Cyber Influence and Cognitive Threats

Vladlena Benson (Editor), John McAlaney (Editor)

Research output: Book/ReportBook

Abstract

In the wake of fresh allegations that personality data from Facebook users have been illegally used to influence the outcome of the US general election and the Brexit vote, the debate over manipulation of social big data is gaining further momentum. This book addresses the social data privacy and data integrity vulnerabilities threatening the future of policy. Attackers exploit users’ trust, breach their privacy, undertake industrial espionage and disrupt critical infrastructure.

Cyber criminals are using a wide range of methods, which are continuously evolving and increasingly motivated by financial gain on industrial scale. On one hand machine learning is being integrated into many security solutions, so that the platform automatically learns, adjusts, and adapts to the ever-changing Internet threat environment. The cyber security industry, policymakers, law enforcement, public and private sector organizations are yet to fully realize the impact emerging AI capabilities have or will have on security. On the other hand researchers have addressed human behavior in online contexts for some time, though humans are still seen as the weakest link in cyber security chain. It is important that this gap is addressed.

Understanding human behavior that have emerged and influence over social platforms in cyber security is critical and is an acute issue in ensuring security in personal, professional and organisational settings.

This book covers a variety of topics and addresses different challenges that have emerged. It discusses changes in the ways in which it is possible to study various areas of cognitive applications that relate to decision-making, behavior and human interaction in relation to cyber security.

These new challenges include phenomena such as the growth of hacktivism, the proliferation of open source hacking tools and social media enabled social engineering strategies, which are worthy of attention.

This publication comprises of chapters, which address social influence, cognitive computing and analytics as well as digital psychology, and the opportunities offered by cyber researchers. Academics contributing to this edited volume represent a wide range of research areas: information systems, psychology, sociology, strategy, innovation, and others.
Original languageEnglish
Place of PublicationUSA
PublisherElsevier
Number of pages400
ISBN (Print)9780128192047
Publication statusPublished - 1 Sep 2019

Fingerprint

Critical infrastructures
Data privacy
Law enforcement
Learning systems
Momentum
Information systems
Innovation
Decision making
Internet
Industry
Big data

Cite this

Benson, V., & McAlaney, J. (Eds.) (2019). Cyber Influence and Cognitive Threats. USA: Elsevier.
Benson, Vladlena (Editor) ; McAlaney, John (Editor). / Cyber Influence and Cognitive Threats. USA : Elsevier, 2019. 400 p.
@book{d31e264ebc574ca29e677fc1fc14bdf8,
title = "Cyber Influence and Cognitive Threats",
abstract = "In the wake of fresh allegations that personality data from Facebook users have been illegally used to influence the outcome of the US general election and the Brexit vote, the debate over manipulation of social big data is gaining further momentum. This book addresses the social data privacy and data integrity vulnerabilities threatening the future of policy. Attackers exploit users’ trust, breach their privacy, undertake industrial espionage and disrupt critical infrastructure. Cyber criminals are using a wide range of methods, which are continuously evolving and increasingly motivated by financial gain on industrial scale. On one hand machine learning is being integrated into many security solutions, so that the platform automatically learns, adjusts, and adapts to the ever-changing Internet threat environment. The cyber security industry, policymakers, law enforcement, public and private sector organizations are yet to fully realize the impact emerging AI capabilities have or will have on security. On the other hand researchers have addressed human behavior in online contexts for some time, though humans are still seen as the weakest link in cyber security chain. It is important that this gap is addressed. Understanding human behavior that have emerged and influence over social platforms in cyber security is critical and is an acute issue in ensuring security in personal, professional and organisational settings. This book covers a variety of topics and addresses different challenges that have emerged. It discusses changes in the ways in which it is possible to study various areas of cognitive applications that relate to decision-making, behavior and human interaction in relation to cyber security. These new challenges include phenomena such as the growth of hacktivism, the proliferation of open source hacking tools and social media enabled social engineering strategies, which are worthy of attention. This publication comprises of chapters, which address social influence, cognitive computing and analytics as well as digital psychology, and the opportunities offered by cyber researchers. Academics contributing to this edited volume represent a wide range of research areas: information systems, psychology, sociology, strategy, innovation, and others.",
editor = "Vladlena Benson and John McAlaney",
year = "2019",
month = "9",
day = "1",
language = "English",
isbn = "9780128192047",
publisher = "Elsevier",
address = "Netherlands",

}

Benson, V & McAlaney, J (eds) 2019, Cyber Influence and Cognitive Threats. Elsevier, USA.

Cyber Influence and Cognitive Threats. / Benson, Vladlena (Editor); McAlaney, John (Editor).

USA : Elsevier, 2019. 400 p.

Research output: Book/ReportBook

TY - BOOK

T1 - Cyber Influence and Cognitive Threats

A2 - Benson, Vladlena

A2 - McAlaney, John

PY - 2019/9/1

Y1 - 2019/9/1

N2 - In the wake of fresh allegations that personality data from Facebook users have been illegally used to influence the outcome of the US general election and the Brexit vote, the debate over manipulation of social big data is gaining further momentum. This book addresses the social data privacy and data integrity vulnerabilities threatening the future of policy. Attackers exploit users’ trust, breach their privacy, undertake industrial espionage and disrupt critical infrastructure. Cyber criminals are using a wide range of methods, which are continuously evolving and increasingly motivated by financial gain on industrial scale. On one hand machine learning is being integrated into many security solutions, so that the platform automatically learns, adjusts, and adapts to the ever-changing Internet threat environment. The cyber security industry, policymakers, law enforcement, public and private sector organizations are yet to fully realize the impact emerging AI capabilities have or will have on security. On the other hand researchers have addressed human behavior in online contexts for some time, though humans are still seen as the weakest link in cyber security chain. It is important that this gap is addressed. Understanding human behavior that have emerged and influence over social platforms in cyber security is critical and is an acute issue in ensuring security in personal, professional and organisational settings. This book covers a variety of topics and addresses different challenges that have emerged. It discusses changes in the ways in which it is possible to study various areas of cognitive applications that relate to decision-making, behavior and human interaction in relation to cyber security. These new challenges include phenomena such as the growth of hacktivism, the proliferation of open source hacking tools and social media enabled social engineering strategies, which are worthy of attention. This publication comprises of chapters, which address social influence, cognitive computing and analytics as well as digital psychology, and the opportunities offered by cyber researchers. Academics contributing to this edited volume represent a wide range of research areas: information systems, psychology, sociology, strategy, innovation, and others.

AB - In the wake of fresh allegations that personality data from Facebook users have been illegally used to influence the outcome of the US general election and the Brexit vote, the debate over manipulation of social big data is gaining further momentum. This book addresses the social data privacy and data integrity vulnerabilities threatening the future of policy. Attackers exploit users’ trust, breach their privacy, undertake industrial espionage and disrupt critical infrastructure. Cyber criminals are using a wide range of methods, which are continuously evolving and increasingly motivated by financial gain on industrial scale. On one hand machine learning is being integrated into many security solutions, so that the platform automatically learns, adjusts, and adapts to the ever-changing Internet threat environment. The cyber security industry, policymakers, law enforcement, public and private sector organizations are yet to fully realize the impact emerging AI capabilities have or will have on security. On the other hand researchers have addressed human behavior in online contexts for some time, though humans are still seen as the weakest link in cyber security chain. It is important that this gap is addressed. Understanding human behavior that have emerged and influence over social platforms in cyber security is critical and is an acute issue in ensuring security in personal, professional and organisational settings. This book covers a variety of topics and addresses different challenges that have emerged. It discusses changes in the ways in which it is possible to study various areas of cognitive applications that relate to decision-making, behavior and human interaction in relation to cyber security. These new challenges include phenomena such as the growth of hacktivism, the proliferation of open source hacking tools and social media enabled social engineering strategies, which are worthy of attention. This publication comprises of chapters, which address social influence, cognitive computing and analytics as well as digital psychology, and the opportunities offered by cyber researchers. Academics contributing to this edited volume represent a wide range of research areas: information systems, psychology, sociology, strategy, innovation, and others.

UR - https://www.elsevier.com/books/cyber-influence-and-cognitive-threats/benson/978-0-12-819204-7

M3 - Book

SN - 9780128192047

BT - Cyber Influence and Cognitive Threats

PB - Elsevier

CY - USA

ER -

Benson V, (ed.), McAlaney J, (ed.). Cyber Influence and Cognitive Threats. USA: Elsevier, 2019. 400 p.