You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
In the wake of fresh allegations that personal data of Facebook users have been illegally used to influence the outcome of the US general election and the Brexit vote, the debate over manipulation of social Big Data continues to gain more momentum. Cyber Influence and Cognitive Threats addresses various emerging challenges in response to cybersecurity, examining cognitive applications in decision-making, behaviour and basic human interaction. The book examines the role of psychology in cybersecurity by addressing each factor involved in the process: hackers, targets, cybersecurity practitioners, and the wider social context in which these groups operate. Cyber Influence and Cognitive Threats...
Social technology is quickly becoming a vital tool in our personal, educational, and professional lives. However, while social networking helps the world stay connected, its use must be further examined in order to determine any possible pitfalls associated with the use of this technology. Implications of Social Media Use in Personal and Professional Settings investigates the paradoxical nature of social networking in our personal lives and in the workplace. Highlighting emergent research and psychological impacts, this publication is an indispensable reference source for academics, researchers, and professionals interested in the application of social media, as well as the positive aspects and detrimental effects of the usage of these technologies.
Cyber security has become a topic of concern over the past decade. As many individual and organizational activities continue to evolve digitally, it is important to examine the psychological and behavioral aspects of cyber security. Psychological and Behavioral Examinations in Cyber Security is a critical scholarly resource that examines the relationship between human behavior and interaction and cyber security. Featuring coverage on a broad range of topics, such as behavioral analysis, cyberpsychology, and online privacy, this book is geared towards IT specialists, administrators, business managers, researchers, and students interested in online decision making in cybersecurity.
Emerging Cyber Threats and Cognitive Vulnerabilities identifies the critical role human behavior plays in cybersecurity and provides insights into how human decision-making can help address rising volumes of cyberthreats. The book examines the role of psychology in cybersecurity by addressing each actor involved in the process: hackers, targets, cybersecurity practitioners and the wider social context in which these groups operate. It applies psychological factors such as motivations, group processes and decision-making heuristics that may lead individuals to underestimate risk. The goal of this understanding is to more quickly identify threat and create early education and prevention strate...
"This book examines the implementation and success of mobile digital learning tools, with the inclusion of data on specific learning environments enhanced by ubiquitous educational technologies"--Provided by publisher.
In the digital era, users from around the world are constantly connected over a global network, where they have the ability to connect, share, and collaborate like never before. To make the most of this new environment, researchers and software developers must understand users’ needs and expectations. Social Media and Networking: Concepts, Methodologies, Tools, and Applications explores the burgeoning global community made possible by Web 2.0 technologies and a universal, interconnected society. With four volumes of chapters related to digital media, online engagement, and virtual environments, this multi-volume reference is an essential source for software developers, web designers, researchers, students, and IT specialists interested in the growing field of digital media and engagement. This four-volume reference includes various chapters covering topics related to Web 2.0, e-governance, social media activism, internet privacy, digital and virtual communities, e-business, customer relationship management, and more.
description not available right now.
It is a great pleasure to share with you the Springer CCIS 112 proceedings of the Third World Summit on the Knowledge Society––WSKS 2010––that was organized by the International Scientific Council for the Knowledge Society, and supported by the Open Research Society, NGO, (http://www.open-knowledge-society.org) and the Int- national Journal of the Knowledge Society Research, (http://www.igi-global.com/ijksr), and took place in Aquis Corfu Holiday Palace Hotel, on Corfu island, Greece, September 22–24, 2010. The Third World Summit on the Knowledge Society (WSKS 2010) was an inter- tional scientific event devoted to promoting the dialogue on the main aspects of the knowledge society ...
Typically utilized by larger corporations, social media marketing and strategy is lacking in small and medium-sized nonprofit organizations. Although these organizations are beginning to incorporate this form of online communication, there is still a need to understand the best practices and proper tools to enhance an organization’s presence on the web. Cases on Strategic Social Media Utilization in the Nonprofit Sector brings together cases and chapters in order to examine both the practical and theoretical components of creating an online social community for nonprofit organizations. The technologies discussed in this publication provide organizations with the necessary cost-effective tools for fundraising, marketing, and civic engagement. This publication is an essential reference source for practitioners, academicians, researchers, and advanced-level students interested in learning how to effectively use social media technologies in the nonprofit sector.
This book constitutes the proceedings of the 4th World Summit on the Knowledge Society, WSKS 2011, held in Mykonos, Greece, in September 2011. The 90 revised full papers presented were carefully reviewed and selected from 198 submissions. The papers address issues such as information technology, e-learning, e-business, cultural heritage, e-government.