Survey on Risk Management Based on Information Security Psychology

In developing Cyber Physical Systems, such as smart grid and smart cities, risk management technologies play an important role to provide safe and secure services. In this paper, focusing on changes of recent threats represented by Social engineering, a survey shows that the information security psy...

Full description

Saved in:
Bibliographic Details
Published inHuman-Computer Interaction: Users and Contexts pp. 396 - 408
Main Authors Fukuzawa, Yasuko, Samejima, Masaki, Ujita, Hiroshi
Format Book Chapter
LanguageEnglish
Published Cham Springer International Publishing 2015
SeriesLecture Notes in Computer Science
Subjects
Online AccessGet full text
ISBN331921005X
9783319210056
ISSN0302-9743
1611-3349
DOI10.1007/978-3-319-21006-3_38

Cover

Loading…
Abstract In developing Cyber Physical Systems, such as smart grid and smart cities, risk management technologies play an important role to provide safe and secure services. In this paper, focusing on changes of recent threats represented by Social engineering, a survey shows that the information security psychology is valuable for the risk management of the Cyber Physical Systems. Through surveying, we outline the risk management framework for Cyber Physical Systems.
AbstractList In developing Cyber Physical Systems, such as smart grid and smart cities, risk management technologies play an important role to provide safe and secure services. In this paper, focusing on changes of recent threats represented by Social engineering, a survey shows that the information security psychology is valuable for the risk management of the Cyber Physical Systems. Through surveying, we outline the risk management framework for Cyber Physical Systems.
Author Fukuzawa, Yasuko
Ujita, Hiroshi
Samejima, Masaki
Author_xml – sequence: 1
  givenname: Yasuko
  surname: Fukuzawa
  fullname: Fukuzawa, Yasuko
  email: yasuko.fukuzawa.pd@hitachi.com
– sequence: 2
  givenname: Masaki
  surname: Samejima
  fullname: Samejima, Masaki
– sequence: 3
  givenname: Hiroshi
  surname: Ujita
  fullname: Ujita, Hiroshi
BookMark eNpFkFFLwzAUhaNOcJv7Bz70D0ST3DRNHt1wOpgoTsG3kKVprdsSaTqh_95sCj7dc8-Bw-EboYEP3iF0Rck1JaS4UYXEgIEqzNIvMGiQJ2gEyTka8hQNqaAUA3B19h_k7wM0JEAYVgWHCzSJ8ZMQQvNc5pwN0XS1b79dnwWfvTRxkz0ab2q3c77Lpia68hAsfBXanemapFfO7tum67Pn2NuPsA11f4nOK7ONbvJ3x-htfvc6e8DLp_vF7HaJawZpvZKsMoJTbnMDuSoqBrxkRiiXVhYlV6Wla2FpaQDWCggVQKwl0lgQXFQSxoj99savtvG1a_U6hE3UlOgDIp0Q6YSFKn0kctASfgC3JVXc
ContentType Book Chapter
Copyright Springer International Publishing Switzerland 2015
Copyright_xml – notice: Springer International Publishing Switzerland 2015
DOI 10.1007/978-3-319-21006-3_38
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 3319210068
9783319210063
EISSN 1611-3349
Editor Kurosu, Masaaki
Editor_xml – sequence: 1
  givenname: Masaaki
  surname: Kurosu
  fullname: Kurosu, Masaaki
  email: masaakikurosu@spa.nifty.com
EndPage 408
GroupedDBID -DT
-GH
-~X
1SB
29L
2HA
2HV
5QI
875
AASHB
ABMNI
ACGFS
ADCXD
AEFIE
ALMA_UNASSIGNED_HOLDINGS
EJD
F5P
FEDTE
HVGLF
LAS
LDH
P2P
RIG
RNI
RSU
SVGTG
VI1
~02
ID FETCH-LOGICAL-g2378-982fa6414c5a3597f234d2a69e0057d49dc1b6c1da33b9301630cc08ac3646f83
ISBN 331921005X
9783319210056
ISSN 0302-9743
IngestDate Tue Jul 29 20:03:33 EDT 2025
IsPeerReviewed true
IsScholarly true
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-g2378-982fa6414c5a3597f234d2a69e0057d49dc1b6c1da33b9301630cc08ac3646f83
PageCount 13
ParticipantIDs springer_books_10_1007_978_3_319_21006_3_38
PublicationCentury 2000
PublicationDate 2015
PublicationDateYYYYMMDD 2015-01-01
PublicationDate_xml – year: 2015
  text: 2015
PublicationDecade 2010
PublicationPlace Cham
PublicationPlace_xml – name: Cham
PublicationSeriesSubtitle Information Systems and Applications, incl. Internet/Web, and HCI
PublicationSeriesTitle Lecture Notes in Computer Science
PublicationSeriesTitleAlternate Lect.Notes Computer
PublicationSubtitle 17th International Conference, HCI International 2015, Los Angeles, CA, USA, August 2-7, 2015, Proceedings, Part III
PublicationTitle Human-Computer Interaction: Users and Contexts
PublicationYear 2015
Publisher Springer International Publishing
Publisher_xml – name: Springer International Publishing
RelatedPersons Kleinberg, Jon M.
Mattern, Friedemann
Naor, Moni
Mitchell, John C.
Terzopoulos, Demetri
Steffen, Bernhard
Pandu Rangan, C.
Kanade, Takeo
Kittler, Josef
Weikum, Gerhard
Hutchison, David
Tygar, Doug
RelatedPersons_xml – sequence: 1
  givenname: David
  surname: Hutchison
  fullname: Hutchison, David
– sequence: 2
  givenname: Takeo
  surname: Kanade
  fullname: Kanade, Takeo
– sequence: 3
  givenname: Josef
  surname: Kittler
  fullname: Kittler, Josef
– sequence: 4
  givenname: Jon M.
  surname: Kleinberg
  fullname: Kleinberg, Jon M.
– sequence: 5
  givenname: Friedemann
  surname: Mattern
  fullname: Mattern, Friedemann
– sequence: 6
  givenname: John C.
  surname: Mitchell
  fullname: Mitchell, John C.
– sequence: 7
  givenname: Moni
  surname: Naor
  fullname: Naor, Moni
– sequence: 8
  givenname: C.
  surname: Pandu Rangan
  fullname: Pandu Rangan, C.
– sequence: 9
  givenname: Bernhard
  surname: Steffen
  fullname: Steffen, Bernhard
– sequence: 10
  givenname: Demetri
  surname: Terzopoulos
  fullname: Terzopoulos, Demetri
– sequence: 11
  givenname: Doug
  surname: Tygar
  fullname: Tygar, Doug
– sequence: 12
  givenname: Gerhard
  surname: Weikum
  fullname: Weikum, Gerhard
SSID ssj0001558542
ssj0002792
Score 1.9819916
Snippet In developing Cyber Physical Systems, such as smart grid and smart cities, risk management technologies play an important role to provide safe and secure...
SourceID springer
SourceType Publisher
StartPage 396
SubjectTerms Cyber physical systems
Information security psychology
Risk management
Security
Title Survey on Risk Management Based on Information Security Psychology
URI http://link.springer.com/10.1007/978-3-319-21006-3_38
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3BTtwwELWW7QX1QClFBQryobdV0CZ2jHPoASrQCgGHwiJ6ihzHaQNiV2ITivgEvrozsbMOCxe4RFEcJc48Zzwe-z0T8l0k0AtFYR5IrUyAXMlAiWERiAgQVwWKbiFR-PRMjMb8-Cq-6vWeOquW6irb1Y-v8kregypcA1yRJfsGZOcPhQtwDvjCERCG40Lw-zzNWs63lQjaXRlsas-yFHCUP0YWZTMz0OhPPVSe51Hf1I_qXxM0_laz-mY6z7KoW3Nd3irL4ZlBbNmWjK9LG2WOSuhV_5bdhnZe392DY4FW9AuXqfv1NIMD6CFzLHCcJ-ec7IZ53vVaZ4QGM7MfJ25O42xaNUvFBvMPdF6om6YI44U0RZumXEh0-lzbs3EtYyjThjKlHXfIwHfD6Me6Q2PdtUARRmZFT50LZono9Oa8UY142VF014YgjwvfJgKWMrlElvZk3Ccf9g-PTy59vi6GgRX30mQovGhnqGytkDfU1topO_mv6HA2X3vli1n4Jri5-EQ-IuGFIhMFjLZKembymay0dqfO7mvkwCJNpxOKSFOPNG2QxoIO0rRFmnqkv5Dx0eHFz1HgtuAI_kQMaprIqFCCh1zHisHYE35enkdKJAZZzDlPch1mQoe5YixLoLMQbKj1UCrNBBeFZOukP5lOzFdCC1TP0yoBpwGPy3K1l2dDbrTUTAuh5AYZtEZI8aeapa2iNpgsBTOFSdqYDM_l5pvu3iLLvk1-I_3qrjbbEExW2Y7D-T9LrGzC
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Human-Computer+Interaction%3A+Users+and+Contexts&rft.au=Fukuzawa%2C+Yasuko&rft.au=Samejima%2C+Masaki&rft.au=Ujita%2C+Hiroshi&rft.atitle=Survey+on+Risk+Management+Based+on+Information+Security+Psychology&rft.series=Lecture+Notes+in+Computer+Science&rft.date=2015-01-01&rft.pub=Springer+International+Publishing&rft.isbn=9783319210056&rft.issn=0302-9743&rft.eissn=1611-3349&rft.spage=396&rft.epage=408&rft_id=info:doi/10.1007%2F978-3-319-21006-3_38
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0302-9743&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0302-9743&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0302-9743&client=summon