Social and Human Elements of Information Security: Emerging Trends and Countermeasures, 1st Edition

  • Published By:
  • ISBN-10: 160566037X
  • ISBN-13: 9781605660370
  • DDC: 658.478
  • Grade Level Range: College Freshman - College Senior
  • 321 Pages | eBook
  • Original Copyright 2008 | Published/Released April 2009
  • This publication's content originally published in print form: 2008

  • Price:  Sign in for price



Provides research on the social and human aspects of information security. Presents the latest trends, issues, and findings in the field.

Table of Contents

Front Cover.
Title Page.
Copyright Page.
List of Reviewers.
Table of Contents.
Detailed Table of Contents.
1: Human and Psychological Aspects.
2: Human and Social Aspects of Password Authentication.
3: Why Humans Are the Weakest Link.
4: Impact of the Human Element on Information Security.
5: The Weakest Link: A Psychological Perspective on Why Users Make Poor Security Decisions.
6: Trusting Computers Through Trusting Humans: Software Verification in a Safety-Critical Information Society.
7: Social and Cultural Aspects.
8: Information Security Culture as a Social System: Some Notes of Information Availability and Sharing.
9: Social Aspects of Information Security: An International Perspective.
10: Social and Human Elements of Information Security: A Case Study.
11: Effects of Digital Convergence on Social Engineering Attack Channels.
12: A Social Ontology for Integrating Security and Software Engineering.
13: Usability Issues.
14: Security Configuration for Non-Experts: A Case Study in Wireless Network Configuration.
15: Security Usability Challenges for End-Users.
16: CAPTCHAs: Differentiating between Human and Bots.
17: Privacy Concerns When Modeling Users in Collaborative Filtering Recommender Systems.
18: Organizational Aspects.
19: An Adaptive Threat-Vulnerability Model and the Economics of Protection.
20: Bridging the Gap between Employee Surveillance and Privacy Protection.
21: Aligning IT Teams' Risk Management to Business Requirements.
22: Security Requirements Elicitation: An Agenda for Acquisition of Human Factors.
23: Do Information Security Policies Reduce the Incidence of Security Breaches: An Exploratory Analysis.
Compilation of References.
About the Contributors.