Information Security and Ethics: Concepts, Methodologies, Tools and Applications, 1st Edition

  • Published By:
  • ISBN-10: 1599049384
  • ISBN-13: 9781599049380
  • Grade Level Range: College Freshman - College Senior
  • 4037 Pages | eBook
  • Original Copyright 2007 | Published/Released May 2008
  • This publication's content originally published in print form: 2007

  • Price:  Sign in for price



Information Security and Ethics: Concepts, Methodologies, Tools, and Applications serves as the ultimate source on all theories and models associated with information privacy and safeguard practices to help anchor and guide the development of technologies, standards, and best practices to meet these challenges. Compiling over 250 chapters representing the work of 484 international experts in these fields, this commanding, six-volume collection examines a complete array of topics in this area, including authentication technologies, cyber-crime, cryptographic tools, monitoring systems, forensic computing, and confidentiality applications and their relation to raising the level of security and ethical standards in technology-driven environments. Essential to the information technology collection of any library, Information Security and Ethics: Concepts, Methodologies, Tools, and Applications will serve the needs of researchers in a variety of related fields, including business, e-commerce, government, law enforcement, and many more.

Key Features:

  • Authoritative contributions from 484 international experts in information security and ethics
  • Comprehensive coverage of each specific topic, highlighting recent trends and describing the latest advances
  • Cross referencing of key terms, figures and information pertinent to information security
  • In-depth analysis of issues, concepts, new trends, and advanced technologies
  • More than 6,500 references to existing literature and research on security and ethics
  • Organized by topic and indexed, making it a convenient method of reference for all IT/IS scholars and professionals
  • Over 250 chapters covering the most incisive and critical research issues in the security and ethics field

Table of Contents

Front Cover.
Title Page.
Copyright Page.
Editorial Board.
List of Contributors.
Contents by Volume.
Introductory Chapter: Information Security and Ethics.
About the Editor.
1: Fundamental Concepts and Theories.
2: E-Government and Denial of Service Attacks.
3: Policy Frameworks for Secure Electronic Business.
4: Audio Watermarking: Properties, Techniques, and Evaluation.
5: Software Piracy: Possible Causes and Cures.
6: Administering the Semantic Web: Confidentiality, Privacy, and Trust Management.
7: Human and Social Perspectives in Information Technology: An Examination of Fraud on the Internet.
8: Codes of Ethics in Virtual Communities.
9: Digital Audio Watermarking.
10: Secure Authentication Process for High Sensitive Data E-Services: A Roadmap.
11: Evolution of Information-Hiding Technology.
12: Description of Policies Enriched by Semantics for Security Management.
13: Privacy and Security in E-Learning.
14: Ethical Challenges for Information Systems Professionals.
15: Integrating Security and Software Engineering: An Introduction.
16: Ethics of Data Mining.
17: Privacy-Dangers and Protections.
18: Ethics of New Technologies.
19: Ethics and HCI.
20: The Central Problem in Cyber Ethics and How Stories Can Be Used to Address It.
21: Digital Watermarking: An Introduction.
22: Signals of Trustworthiness in E-Commerce: Consumer Understanding of Third-Party Assurance Seals.
23: Moral Foundations of Data Mining.
24: Privacy and Security in E-Learning.
25: Telework Information Security.
26: Conducting Ethical Research Online: Respect for Individuals, Identities, and the Ownership of Words.
27: A Unified Information Security Management Plan.
28: Information Security Management.
29: The Challenge of Privacy and Security and the Implementation of Health Knowledge Management Systems.
30: Would Be Pirates: Webcasters, Intellectual Property, and Ethics.
31: Check-Off Password System (COPS): An Advancement in User Authentication Methods and Information Security.
32: The Game of Defense and Security.
33: Data Hiding in Document Images.
34: Ethics of Digital Government.
35: Digital Morality and Ethics.
36: Net Diplomacy.
37: Ethical Issues in Information Technology.
38: Protecting One's Privacy: Insight into the Views and Nature of the Early Adopters of Privacy Services.
39: The Desire for Privacy: Insights into the Views and Nature of the Early Adopters of Privacy Services.
40: Security in Service-Oriented Architecture: Issues, Standards, and Implementations.
41: Leadership Style, Anonymity, and the Discussion of an Ethical Issue in an Electronic Context.
42: An Overview of Electronic Attacks.
43: An Introduction in Digital Watermarking: Applications, Principles, and Problems.
44: Digital Rights Management for E-Content and E-Technologies.
45: E-Health Security and Privacy.
46: Privacy and Confidentiality Issues in Data Mining.
47: Development and Design Methodologies.
48: Evaluation of Computer Adaptive Testing Systems.
49: A Comparison of Authentication, Authorization, and Auditing in Windows and Linux.
50: Privacy-Preserving Data Mining: Development and Directions.