dc.contributor.author | Woods, Naomi | |
dc.contributor.editor | Lehto, Martti | |
dc.contributor.editor | Neittaanmäki, Pekka | |
dc.date.accessioned | 2023-02-24T12:26:21Z | |
dc.date.available | 2023-02-24T12:26:21Z | |
dc.date.issued | 2022 | |
dc.identifier.citation | Woods, N. (2022). Users’ Psychopathologies : Impact on Cybercrime Vulnerabilities and Cybersecurity Behavior. In M. Lehto, & P. Neittaanmäki (Eds.), <i>Cyber Security : Critical Infrastructure Protection</i> (pp. 93-134). Springer. Computational Methods in Applied Sciences, 56. <a href="https://doi.org/10.1007/978-3-030-91293-2_5" target="_blank">https://doi.org/10.1007/978-3-030-91293-2_5</a> | |
dc.identifier.other | CONVID_117612954 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/85636 | |
dc.description.abstract | The internet and digital technologies have become an integral part of people’s daily lives. The online world provides many benefits to billions of users globally. However, it also brings risks too, because it is easy for criminals to reach their victims and exploit their online behavior. Nevertheless, users often perform risky security behaviors for convenience and usability, and because of their inadequate security awareness. With around 25% of the world’s population experiencing mental and/or neurological disorders, it is important to understand how users’ psychopathologies manifest themselves in the context of cybersecurity. This chapter has reviewed the symptoms of several mental disorders while considering the online benefits and risks, and these symptoms have been applied to evaluate users’ vulnerability to cybercrimes and cybersecurity practices. The findings reveal how the complexity of each mental disorder influences users’ online engagement and susceptibility to cybercrimes, and how uniquely, to varying degrees, they affect different cybersecurity behaviors. | en |
dc.format.extent | 484 | |
dc.format.mimetype | application/pdf | |
dc.language.iso | eng | |
dc.publisher | Springer | |
dc.relation.ispartof | Cyber Security : Critical Infrastructure Protection | |
dc.relation.ispartofseries | Computational Methods in Applied Sciences | |
dc.rights | In Copyright | |
dc.subject.other | cybersecurity behavior | |
dc.subject.other | psychopathology | |
dc.subject.other | mental disorder | |
dc.subject.other | cybercrime | |
dc.subject.other | online benefits | |
dc.subject.other | online risks | |
dc.subject.other | user psychology | |
dc.subject.other | cyberpsychology | |
dc.title | Users’ Psychopathologies : Impact on Cybercrime Vulnerabilities and Cybersecurity Behavior | |
dc.type | bookPart | |
dc.identifier.urn | URN:NBN:fi:jyu-202302241898 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.contributor.oppiaine | Empirical Cyber Security and Software Engineering | fi |
dc.contributor.oppiaine | Tietojärjestelmätiede | fi |
dc.contributor.oppiaine | Kyberturvallisuus | fi |
dc.contributor.oppiaine | Empirical Cyber Security and Software Engineering | en |
dc.contributor.oppiaine | Information Systems Science | en |
dc.contributor.oppiaine | Cyber security | en |
dc.type.uri | http://purl.org/eprint/type/BookItem | |
dc.relation.isbn | 978-3-030-91292-5 | |
dc.type.coar | http://purl.org/coar/resource_type/c_3248 | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 93-134 | |
dc.relation.issn | 1871-3033 | |
dc.type.version | acceptedVersion | |
dc.rights.copyright | © 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG | |
dc.rights.accesslevel | openAccess | fi |
dc.subject.yso | haavoittuvuus | |
dc.subject.yso | käyttäjät | |
dc.subject.yso | riskit | |
dc.subject.yso | psykopatologia | |
dc.subject.yso | mielenterveyshäiriöt | |
dc.subject.yso | kyberrikollisuus | |
dc.subject.yso | käyttäjäpsykologia | |
dc.subject.yso | kyberturvallisuus | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p25011 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p16550 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p11099 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p7342 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p990 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p29491 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p16588 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p26189 | |
dc.rights.url | http://rightsstatements.org/page/InC/1.0/?language=en | |
dc.relation.doi | 10.1007/978-3-030-91293-2_5 | |
dc.type.okm | A3 | |