlando, USA PUBLISHED TITLES Around the Patient Bed: Human Factors and Safety in Health Care Y. Donchin and D. Gopher Cognitive Neuroscience of Human Systems: Work and Everyday Life C. Forsythe, H. Liao, M. Trumbo, and R. E. Cardona-Rivera Conceptual Foundations of Human Factors Measurement D. Meister Content Preparation Guidelines for the Web and Information Appliances: Cross-Cultural Comparisons H. Liao, Y. Guo, A. Savoy, and G. Salvendy Cross-Cultural Design for IT Products and Services P. Rau, T. Plocher and Y. Choong Data Mining: Theories, Algorithms, and Examples Nong Ye Designing for Accessibility: A Business Guide to Countering Design Exclusion S. Keates Ergonomics in Design: Methods and Techniques Marcelo M. Soares and Francisco Rebelo Ergonomic Workplace Design for Health, Wellness, and Productivity Alan Hedge Fall Prevention and Protection: Principles, Guidelines, and Practices Hongwei Hsiao Handbook of Cognitive Task Design E. Hollnagel The Handbook of Data Mining N. Ye Handbook of Digital Human Modeling: Research for Applied Ergonomics and Human Factors Engineering V. G. Duffy Handbook of Human Factors and Ergonomics in Health Care and Patient Safety Second Edition P. Carayon Handbook of Human Factors in Air Transportation Systems Steven James Landry Handbook of Human Factors in Web Design, Second Edition K. Vu and R. Proctor Handbook of Occupational Safety and Health D. Koradecka Handbook of Standards and Guidelines in Ergonomics and Human Factors W. Karwowski Handbook of Virtual Environments: Design, Implementation,and Applications, Second Edition, K. S. Hale and K M. Stanney Human-Computer Interaction and Cybersecurity Handbook Abbas Moallem Human-Computer Interaction and Cybersecurity Handbook Edited by Abbas Moallem CRC Press Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742 © 2019 by Taylor & Francis Group, LLC CRC Press is an imprint of Taylor & Francis Group, an Informa business No claim to original U.S. Government works Printed on acid-free paper International Standard Book Number-13: 978-1-138-73916-1 (Hardback) This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materi- als or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged, please write and let us know so we may rectify in any future reprint. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, micro- filming, and recording, or in any information storage or retrieval system, without written permission from the publishers. For permission to photocopy or use material electronically from this work, please access www.copyright.com (http://www .copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750- 8400. CCC is a not-for-profit organization that provides licenses and registration for a variety of users. For organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged. Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identifi- cation and explanation without intent to infringe. Visit the Taylor & Francis Web site at http://www.taylorandfrancis.com and the CRC Press Web site at http://www.crcpress.com To the loving memory of my father, mother, and brother http://taylorandfrancis.com Contents List of figures ..................................................................................................................................xi List of tables .................................................................................................................................xiii Preface .............................................................................................................................................xv Acknowledgments .....................................................................................................................xvii Introduction .................................................................................................................................xix Editor..........................................................................................................................................xxvii Contributors ...............................................................................................................................xxix Section I: Authentication and access management Chapter 1 User authentication: Alternatives, effectiveness, and usability .....................3 Steven Furnell Chapter 2 Biometrics ................................................................................................................29 Francisco Corella and Karen Lewison Chapter 3 Machine identities: Foundational to cybersecurity .........................................49 Hari Nair Section II: Trust and privacy Chapter 4 New challenges for user privacy in cyberspace ...............................................77 Adam Wójtowicz and Wojciech Cellary Chapter 5 Trust ..........................................................................................................................97 David Schuster and Alexander Scott Section III: Threats Chapter 6 Insider threat: The forgotten, yet formidable foe ..........................................119 Maria Papadaki and Stavros Shiaeles vii viii Contents Chapter 7 Social engineering ................................................................................................139 Abbas Moallem Chapter 8 Money laundering and black markets .............................................................157 Brita Sands Bayatmakou Section IV: Smart networks and devices Chapter 9 Smart home network and devices .....................................................................177 Abbas Moallem Chapter 10 Trusted IoT in ambient assisted living scenarios ..........................................191 Elias Z. Tragos, Alexandros Fragkiadakis, Aqeel Kazmi, and Martin Serrano Chapter 11 Smart cities under attack: Cybercrime and technology response ..............209 Ralf C. Staudemeyer, Artemios G. Voyiatzis, George Moldovan, Santiago Reinhard Suppan, Athanasios Lioumpas, and Daniel Calvo Chapter 12 Securing supervisory control and data acquisition control systems .........237 Nathan Lau, Hao Wang, Ryan Gerdes, and Chee-Wooi Ten Chapter 13 Healthcare information security and assurance ............................................257 Ulku Yaylacicegi Clark and Jeffrey G. Baltezegar Section V: Governance Chapter 14 US cybersecurity and privacy regulations ......................................................273 Mark Schertler and Jill Bronfman Chapter 15 Impact of recent legislative developments in the European Union on information security ......................................................................................295 Gerald Quirchmayr Chapter 16 Privacy and security in the IoT—Legal issues...............................................305 Rolf H. Weber Chapter 17 US government and law enforcement ..............................................................321 Greg A. Ruppert Chapter 18 Enterprise solutions and technologies .............................................................329 Michael Cook Contents ix Section VI: Perspective Chapter 19 Perspectives on the future of human factors in cybersecurity ..................353 Abbas Moallem Chapter 20 Movies and media .................................................................................................367 Abbas Moallem Glossary ........................................................................................................................................381 Index .............................................................................................................................................407

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.