Psychological and Behavioral Examinations in Cyber Security, 1st Edition

  • John McAlaney
  • Lara A. Frumkin
  • Vladlena Benson
  • Published By:
  • ISBN-10: 1522540547
  • ISBN-13: 9781522540540
  • DDC: 658.4
  • Grade Level Range: College Freshman - College Senior
  • 334 Pages | eBook
  • Original Copyright 2018 | Published/Released January 2019
  • This publication's content originally published in print form: 2018

  • Price:  Sign in for price



Cyber security has become a topic of concern over the past decade. As many individual and organizational activities continue to evolve digitally, it is important to examine the psychological and behavioral aspects of cyber security. This title is a critical scholarly resource that examines the relationship between human behavior and interaction and cyber security. Featuring coverage on a broad range of topics, such as behavioral analysis, cyberpsychology, and online privacy, this book is geared towards IT specialists, administrators, business managers, researchers, and students interested in online decision making in cybersecurity.

Table of Contents

Front Cover.
Title Page.
Copyright Page.
Advances in Digital Crime, Forensics, and Cyber Terrorism (ADCFCT) Book Series.
Titles in This Series.
Editorial Advisory Board.
Table of Contents.
Detailed Table of Contents.
1: Online Decision Making: Online Influence and Implications for Cyber Security.
2: Human Factors Leading to Online Fraud Victimisation: Literature Review and Exploring the Role of Personality Traits.
3: The “Human Factor” in Cybersecurity: Exploring the Accidental Insider.
4: Cyber + Culture: Exploring the Relationship.
5: Examinations of Email Fraud Susceptibility: Perspectives From Academic Research and Industry Practice.
6: Introducing Psychological Concepts and Methods to Cybersecurity Students.
7: The Role of Psychology in Understanding Online Trust.
8: Volunteered Surveillance.
9: Psychological and Behavioral Examinations of Online Terrorism.
10: The Role of Religiosity in Technology Acceptance: The Case of Privacy in Saudi Arabia.
11: Groups Online: Hacktivism and Social Protest.
12: A Cyber-Psychological and Behavioral Approach to Online Radicalization.
13: Insider Attack Analysis in Building Effective Cyber Security for an Organization.
14: A Study of Good-Enough Security in the Context of Rural Business Process Outsourcing.
15: Online Research Methods.
16: Emerging Threats for the Human Element and Countermeasures in Current Cyber Security Landscape.
Compilation of References.
About the Contributors.