Application of Artificial Intelligence in User Interfaces Design for Cyber Security Threat Modeling / / written by Jide Ebenezer Taiwo Akinsola [and six others].
In recent years, Cyber Security threat modeling has been discovered to have the capacity of combatting and mitigating against online threats. In order to minimize the associated risk, these threats need to be modelled with appropriate Intelligent User Interface (IUI) design and consequently the deve...
Saved in:
VerfasserIn: | |
---|---|
Place / Publishing House: | London : : IntechOpen,, 2021. |
Year of Publication: | 2021 |
Language: | English |
Physical Description: | 1 online resource (194 pages) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
993581466604498 |
---|---|
ctrlnum |
(CKB)4920000002071596 (NjHacI)994920000002071596 (EXLCZ)994920000002071596 |
collection |
bib_alma |
record_format |
marc |
spelling |
Taiwo Akinsola, Jide Ebenezer, author. Application of Artificial Intelligence in User Interfaces Design for Cyber Security Threat Modeling / written by Jide Ebenezer Taiwo Akinsola [and six others]. Surfactants and Detergents London : IntechOpen, 2021. 1 online resource (194 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier Description based on: online resource; title from PDF information screen (IntechOpen, viewed March 23, 2023). In recent years, Cyber Security threat modeling has been discovered to have the capacity of combatting and mitigating against online threats. In order to minimize the associated risk, these threats need to be modelled with appropriate Intelligent User Interface (IUI) design and consequently the development and evaluation of threat metrics. Artificial Intelligence (AI) has revolutionized every facet of our daily lives and building a responsive Cyber Security Threat Model requires an IUI. The current threat models lack IUI, hence they cannot deliver convenience and efficiency. However, as the User Interface (UI) functionalities and User Experience (UX) continue to increase and deliver more astonishing possibilities, the present threat models lack the predictability capacity thus Machine Learning paradigms must be incorporated. Meanwhile, this deficiency can only be handled through AI-enabled UI that utilizes baseline principles in the design of interfaces for effective Human-Machine Interaction (HMI) with lasting UX. IUI helps developers or designers enhance flexibility, usability, and the relevance of the interaction to improving communication between computer and human. Baseline principles must be applied for developing threat models that will ensure fascinating UI-UX. Application of AI in UI design for Cyber Security Threat Modeling brings about reduction in critical design time and ensures the development of better threat modeling applications and solutions. 1. Introduction -- 1.1 Cyber security threat modeling -- 2. Human machine interfaces -- 2.1 User Interface -- 2.2 User experience -- 3. Artificial intelligence in user Interface design -- 3.1 Empirical studies on intelligent user interfaces -- 3.2 Challenges in IUI -- 3.3 Comparative analysis of intelligent user interfaces -- 3.4 IUI design methods -- 3.5 AI versus UI design -- 3.6 IUI design model -- 3.7 AI-based UI and UX prototyping tools -- 4. Cyber security threat models -- 4.1 Cyber security threat modeling process -- 4.1.1 Threat analysis -- 4.1.2 Identification of asset -- 4.1.3 Mitigation capacity -- 4.1.4 Evaluation of vulnerability -- 4.1.5 Mapping of threats -- 4.2 Predictive analytics of threat models -- 4.3 Baseline principles for intelligent user interfaces design -- 4.4 Application of AI in UI design for cyber security threat modeling -- 5. Conclusion -- References. Artificial intelligence. 1-83962-896-0 |
language |
English |
format |
eBook |
author |
Taiwo Akinsola, Jide Ebenezer, |
spellingShingle |
Taiwo Akinsola, Jide Ebenezer, Application of Artificial Intelligence in User Interfaces Design for Cyber Security Threat Modeling / 1. Introduction -- 1.1 Cyber security threat modeling -- 2. Human machine interfaces -- 2.1 User Interface -- 2.2 User experience -- 3. Artificial intelligence in user Interface design -- 3.1 Empirical studies on intelligent user interfaces -- 3.2 Challenges in IUI -- 3.3 Comparative analysis of intelligent user interfaces -- 3.4 IUI design methods -- 3.5 AI versus UI design -- 3.6 IUI design model -- 3.7 AI-based UI and UX prototyping tools -- 4. Cyber security threat models -- 4.1 Cyber security threat modeling process -- 4.1.1 Threat analysis -- 4.1.2 Identification of asset -- 4.1.3 Mitigation capacity -- 4.1.4 Evaluation of vulnerability -- 4.1.5 Mapping of threats -- 4.2 Predictive analytics of threat models -- 4.3 Baseline principles for intelligent user interfaces design -- 4.4 Application of AI in UI design for cyber security threat modeling -- 5. Conclusion -- References. |
author_facet |
Taiwo Akinsola, Jide Ebenezer, |
author_variant |
a j e t aje ajet |
author_role |
VerfasserIn |
author_sort |
Taiwo Akinsola, Jide Ebenezer, |
title |
Application of Artificial Intelligence in User Interfaces Design for Cyber Security Threat Modeling / |
title_full |
Application of Artificial Intelligence in User Interfaces Design for Cyber Security Threat Modeling / written by Jide Ebenezer Taiwo Akinsola [and six others]. |
title_fullStr |
Application of Artificial Intelligence in User Interfaces Design for Cyber Security Threat Modeling / written by Jide Ebenezer Taiwo Akinsola [and six others]. |
title_full_unstemmed |
Application of Artificial Intelligence in User Interfaces Design for Cyber Security Threat Modeling / written by Jide Ebenezer Taiwo Akinsola [and six others]. |
title_auth |
Application of Artificial Intelligence in User Interfaces Design for Cyber Security Threat Modeling / |
title_alt |
Surfactants and Detergents |
title_new |
Application of Artificial Intelligence in User Interfaces Design for Cyber Security Threat Modeling / |
title_sort |
application of artificial intelligence in user interfaces design for cyber security threat modeling / |
publisher |
IntechOpen, |
publishDate |
2021 |
physical |
1 online resource (194 pages) |
contents |
1. Introduction -- 1.1 Cyber security threat modeling -- 2. Human machine interfaces -- 2.1 User Interface -- 2.2 User experience -- 3. Artificial intelligence in user Interface design -- 3.1 Empirical studies on intelligent user interfaces -- 3.2 Challenges in IUI -- 3.3 Comparative analysis of intelligent user interfaces -- 3.4 IUI design methods -- 3.5 AI versus UI design -- 3.6 IUI design model -- 3.7 AI-based UI and UX prototyping tools -- 4. Cyber security threat models -- 4.1 Cyber security threat modeling process -- 4.1.1 Threat analysis -- 4.1.2 Identification of asset -- 4.1.3 Mitigation capacity -- 4.1.4 Evaluation of vulnerability -- 4.1.5 Mapping of threats -- 4.2 Predictive analytics of threat models -- 4.3 Baseline principles for intelligent user interfaces design -- 4.4 Application of AI in UI design for cyber security threat modeling -- 5. Conclusion -- References. |
isbn |
1-83962-897-9 1-83962-896-0 |
callnumber-first |
Q - Science |
callnumber-subject |
Q - General Science |
callnumber-label |
Q335 |
callnumber-sort |
Q 3335 T359 42021 |
illustrated |
Not Illustrated |
dewey-hundreds |
000 - Computer science, information & general works |
dewey-tens |
000 - Computer science, knowledge & systems |
dewey-ones |
006 - Special computer methods |
dewey-full |
006.3 |
dewey-sort |
16.3 |
dewey-raw |
006.3 |
dewey-search |
006.3 |
work_keys_str_mv |
AT taiwoakinsolajideebenezer applicationofartificialintelligenceinuserinterfacesdesignforcybersecuritythreatmodeling AT taiwoakinsolajideebenezer surfactantsanddetergents |
status_str |
n |
ids_txt_mv |
(CKB)4920000002071596 (NjHacI)994920000002071596 (EXLCZ)994920000002071596 |
carrierType_str_mv |
cr |
is_hierarchy_title |
Application of Artificial Intelligence in User Interfaces Design for Cyber Security Threat Modeling / |
_version_ |
1764995727264579584 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03484nam a2200313 i 4500</leader><controlfield tag="001">993581466604498</controlfield><controlfield tag="005">20230323221636.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |||||||||||</controlfield><controlfield tag="008">230323s2021 enk o 000 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1-83962-897-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)4920000002071596</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(NjHacI)994920000002071596</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)994920000002071596</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">NjHacI</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">NjHacl</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">Q335</subfield><subfield code="b">.T359 2021</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">006.3</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Taiwo Akinsola, Jide Ebenezer,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Application of Artificial Intelligence in User Interfaces Design for Cyber Security Threat Modeling /</subfield><subfield code="c">written by Jide Ebenezer Taiwo Akinsola [and six others].</subfield></datafield><datafield tag="246" ind1=" " ind2=" "><subfield code="a">Surfactants and Detergents </subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London :</subfield><subfield code="b">IntechOpen,</subfield><subfield code="c">2021.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (194 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on: online resource; title from PDF information screen (IntechOpen, viewed March 23, 2023).</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">In recent years, Cyber Security threat modeling has been discovered to have the capacity of combatting and mitigating against online threats. In order to minimize the associated risk, these threats need to be modelled with appropriate Intelligent User Interface (IUI) design and consequently the development and evaluation of threat metrics. Artificial Intelligence (AI) has revolutionized every facet of our daily lives and building a responsive Cyber Security Threat Model requires an IUI. The current threat models lack IUI, hence they cannot deliver convenience and efficiency. However, as the User Interface (UI) functionalities and User Experience (UX) continue to increase and deliver more astonishing possibilities, the present threat models lack the predictability capacity thus Machine Learning paradigms must be incorporated. Meanwhile, this deficiency can only be handled through AI-enabled UI that utilizes baseline principles in the design of interfaces for effective Human-Machine Interaction (HMI) with lasting UX. IUI helps developers or designers enhance flexibility, usability, and the relevance of the interaction to improving communication between computer and human. Baseline principles must be applied for developing threat models that will ensure fascinating UI-UX. Application of AI in UI design for Cyber Security Threat Modeling brings about reduction in critical design time and ensures the development of better threat modeling applications and solutions.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">1. Introduction -- 1.1 Cyber security threat modeling -- 2. Human machine interfaces -- 2.1 User Interface -- 2.2 User experience -- 3. Artificial intelligence in user Interface design -- 3.1 Empirical studies on intelligent user interfaces -- 3.2 Challenges in IUI -- 3.3 Comparative analysis of intelligent user interfaces -- 3.4 IUI design methods -- 3.5 AI versus UI design -- 3.6 IUI design model -- 3.7 AI-based UI and UX prototyping tools -- 4. Cyber security threat models -- 4.1 Cyber security threat modeling process -- 4.1.1 Threat analysis -- 4.1.2 Identification of asset -- 4.1.3 Mitigation capacity -- 4.1.4 Evaluation of vulnerability -- 4.1.5 Mapping of threats -- 4.2 Predictive analytics of threat models -- 4.3 Baseline principles for intelligent user interfaces design -- 4.4 Application of AI in UI design for cyber security threat modeling -- 5. Conclusion -- References.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Artificial intelligence.</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">1-83962-896-0</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-04-15 13:21:25 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2022-11-12 21:32:05 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5343028070004498&Force_direct=true</subfield><subfield code="Z">5343028070004498</subfield><subfield code="8">5343028070004498</subfield></datafield></record></collection> |