Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues, 1st Edition

  • Published By:
  • ISBN-10: 1605662119
  • ISBN-13: 9781605662114
  • Grade Level Range: College Freshman - College Senior
  • 378 Pages | eBook
  • Original Copyright 2009 | Published/Released August 2009
  • This publication's content originally published in print form: 2009

  • Price:  Sign in for price

About

Overview

Provides a thorough understanding of issues and concerns in information technology security; covers topics such as security management, privacy preservation, authentication and provides a basic understanding of the issues in privacy concerns for researchers and practitioners.

Table of Contents

Front Cover.
Title Page.
Copyright Page.
Advances in Information Security and Privacy (AISP) Series.
Dedication.
Associate Editors.
Table of Contents.
Detailed Table of Contents.
Foreword.
Preface.
1: Information Security and Privacy: Threats and Solutions.
2: A Rule-Based and Game-Theoretic Approach to On-Line Credit Card Fraud Detection.
3: Email Worm Detection Using Data Mining.
4: Information Systems Security: Cases of Network Administrator Threats.
5: Rootkits and What We Know: Assessing U.S. and Korean Knowledge and Perceptions.
6: Privacy Preservation and Techniques.
7: Privacy-Preserving Data Mining and the Need for Confluence of Research and Practice.
8: A Dimensionality Reduction-Based Transformation to Support Business Collaboration.
9: Privacy-Preserving Transactions Protocol Using Mobile Agents with Mutual Authentication.
10: Dynamic Control Mechanisms for User Privacy Enhancement.
11: A Projection of the Future Effects of Quantum Computation on Information Privacy.
12: Authentication Techniques.
13: On the Design of an Authentication System Based on Keystroke Dynamics Using a Predefined Input Text.
14: Defeating Active Phishing Attacks for Web-Based Transactions.
15: A Content-Based Watermarking Scheme for Image Authentication Using Discrete Wavelet Transform Inter-Coefficient Relations.
16: Security and Privacy Management.
17: Privacy and Security in the Age of Electronic Customer Relationship Management.
18: The Impact of Privacy Risk Harm (RH) and Risk Likelihood (RL) on IT Acceptance: An Examination of a Student Information System.
19: Ignorance is Bliss: The Effect of Increased Knowledge on Privacy Concerns and Internet Shopping Site Personalization Preferences.
20: Web Security and Privacy Issues and Technologies.
21: Trustworthy Web Services: An Experience-Based Model for Trustworthiness Evaluation.
22: Administering the Semantic Web: Confidentiality, Privacy and Trust Management.
23: An Ontology of Information Security.
24: Evaluating Information Security and Privacy: Where are We Going from Here?.
25: Information Security Effectiveness: Conceptualization and Validation of a Theory.
26: A Simulation Model of IS Security.
Compilation of References.
About the Contributors.
Index.