Sep 4, 2019 | Book, Research library
One of the significant challenges in the realm of cyber attack detection is the scarcity of training data, which remains a formidable obstacle. Despite the utilization of established network monitoring tools like Wireshark, a vast number of individuals are still at...
May 31, 2017 | Book, Research library
A Research Agenda publication aiming to stimulate research on the human factor in cyber crime and cyber security. This book offers examples of unanswered research questions and methods and datasets that could be used for future studies.
Sep 5, 2014 | Book, Research library
83 theories of behaviour change that could be used to design behaviour change interventions are discussed in detail.
May 2, 2013 | Book, Research library
In chapter 7 of this book, Jonathan Haidt draws on economic and social psychological research to show how demonstrations of violations of care, fairness, loyalty, authority and sanctity can be used in different ways to promote both right wing and left wing politcal...
Jan 9, 2012 | Book, Research library
In this book, Charles Duhigg draws on psychological and neurological research to introduce the concept of habit loops. According to the book, habits are formed when a cue that leads to a behaviour leads to a reward. Changing habits requires amending habit loops....
Feb 16, 2010 | Book, Research library
According to this book’s authors, we need only understand how our minds work to unlock shortcuts that can lead to long term behavour change. This book explores how our minds work and some shortcuts that might be of use when seeking to change human behaviour....