Survey on Risk Management Based on Information Security Psychology
In developing Cyber Physical Systems, such as smart grid and smart cities, risk management technologies play an important role to provide safe and secure services. In this paper, focusing on changes of recent threats represented by Social engineering, a survey shows that the information security psy...
Saved in:
Published in | Human-Computer Interaction: Users and Contexts pp. 396 - 408 |
---|---|
Main Authors | , , |
Format | Book Chapter |
Language | English |
Published |
Cham
Springer International Publishing
2015
|
Series | Lecture Notes in Computer Science |
Subjects | |
Online Access | Get full text |
ISBN | 331921005X 9783319210056 |
ISSN | 0302-9743 1611-3349 |
DOI | 10.1007/978-3-319-21006-3_38 |
Cover
Loading…
Abstract | In developing Cyber Physical Systems, such as smart grid and smart cities, risk management technologies play an important role to provide safe and secure services. In this paper, focusing on changes of recent threats represented by Social engineering, a survey shows that the information security psychology is valuable for the risk management of the Cyber Physical Systems. Through surveying, we outline the risk management framework for Cyber Physical Systems. |
---|---|
AbstractList | In developing Cyber Physical Systems, such as smart grid and smart cities, risk management technologies play an important role to provide safe and secure services. In this paper, focusing on changes of recent threats represented by Social engineering, a survey shows that the information security psychology is valuable for the risk management of the Cyber Physical Systems. Through surveying, we outline the risk management framework for Cyber Physical Systems. |
Author | Fukuzawa, Yasuko Ujita, Hiroshi Samejima, Masaki |
Author_xml | – sequence: 1 givenname: Yasuko surname: Fukuzawa fullname: Fukuzawa, Yasuko email: yasuko.fukuzawa.pd@hitachi.com – sequence: 2 givenname: Masaki surname: Samejima fullname: Samejima, Masaki – sequence: 3 givenname: Hiroshi surname: Ujita fullname: Ujita, Hiroshi |
BookMark | eNpFkFFLwzAUhaNOcJv7Bz70D0ST3DRNHt1wOpgoTsG3kKVprdsSaTqh_95sCj7dc8-Bw-EboYEP3iF0Rck1JaS4UYXEgIEqzNIvMGiQJ2gEyTka8hQNqaAUA3B19h_k7wM0JEAYVgWHCzSJ8ZMQQvNc5pwN0XS1b79dnwWfvTRxkz0ab2q3c77Lpia68hAsfBXanemapFfO7tum67Pn2NuPsA11f4nOK7ONbvJ3x-htfvc6e8DLp_vF7HaJawZpvZKsMoJTbnMDuSoqBrxkRiiXVhYlV6Wla2FpaQDWCggVQKwl0lgQXFQSxoj99savtvG1a_U6hE3UlOgDIp0Q6YSFKn0kctASfgC3JVXc |
ContentType | Book Chapter |
Copyright | Springer International Publishing Switzerland 2015 |
Copyright_xml | – notice: Springer International Publishing Switzerland 2015 |
DOI | 10.1007/978-3-319-21006-3_38 |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISBN | 3319210068 9783319210063 |
EISSN | 1611-3349 |
Editor | Kurosu, Masaaki |
Editor_xml | – sequence: 1 givenname: Masaaki surname: Kurosu fullname: Kurosu, Masaaki email: masaakikurosu@spa.nifty.com |
EndPage | 408 |
GroupedDBID | -DT -GH -~X 1SB 29L 2HA 2HV 5QI 875 AASHB ABMNI ACGFS ADCXD AEFIE ALMA_UNASSIGNED_HOLDINGS EJD F5P FEDTE HVGLF LAS LDH P2P RIG RNI RSU SVGTG VI1 ~02 |
ID | FETCH-LOGICAL-g2378-982fa6414c5a3597f234d2a69e0057d49dc1b6c1da33b9301630cc08ac3646f83 |
ISBN | 331921005X 9783319210056 |
ISSN | 0302-9743 |
IngestDate | Tue Jul 29 20:03:33 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-g2378-982fa6414c5a3597f234d2a69e0057d49dc1b6c1da33b9301630cc08ac3646f83 |
PageCount | 13 |
ParticipantIDs | springer_books_10_1007_978_3_319_21006_3_38 |
PublicationCentury | 2000 |
PublicationDate | 2015 |
PublicationDateYYYYMMDD | 2015-01-01 |
PublicationDate_xml | – year: 2015 text: 2015 |
PublicationDecade | 2010 |
PublicationPlace | Cham |
PublicationPlace_xml | – name: Cham |
PublicationSeriesSubtitle | Information Systems and Applications, incl. Internet/Web, and HCI |
PublicationSeriesTitle | Lecture Notes in Computer Science |
PublicationSeriesTitleAlternate | Lect.Notes Computer |
PublicationSubtitle | 17th International Conference, HCI International 2015, Los Angeles, CA, USA, August 2-7, 2015, Proceedings, Part III |
PublicationTitle | Human-Computer Interaction: Users and Contexts |
PublicationYear | 2015 |
Publisher | Springer International Publishing |
Publisher_xml | – name: Springer International Publishing |
RelatedPersons | Kleinberg, Jon M. Mattern, Friedemann Naor, Moni Mitchell, John C. Terzopoulos, Demetri Steffen, Bernhard Pandu Rangan, C. Kanade, Takeo Kittler, Josef Weikum, Gerhard Hutchison, David Tygar, Doug |
RelatedPersons_xml | – sequence: 1 givenname: David surname: Hutchison fullname: Hutchison, David – sequence: 2 givenname: Takeo surname: Kanade fullname: Kanade, Takeo – sequence: 3 givenname: Josef surname: Kittler fullname: Kittler, Josef – sequence: 4 givenname: Jon M. surname: Kleinberg fullname: Kleinberg, Jon M. – sequence: 5 givenname: Friedemann surname: Mattern fullname: Mattern, Friedemann – sequence: 6 givenname: John C. surname: Mitchell fullname: Mitchell, John C. – sequence: 7 givenname: Moni surname: Naor fullname: Naor, Moni – sequence: 8 givenname: C. surname: Pandu Rangan fullname: Pandu Rangan, C. – sequence: 9 givenname: Bernhard surname: Steffen fullname: Steffen, Bernhard – sequence: 10 givenname: Demetri surname: Terzopoulos fullname: Terzopoulos, Demetri – sequence: 11 givenname: Doug surname: Tygar fullname: Tygar, Doug – sequence: 12 givenname: Gerhard surname: Weikum fullname: Weikum, Gerhard |
SSID | ssj0001558542 ssj0002792 |
Score | 1.9819916 |
Snippet | In developing Cyber Physical Systems, such as smart grid and smart cities, risk management technologies play an important role to provide safe and secure... |
SourceID | springer |
SourceType | Publisher |
StartPage | 396 |
SubjectTerms | Cyber physical systems Information security psychology Risk management Security |
Title | Survey on Risk Management Based on Information Security Psychology |
URI | http://link.springer.com/10.1007/978-3-319-21006-3_38 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3BTtwwELWW7QX1QClFBQryobdV0CZ2jHPoASrQCgGHwiJ6ihzHaQNiV2ITivgEvrozsbMOCxe4RFEcJc48Zzwe-z0T8l0k0AtFYR5IrUyAXMlAiWERiAgQVwWKbiFR-PRMjMb8-Cq-6vWeOquW6irb1Y-v8kregypcA1yRJfsGZOcPhQtwDvjCERCG40Lw-zzNWs63lQjaXRlsas-yFHCUP0YWZTMz0OhPPVSe51Hf1I_qXxM0_laz-mY6z7KoW3Nd3irL4ZlBbNmWjK9LG2WOSuhV_5bdhnZe392DY4FW9AuXqfv1NIMD6CFzLHCcJ-ec7IZ53vVaZ4QGM7MfJ25O42xaNUvFBvMPdF6om6YI44U0RZumXEh0-lzbs3EtYyjThjKlHXfIwHfD6Me6Q2PdtUARRmZFT50LZono9Oa8UY142VF014YgjwvfJgKWMrlElvZk3Ccf9g-PTy59vi6GgRX30mQovGhnqGytkDfU1topO_mv6HA2X3vli1n4Jri5-EQ-IuGFIhMFjLZKembymay0dqfO7mvkwCJNpxOKSFOPNG2QxoIO0rRFmnqkv5Dx0eHFz1HgtuAI_kQMaprIqFCCh1zHisHYE35enkdKJAZZzDlPch1mQoe5YixLoLMQbKj1UCrNBBeFZOukP5lOzFdCC1TP0yoBpwGPy3K1l2dDbrTUTAuh5AYZtEZI8aeapa2iNpgsBTOFSdqYDM_l5pvu3iLLvk1-I_3qrjbbEExW2Y7D-T9LrGzC |
linkProvider | Library Specific Holdings |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Human-Computer+Interaction%3A+Users+and+Contexts&rft.au=Fukuzawa%2C+Yasuko&rft.au=Samejima%2C+Masaki&rft.au=Ujita%2C+Hiroshi&rft.atitle=Survey+on+Risk+Management+Based+on+Information+Security+Psychology&rft.series=Lecture+Notes+in+Computer+Science&rft.date=2015-01-01&rft.pub=Springer+International+Publishing&rft.isbn=9783319210056&rft.issn=0302-9743&rft.eissn=1611-3349&rft.spage=396&rft.epage=408&rft_id=info:doi/10.1007%2F978-3-319-21006-3_38 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0302-9743&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0302-9743&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0302-9743&client=summon |