Application of Artificial Intelligence in User Interfaces Design for Cyber Security Threat Modeling / / written by Jide Ebenezer Taiwo Akinsola [and six others].

In recent years, Cyber Security threat modeling has been discovered to have the capacity of combatting and mitigating against online threats. In order to minimize the associated risk, these threats need to be modelled with appropriate Intelligent User Interface (IUI) design and consequently the deve...

Full description

Saved in:
Bibliographic Details
VerfasserIn:
Place / Publishing House:London : : IntechOpen,, 2021.
Year of Publication:2021
Language:English
Physical Description:1 online resource (194 pages)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993581466604498
ctrlnum (CKB)4920000002071596
(NjHacI)994920000002071596
(EXLCZ)994920000002071596
collection bib_alma
record_format marc
spelling Taiwo Akinsola, Jide Ebenezer, author.
Application of Artificial Intelligence in User Interfaces Design for Cyber Security Threat Modeling / written by Jide Ebenezer Taiwo Akinsola [and six others].
Surfactants and Detergents
London : IntechOpen, 2021.
1 online resource (194 pages)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Description based on: online resource; title from PDF information screen (IntechOpen, viewed March 23, 2023).
In recent years, Cyber Security threat modeling has been discovered to have the capacity of combatting and mitigating against online threats. In order to minimize the associated risk, these threats need to be modelled with appropriate Intelligent User Interface (IUI) design and consequently the development and evaluation of threat metrics. Artificial Intelligence (AI) has revolutionized every facet of our daily lives and building a responsive Cyber Security Threat Model requires an IUI. The current threat models lack IUI, hence they cannot deliver convenience and efficiency. However, as the User Interface (UI) functionalities and User Experience (UX) continue to increase and deliver more astonishing possibilities, the present threat models lack the predictability capacity thus Machine Learning paradigms must be incorporated. Meanwhile, this deficiency can only be handled through AI-enabled UI that utilizes baseline principles in the design of interfaces for effective Human-Machine Interaction (HMI) with lasting UX. IUI helps developers or designers enhance flexibility, usability, and the relevance of the interaction to improving communication between computer and human. Baseline principles must be applied for developing threat models that will ensure fascinating UI-UX. Application of AI in UI design for Cyber Security Threat Modeling brings about reduction in critical design time and ensures the development of better threat modeling applications and solutions.
1. Introduction -- 1.1 Cyber security threat modeling -- 2. Human machine interfaces -- 2.1 User Interface -- 2.2 User experience -- 3. Artificial intelligence in user Interface design -- 3.1 Empirical studies on intelligent user interfaces -- 3.2 Challenges in IUI -- 3.3 Comparative analysis of intelligent user interfaces -- 3.4 IUI design methods -- 3.5 AI versus UI design -- 3.6 IUI design model -- 3.7 AI-based UI and UX prototyping tools -- 4. Cyber security threat models -- 4.1 Cyber security threat modeling process -- 4.1.1 Threat analysis -- 4.1.2 Identification of asset -- 4.1.3 Mitigation capacity -- 4.1.4 Evaluation of vulnerability -- 4.1.5 Mapping of threats -- 4.2 Predictive analytics of threat models -- 4.3 Baseline principles for intelligent user interfaces design -- 4.4 Application of AI in UI design for cyber security threat modeling -- 5. Conclusion -- References.
Artificial intelligence.
1-83962-896-0
language English
format eBook
author Taiwo Akinsola, Jide Ebenezer,
spellingShingle Taiwo Akinsola, Jide Ebenezer,
Application of Artificial Intelligence in User Interfaces Design for Cyber Security Threat Modeling /
1. Introduction -- 1.1 Cyber security threat modeling -- 2. Human machine interfaces -- 2.1 User Interface -- 2.2 User experience -- 3. Artificial intelligence in user Interface design -- 3.1 Empirical studies on intelligent user interfaces -- 3.2 Challenges in IUI -- 3.3 Comparative analysis of intelligent user interfaces -- 3.4 IUI design methods -- 3.5 AI versus UI design -- 3.6 IUI design model -- 3.7 AI-based UI and UX prototyping tools -- 4. Cyber security threat models -- 4.1 Cyber security threat modeling process -- 4.1.1 Threat analysis -- 4.1.2 Identification of asset -- 4.1.3 Mitigation capacity -- 4.1.4 Evaluation of vulnerability -- 4.1.5 Mapping of threats -- 4.2 Predictive analytics of threat models -- 4.3 Baseline principles for intelligent user interfaces design -- 4.4 Application of AI in UI design for cyber security threat modeling -- 5. Conclusion -- References.
author_facet Taiwo Akinsola, Jide Ebenezer,
author_variant a j e t aje ajet
author_role VerfasserIn
author_sort Taiwo Akinsola, Jide Ebenezer,
title Application of Artificial Intelligence in User Interfaces Design for Cyber Security Threat Modeling /
title_full Application of Artificial Intelligence in User Interfaces Design for Cyber Security Threat Modeling / written by Jide Ebenezer Taiwo Akinsola [and six others].
title_fullStr Application of Artificial Intelligence in User Interfaces Design for Cyber Security Threat Modeling / written by Jide Ebenezer Taiwo Akinsola [and six others].
title_full_unstemmed Application of Artificial Intelligence in User Interfaces Design for Cyber Security Threat Modeling / written by Jide Ebenezer Taiwo Akinsola [and six others].
title_auth Application of Artificial Intelligence in User Interfaces Design for Cyber Security Threat Modeling /
title_alt Surfactants and Detergents
title_new Application of Artificial Intelligence in User Interfaces Design for Cyber Security Threat Modeling /
title_sort application of artificial intelligence in user interfaces design for cyber security threat modeling /
publisher IntechOpen,
publishDate 2021
physical 1 online resource (194 pages)
contents 1. Introduction -- 1.1 Cyber security threat modeling -- 2. Human machine interfaces -- 2.1 User Interface -- 2.2 User experience -- 3. Artificial intelligence in user Interface design -- 3.1 Empirical studies on intelligent user interfaces -- 3.2 Challenges in IUI -- 3.3 Comparative analysis of intelligent user interfaces -- 3.4 IUI design methods -- 3.5 AI versus UI design -- 3.6 IUI design model -- 3.7 AI-based UI and UX prototyping tools -- 4. Cyber security threat models -- 4.1 Cyber security threat modeling process -- 4.1.1 Threat analysis -- 4.1.2 Identification of asset -- 4.1.3 Mitigation capacity -- 4.1.4 Evaluation of vulnerability -- 4.1.5 Mapping of threats -- 4.2 Predictive analytics of threat models -- 4.3 Baseline principles for intelligent user interfaces design -- 4.4 Application of AI in UI design for cyber security threat modeling -- 5. Conclusion -- References.
isbn 1-83962-897-9
1-83962-896-0
callnumber-first Q - Science
callnumber-subject Q - General Science
callnumber-label Q335
callnumber-sort Q 3335 T359 42021
illustrated Not Illustrated
dewey-hundreds 000 - Computer science, information & general works
dewey-tens 000 - Computer science, knowledge & systems
dewey-ones 006 - Special computer methods
dewey-full 006.3
dewey-sort 16.3
dewey-raw 006.3
dewey-search 006.3
work_keys_str_mv AT taiwoakinsolajideebenezer applicationofartificialintelligenceinuserinterfacesdesignforcybersecuritythreatmodeling
AT taiwoakinsolajideebenezer surfactantsanddetergents
status_str n
ids_txt_mv (CKB)4920000002071596
(NjHacI)994920000002071596
(EXLCZ)994920000002071596
carrierType_str_mv cr
is_hierarchy_title Application of Artificial Intelligence in User Interfaces Design for Cyber Security Threat Modeling /
_version_ 1764995727264579584
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03484nam a2200313 i 4500</leader><controlfield tag="001">993581466604498</controlfield><controlfield tag="005">20230323221636.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |||||||||||</controlfield><controlfield tag="008">230323s2021 enk o 000 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1-83962-897-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)4920000002071596</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(NjHacI)994920000002071596</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)994920000002071596</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">NjHacI</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">NjHacl</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">Q335</subfield><subfield code="b">.T359 2021</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">006.3</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Taiwo Akinsola, Jide Ebenezer,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Application of Artificial Intelligence in User Interfaces Design for Cyber Security Threat Modeling /</subfield><subfield code="c">written by Jide Ebenezer Taiwo Akinsola [and six others].</subfield></datafield><datafield tag="246" ind1=" " ind2=" "><subfield code="a">Surfactants and Detergents </subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London :</subfield><subfield code="b">IntechOpen,</subfield><subfield code="c">2021.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (194 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on: online resource; title from PDF information screen (IntechOpen, viewed March 23, 2023).</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">In recent years, Cyber Security threat modeling has been discovered to have the capacity of combatting and mitigating against online threats. In order to minimize the associated risk, these threats need to be modelled with appropriate Intelligent User Interface (IUI) design and consequently the development and evaluation of threat metrics. Artificial Intelligence (AI) has revolutionized every facet of our daily lives and building a responsive Cyber Security Threat Model requires an IUI. The current threat models lack IUI, hence they cannot deliver convenience and efficiency. However, as the User Interface (UI) functionalities and User Experience (UX) continue to increase and deliver more astonishing possibilities, the present threat models lack the predictability capacity thus Machine Learning paradigms must be incorporated. Meanwhile, this deficiency can only be handled through AI-enabled UI that utilizes baseline principles in the design of interfaces for effective Human-Machine Interaction (HMI) with lasting UX. IUI helps developers or designers enhance flexibility, usability, and the relevance of the interaction to improving communication between computer and human. Baseline principles must be applied for developing threat models that will ensure fascinating UI-UX. Application of AI in UI design for Cyber Security Threat Modeling brings about reduction in critical design time and ensures the development of better threat modeling applications and solutions.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">1. Introduction -- 1.1 Cyber security threat modeling -- 2. Human machine interfaces -- 2.1 User Interface -- 2.2 User experience -- 3. Artificial intelligence in user Interface design -- 3.1 Empirical studies on intelligent user interfaces -- 3.2 Challenges in IUI -- 3.3 Comparative analysis of intelligent user interfaces -- 3.4 IUI design methods -- 3.5 AI versus UI design -- 3.6 IUI design model -- 3.7 AI-based UI and UX prototyping tools -- 4. Cyber security threat models -- 4.1 Cyber security threat modeling process -- 4.1.1 Threat analysis -- 4.1.2 Identification of asset -- 4.1.3 Mitigation capacity -- 4.1.4 Evaluation of vulnerability -- 4.1.5 Mapping of threats -- 4.2 Predictive analytics of threat models -- 4.3 Baseline principles for intelligent user interfaces design -- 4.4 Application of AI in UI design for cyber security threat modeling -- 5. Conclusion -- References.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Artificial intelligence.</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">1-83962-896-0</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-04-15 13:21:25 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2022-11-12 21:32:05 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5343028070004498&amp;Force_direct=true</subfield><subfield code="Z">5343028070004498</subfield><subfield code="8">5343028070004498</subfield></datafield></record></collection>