Neuroscience perspectives on Security: Technology, Detection, and Decision Making
In security science, efficient operation depends typically on the interaction between technology, human and machine detection and human and machine decision making. A perfect example of this interplay is ‘gatekeeping’, which is aimed to prevent the passage of people and objects that represent known...
- Autores:
- Tipo de recurso:
- Book
- Fecha de publicación:
- 2015
- Institución:
- Universidad de Bogotá Jorge Tadeo Lozano
- Repositorio:
- Expeditio: repositorio UTadeo
- Idioma:
- eng
- OAI Identifier:
- oai:expeditiorepositorio.utadeo.edu.co:20.500.12010/15050
- Acceso en línea:
- https://www.frontiersin.org/research-topics/1255/neuroscience-perspectives-on-security-technology-detection-and-decision-making
http://hdl.handle.net/20.500.12010/15050
- Palabra clave:
- Neurología
Psicología aplicada
Neurociencia aplicada
- Rights
- License
- Abierto (Texto Completo)
id |
UTADEO2_f792ab1e2adbbbf29b881e71c26f7691 |
---|---|
oai_identifier_str |
oai:expeditiorepositorio.utadeo.edu.co:20.500.12010/15050 |
network_acronym_str |
UTADEO2 |
network_name_str |
Expeditio: repositorio UTadeo |
repository_id_str |
|
dc.title.spa.fl_str_mv |
Neuroscience perspectives on Security: Technology, Detection, and Decision Making |
title |
Neuroscience perspectives on Security: Technology, Detection, and Decision Making |
spellingShingle |
Neuroscience perspectives on Security: Technology, Detection, and Decision Making Neurología Psicología aplicada Neurociencia aplicada |
title_short |
Neuroscience perspectives on Security: Technology, Detection, and Decision Making |
title_full |
Neuroscience perspectives on Security: Technology, Detection, and Decision Making |
title_fullStr |
Neuroscience perspectives on Security: Technology, Detection, and Decision Making |
title_full_unstemmed |
Neuroscience perspectives on Security: Technology, Detection, and Decision Making |
title_sort |
Neuroscience perspectives on Security: Technology, Detection, and Decision Making |
dc.subject.spa.fl_str_mv |
Neurología |
topic |
Neurología Psicología aplicada Neurociencia aplicada |
dc.subject.lemb.spa.fl_str_mv |
Psicología aplicada Neurociencia aplicada |
description |
In security science, efficient operation depends typically on the interaction between technology, human and machine detection and human and machine decision making. A perfect example of this interplay is ‘gatekeeping’, which is aimed to prevent the passage of people and objects that represent known threats from one end to the other end of an access point. Gatekeeping is most often achieved via visual inspections, mass screening, random sample probing and/or more targeted controls on attempted passages at points of entry. Points of entry may be physical (e.g. national borders) or virtual (e.g. connection log-ons). Who and what are defined as security threats and the resources available to gatekeepers determine the type of checks and technologies that are put in place to ensure appropriate access control. More often than not, the net performance of technology-aided screening and authentication systems ultimately depends on the characteristics of human operators. Assessing cognitive, affective, behavioural, perceptual and brain processes that may affect gatekeepers while undertaking this task is fundamental. On the other hand, assessing the same processes in those individuals who try to breach access to secure systems (e.g. hackers), and try to cheat controls (e.g. smugglers) is equally fundamental and challenging. From a security standpoint it is vital to be able to anticipate, focus on and correctly interpret the signals connected with such attempts to breach access and/or elude controls, in order to be proactive and to enact appropriate responses. Knowing cognitive, behavioral, social and neural constraints that may affect the security enterprise will undoubtedly result in a more effective deployment of existing human and technological resources. Studying how inter-observer variability, human factors and biology may affect the security agenda, and the usability of existing security technologies, is of great economic and policy interest. In addition, brain sciences may suggest the possibility of novel methods of surveillance and intelligence gathering. This is just one example of a typical security issue that may be fruitfully tackled from a neuroscientific and interdisciplinary perspective. The objective of our Research Topic was to document across relevant disciplines some of the most recent developments, ideas, methods and empirical findings that have the potential to expand our knowledge of the human factors involved in the security process. To this end we welcomed empirical contributions using different methodologies such as those applied in human cognitive neuroscience, biometrics and ethology. We also accepted original theoretical contributions, in the form of review articles, perspectives or opinion papers on this topic. The submissions brought together researchers from different backgrounds to discuss topics which have scientific, applicative and social relevance. |
publishDate |
2015 |
dc.date.created.none.fl_str_mv |
2015 |
dc.date.accessioned.none.fl_str_mv |
2020-10-28T22:47:22Z |
dc.date.available.none.fl_str_mv |
2020-10-28T22:47:22Z |
dc.type.local.spa.fl_str_mv |
Libro |
dc.type.coar.spa.fl_str_mv |
http://purl.org/coar/resource_type/c_2f33 |
format |
http://purl.org/coar/resource_type/c_2f33 |
dc.identifier.isbn.none.fl_str_mv |
978-2-889-19600-5 |
dc.identifier.issn.none.fl_str_mv |
1664-8714 |
dc.identifier.other.none.fl_str_mv |
https://www.frontiersin.org/research-topics/1255/neuroscience-perspectives-on-security-technology-detection-and-decision-making |
dc.identifier.uri.none.fl_str_mv |
http://hdl.handle.net/20.500.12010/15050 |
dc.identifier.doi.none.fl_str_mv |
10.3389/978-2-88919-600-5 |
identifier_str_mv |
978-2-889-19600-5 1664-8714 10.3389/978-2-88919-600-5 |
url |
https://www.frontiersin.org/research-topics/1255/neuroscience-perspectives-on-security-technology-detection-and-decision-making http://hdl.handle.net/20.500.12010/15050 |
dc.language.iso.spa.fl_str_mv |
eng |
language |
eng |
dc.relation.references.spa.fl_str_mv |
Rusconi, E., Scott-Brown, K. C., Szymkowiak, A., eds. (2015). Neuroscience Perspectives on Security: Technology, Detection, and Decision Making. Lausanne: Frontiers Media. doi: 10.3389/978-2-88919-600-5 |
dc.rights.coar.fl_str_mv |
http://purl.org/coar/access_right/c_abf2 |
dc.rights.local.spa.fl_str_mv |
Abierto (Texto Completo) |
rights_invalid_str_mv |
Abierto (Texto Completo) http://purl.org/coar/access_right/c_abf2 |
dc.format.extent.spa.fl_str_mv |
110 páginas |
dc.format.mimetype.spa.fl_str_mv |
application/pdf |
dc.publisher.spa.fl_str_mv |
Frontiers Media SA |
institution |
Universidad de Bogotá Jorge Tadeo Lozano |
bitstream.url.fl_str_mv |
https://expeditiorepositorio.utadeo.edu.co/bitstream/20.500.12010/15050/1/Neuroscience%20Perspectives%20on%20Security%20-%20Technology%2c%20Detection%2c%20and%20Decision%20Making_101.PDF https://expeditiorepositorio.utadeo.edu.co/bitstream/20.500.12010/15050/2/license.txt https://expeditiorepositorio.utadeo.edu.co/bitstream/20.500.12010/15050/3/Neuroscience%20Perspectives%20on%20Security%20-%20Technology%2c%20Detection%2c%20and%20Decision%20Making_101.PDF.jpg |
bitstream.checksum.fl_str_mv |
fc595152ce2aa9db809e6854d4e9e7bb abceeb1c943c50d3343516f9dbfc110f 9bb87015b10c2914dc6515667e504a89 |
bitstream.checksumAlgorithm.fl_str_mv |
MD5 MD5 MD5 |
repository.name.fl_str_mv |
Repositorio Institucional - Universidad Jorge Tadeo Lozano |
repository.mail.fl_str_mv |
expeditio@utadeo.edu.co |
_version_ |
1814213809150099456 |
spelling |
2020-10-28T22:47:22Z2020-10-28T22:47:22Z2015978-2-889-19600-51664-8714https://www.frontiersin.org/research-topics/1255/neuroscience-perspectives-on-security-technology-detection-and-decision-makinghttp://hdl.handle.net/20.500.12010/1505010.3389/978-2-88919-600-5110 páginasapplication/pdfengFrontiers Media SANeurologíaPsicología aplicadaNeurociencia aplicadaNeuroscience perspectives on Security: Technology, Detection, and Decision MakingLibrohttp://purl.org/coar/resource_type/c_2f33Abierto (Texto Completo)http://purl.org/coar/access_right/c_abf2Rusconi, E., Scott-Brown, K. C., Szymkowiak, A., eds. (2015). Neuroscience Perspectives on Security: Technology, Detection, and Decision Making. Lausanne: Frontiers Media. doi: 10.3389/978-2-88919-600-5In security science, efficient operation depends typically on the interaction between technology, human and machine detection and human and machine decision making. A perfect example of this interplay is ‘gatekeeping’, which is aimed to prevent the passage of people and objects that represent known threats from one end to the other end of an access point. Gatekeeping is most often achieved via visual inspections, mass screening, random sample probing and/or more targeted controls on attempted passages at points of entry. Points of entry may be physical (e.g. national borders) or virtual (e.g. connection log-ons). Who and what are defined as security threats and the resources available to gatekeepers determine the type of checks and technologies that are put in place to ensure appropriate access control. More often than not, the net performance of technology-aided screening and authentication systems ultimately depends on the characteristics of human operators. Assessing cognitive, affective, behavioural, perceptual and brain processes that may affect gatekeepers while undertaking this task is fundamental. On the other hand, assessing the same processes in those individuals who try to breach access to secure systems (e.g. hackers), and try to cheat controls (e.g. smugglers) is equally fundamental and challenging. From a security standpoint it is vital to be able to anticipate, focus on and correctly interpret the signals connected with such attempts to breach access and/or elude controls, in order to be proactive and to enact appropriate responses. Knowing cognitive, behavioral, social and neural constraints that may affect the security enterprise will undoubtedly result in a more effective deployment of existing human and technological resources. Studying how inter-observer variability, human factors and biology may affect the security agenda, and the usability of existing security technologies, is of great economic and policy interest. In addition, brain sciences may suggest the possibility of novel methods of surveillance and intelligence gathering. This is just one example of a typical security issue that may be fruitfully tackled from a neuroscientific and interdisciplinary perspective. The objective of our Research Topic was to document across relevant disciplines some of the most recent developments, ideas, methods and empirical findings that have the potential to expand our knowledge of the human factors involved in the security process. To this end we welcomed empirical contributions using different methodologies such as those applied in human cognitive neuroscience, biometrics and ethology. We also accepted original theoretical contributions, in the form of review articles, perspectives or opinion papers on this topic. The submissions brought together researchers from different backgrounds to discuss topics which have scientific, applicative and social relevance.Rusconi, ElenaScott Brown, Kenneth CSzymkowiak, AndreaORIGINALNeuroscience Perspectives on Security - Technology, Detection, and Decision Making_101.PDFNeuroscience Perspectives on Security - Technology, Detection, and Decision Making_101.PDFVer documentoapplication/pdf54319791https://expeditiorepositorio.utadeo.edu.co/bitstream/20.500.12010/15050/1/Neuroscience%20Perspectives%20on%20Security%20-%20Technology%2c%20Detection%2c%20and%20Decision%20Making_101.PDFfc595152ce2aa9db809e6854d4e9e7bbMD51open accessLICENSElicense.txtlicense.txttext/plain; charset=utf-82938https://expeditiorepositorio.utadeo.edu.co/bitstream/20.500.12010/15050/2/license.txtabceeb1c943c50d3343516f9dbfc110fMD52open accessTHUMBNAILNeuroscience Perspectives on Security - Technology, Detection, and Decision Making_101.PDF.jpgNeuroscience Perspectives on Security - Technology, Detection, and Decision Making_101.PDF.jpgIM Thumbnailimage/jpeg36699https://expeditiorepositorio.utadeo.edu.co/bitstream/20.500.12010/15050/3/Neuroscience%20Perspectives%20on%20Security%20-%20Technology%2c%20Detection%2c%20and%20Decision%20Making_101.PDF.jpg9bb87015b10c2914dc6515667e504a89MD53open access20.500.12010/15050oai:expeditiorepositorio.utadeo.edu.co:20.500.12010/150502020-11-11 22:52:18.856open accessRepositorio Institucional - Universidad Jorge Tadeo Lozanoexpeditio@utadeo.edu.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 |