Skip to main navigation
Skip to search
Skip to main content
Aston Research Explorer Home
Help & FAQ
Home
Research units
Profiles
Research Outputs
Datasets
Student theses
Activities
Press/Media
Prizes
Equipment
Search by expertise, name or affiliation
Cyber Influence and Cognitive Threats
Vladlena Benson
(Editor), John McAlaney (Editor)
Operations & Information Management
Aston University
Research output
:
Book/Report
›
Book
Overview
Fingerprint
Press/Media
(1)
Fingerprint
Dive into the research topics of 'Cyber Influence and Cognitive Threats'. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Computer Science
Decision-Making
100%
Machine Learning
100%
Learning System
100%
Artificial Intelligence
100%
Open Source
100%
Attackers
100%
Human Interaction
100%
Online Context
100%
Big Data
100%
Facebook
100%
Threat Environment
100%
Critical Infrastructure
100%
Social Platform
100%
Public Law Enforcement
100%
Data Integrity
100%
Security Industry
100%
Financial Gain
100%
Security Solution
100%
Data Privacy
100%
Cognitive Computing
100%
Cyber Criminal
100%
Industrial Espionage
100%
Private Sector Organization
100%
Information Systems
100%
Keyphrases
Cybersecurity
100%
Cyber
100%
Human Behavior
50%
Vulnerability
25%
General Election
25%
Politicians
25%
Machine Learning
25%
Public Sector Organizations
25%
Book Cover
25%
Social Influence
25%
Organizational Setting
25%
Private Sector Organizations
25%
Online Environment
25%
Human Interaction
25%
Strategic Innovation
25%
Attacker
25%
Weakest Link
25%
Decision-making Behavior
25%
Social Media
25%
Professional Environment
25%
Facebook Users
25%
Law Enforcement
25%
AI Capabilities
25%
Personal-professional
25%
Cyber Crime
25%
Security Industry
25%
User Trust
25%
Social Platform
25%
Area Information
25%
Threat Environment
25%
Engineering Strategies
25%
Brexit Referendum
25%
Breach of Trust
25%
Industrial Espionage
25%
Social Engineering
25%
Hacking Tools
25%
Cognitive Computing
25%
Social Data
25%
Digital Psychology
25%
Data Privacy
25%
Financial Gain
25%
Cognitive Applications
25%
Ensuring Security
25%
Security Solutions
25%
Cognitive Analytics
25%
Data Integrity
25%
Social Big Data
25%
Systems Psychology
25%
Critical Infrastructure
25%
Internet Threats
25%
Hacktivism
25%