Näytä suppeat kuvailutiedot

dc.contributor.authorWoods, Naomi
dc.contributor.editorLehto, Martti
dc.contributor.editorNeittaanmäki, Pekka
dc.date.accessioned2023-02-24T12:26:21Z
dc.date.available2023-02-24T12:26:21Z
dc.date.issued2022
dc.identifier.citationWoods, N. (2022). Users’ Psychopathologies : Impact on Cybercrime Vulnerabilities and Cybersecurity Behavior. In M. Lehto, & P. Neittaanmäki (Eds.), <i>Cyber Security : Critical Infrastructure Protection</i> (pp. 93-134). Springer. Computational Methods in Applied Sciences, 56. <a href="https://doi.org/10.1007/978-3-030-91293-2_5" target="_blank">https://doi.org/10.1007/978-3-030-91293-2_5</a>
dc.identifier.otherCONVID_117612954
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/85636
dc.description.abstractThe internet and digital technologies have become an integral part of people’s daily lives. The online world provides many benefits to billions of users globally. However, it also brings risks too, because it is easy for criminals to reach their victims and exploit their online behavior. Nevertheless, users often perform risky security behaviors for convenience and usability, and because of their inadequate security awareness. With around 25% of the world’s population experiencing mental and/or neurological disorders, it is important to understand how users’ psychopathologies manifest themselves in the context of cybersecurity. This chapter has reviewed the symptoms of several mental disorders while considering the online benefits and risks, and these symptoms have been applied to evaluate users’ vulnerability to cybercrimes and cybersecurity practices. The findings reveal how the complexity of each mental disorder influences users’ online engagement and susceptibility to cybercrimes, and how uniquely, to varying degrees, they affect different cybersecurity behaviors.en
dc.format.extent484
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherSpringer
dc.relation.ispartofCyber Security : Critical Infrastructure Protection
dc.relation.ispartofseriesComputational Methods in Applied Sciences
dc.rightsIn Copyright
dc.subject.othercybersecurity behavior
dc.subject.otherpsychopathology
dc.subject.othermental disorder
dc.subject.othercybercrime
dc.subject.otheronline benefits
dc.subject.otheronline risks
dc.subject.otheruser psychology
dc.subject.othercyberpsychology
dc.titleUsers’ Psychopathologies : Impact on Cybercrime Vulnerabilities and Cybersecurity Behavior
dc.typebookPart
dc.identifier.urnURN:NBN:fi:jyu-202302241898
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.contributor.oppiaineEmpirical Cyber Security and Software Engineeringfi
dc.contributor.oppiaineTietojärjestelmätiedefi
dc.contributor.oppiaineKyberturvallisuusfi
dc.contributor.oppiaineEmpirical Cyber Security and Software Engineeringen
dc.contributor.oppiaineInformation Systems Scienceen
dc.contributor.oppiaineCyber securityen
dc.type.urihttp://purl.org/eprint/type/BookItem
dc.relation.isbn978-3-030-91292-5
dc.type.coarhttp://purl.org/coar/resource_type/c_3248
dc.description.reviewstatuspeerReviewed
dc.format.pagerange93-134
dc.relation.issn1871-3033
dc.type.versionacceptedVersion
dc.rights.copyright© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
dc.rights.accesslevelopenAccessfi
dc.subject.ysohaavoittuvuus
dc.subject.ysokäyttäjät
dc.subject.ysoriskit
dc.subject.ysopsykopatologia
dc.subject.ysomielenterveyshäiriöt
dc.subject.ysokyberrikollisuus
dc.subject.ysokäyttäjäpsykologia
dc.subject.ysokyberturvallisuus
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p25011
jyx.subject.urihttp://www.yso.fi/onto/yso/p16550
jyx.subject.urihttp://www.yso.fi/onto/yso/p11099
jyx.subject.urihttp://www.yso.fi/onto/yso/p7342
jyx.subject.urihttp://www.yso.fi/onto/yso/p990
jyx.subject.urihttp://www.yso.fi/onto/yso/p29491
jyx.subject.urihttp://www.yso.fi/onto/yso/p16588
jyx.subject.urihttp://www.yso.fi/onto/yso/p26189
dc.rights.urlhttp://rightsstatements.org/page/InC/1.0/?language=en
dc.relation.doi10.1007/978-3-030-91293-2_5
dc.type.okmA3


Aineistoon kuuluvat tiedostot

Thumbnail

Aineisto kuuluu seuraaviin kokoelmiin

Näytä suppeat kuvailutiedot

In Copyright
Ellei muuten mainita, aineiston lisenssi on In Copyright