IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications, 1st Edition

  • Published By:
  • ISBN-10: 1466629207
  • ISBN-13: 9781466629202
  • DDC: 658.4
  • Grade Level Range: College Freshman - College Senior
  • 2036 Pages | eBook
  • Original Copyright 2013 | Published/Released November 2013
  • This publication's content originally published in print form: 2013

  • Price:  Sign in for price



IT policies are set in place to streamline the preparation and development of information communication technologies in a particular setting.IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications is a comprehensive collection of research on the features of modern organizations in order to advance the understanding of IT standards. This is an essential reference source for researchers, scholars, policymakers, and IT managers as well as organizations interested in carrying out research in IT policies.

Table of Contents

Front Cover.
Title Page.
Copyright Page.
Other Frontmatter.
List of Contributors.
Table of Contents.
1: Fundamental Concepts and Theories.
2: Introduction to Continuous Authentication.
3: Password Sharing and how to Reduce it.
4: Convergence of Fixed and Mobile Networks.
5: Trust Management and User’s Trust Perception in e-Business.
6: Study and Non-Study Related Technologies Use of Flemish Students in Higher Education.
7: Stepwise E-Participation: Good Practice from the Regional Level in Europe.
8: Public Key Infrastructure.
9: Access Control in Federated Clouds: The Cloudgrid Case Study.
10: Learning, Unlearning, and Relearning: Using Web 2.0 Technologies to Support the Development of Lifelong Learning Skills.
11: The Evolution of KM Practices: The Case of the Renault-Nissan International Strategic Alliance.
12: Semantic Policies for Modeling Regulatory Process Compliance.
13: Near Field Authentication.
14: Continuous Authentication in Computers.
15: Grid Data Handling.
16: Mass Media Strategies: Hybrid Approach Using a Bioinspired Algorithm and Social Data Mining.
17: Tools and Technologies.
18: Reversible Information Hiding and Its Application to Image Authentication.
19: Applied Cryptography in Electronic Commerce.
20: Multimodal Biometric Hand-Off for Robust Unobtrusive Continuous Biometric Authentication.
21: Continuous User Authentication Based on Keystroke Dynamics through Neural Network Committee Machines.
22: Identity-Based Cryptography: Applications, Vulnerabilities, and Future Directions.
23: Denial of Service Resilience of Authentication Systems.
24: Applied Cryptography in Wireless Sensor Networks.
25: A Hybrid Port-Knocking Technique for Host Authentication.
26: mVITAL: A Standards Compliant Vital Sign Monitor.
27: IEEE802.21 Assisted Fast Re-Authentication Scheme over GSABA.
28: Elliptic Curve Cryptography on WISPs.
29: Point-of-Sale Technologies at Retail Stores: What Will the Future be Like?.
30: A Keystroke Biometric System for Long-Text Input.
1: Tools and Technologies.
2: An Electronic Contract Signing Protocol Using Fingerprint Biometrics.
3: Brain-Like System for Audiovisual Person Authentication Based on Time-to-First Spike Coding.
4: Frameworks and Methodologies.
5: Using a Social Learning Community to Actively Engage Students’ Participation in a Virtual Classroom.
6: MAC and PHY-Layer Network Coding for Applications in Wireless Communications Networks.
7: Key Management.
8: Creating Ongoing Online Support Communities through Social Networks to Promote Professional Learning.
9: Security Management in Heterogeneous Distributed Sensor Networks.
10: A Method of Analysing the Use of Social Networking Sites in Business.
11: Policy Management in Cloud: Challenges and Approaches.
12: Modeling Access Control in Healthcare Organizations.
13: An Access Control Model for Dynamic VR Applications.
14: Building a Cloud-Based Mobile Application Testbed.
15: Developing Proactive Security Dimensions for SOA.
16: National Interoperability Frameworks: The Way Forward.
17: Medium Access Control Protocols for Wireless Sensor Networks: Design Space, Challenges, and Future Directions.
18: Cases and Applications.
19: The Integration of Social Networking in Creating Collaborative Partnerships in Education.
20: Audio Visual System for Large Scale People Authentication and Recognition over Internet Protocol (IP).
21: Music is the Key: Using our Enduring Memory for Songs to Help Users Log On.
22: Investigating the Performance of the TSS Scheme in Noisy MANETs.
23: Secure Exchange of Electronic Health Records.
24: RBAC with Generic Rights, Delegation, Revocation, and Constraints.
25: E-Simulations for Educating the Professions in Blended Learning Environments.
26: Crowdfunding to Improve Environmental Projects’ Logistics.
27: Youth and Online Social Networking: From Local Experiences to Public Discourses.
28: Online Political Participation in the 2008 U.S. Presidential Election: Examining the Democratic Divide.
29: The Role of Social Networking in Civilizational Development: Towards Better Communication and Reasoning in the Global Virtual Nation and Virtual Nation.
30: Technological Approaches to Maintaining Academic Integrity in Management Education.
31: Improving the Effectiveness of Advertising in Internet Social Networking.
1: Issues and Challenges.
2: Security Policy Issues in Internet Banking in Malaysia.
3: Caught in the Web: The Internet and the Demise of Medical Privacy.
4: Gender Differences in Social Networking Presence Effects on Web-Based Impression Formation.
5: Sociocognitive Inquiry.
6: End-Users’ Acceptance of Biometrics Authentication to Secure E-Commerce within the Context of Saudi Culture: Applying the UTAUT Model.
7: Certification and Security Issues in Biomedical Grid Portals: The GRISSOM Case Study.
8: Web Services Composition Problem: Model and Complexity.
9: Policy and Issues in Deploying Automated Plagiarism Detection Systems in Academic Communities: A Case Study of VeriGuide.
10: The Paradox of the Interactive Web in the U.S. Public Sector.
11: A Game Theoretical Approach to Design: A MAC Protocol for Wireless Sensor Networks.
12: Cognitive Cooperation in Wireless Networks.
13: Security and Trust in a Global Research Infrastructure.
14: Social Networking and Identity.
15: Digital Convergence and Horizontal Integration Strategies.
16: Emerging Trends.
17: Stepping Over the Edge: The Implications of New Technologies for Education.
18: Web 2.0 for eParticipation: Transformational Tweeting or Devaluation of Democracy?.
19: Privacy–Aware Organisation–Based Access Control Model (PrivOrBAC).
20: Internet Security Using Biometrics.
21: A Social Relational Network–Based Architecture for Maintaining the Media Integrity and Optimizing the Quality of Experience: A Technical and Business Perspective.
22: Towards Continuous Authentication Based on Gait Using Wearable Motion Recording Sensors.
23: Using a Design Research Approach to Investigate the Knowledge–Building Implications of Online Social Networking and Other Web 2.0 Technologies in Higher Education Contexts.
24: Energy–Efficient MAC Protocols in Distributed Sensor Networks.
25: RSU Deployment for Content Dissemination and Downloading in Intelligent Transportation Systems.
26: Cloud Environment Controls Assessment Framework.
27: Applying Continuous Authentication to Protect Electronic Transactions.
28: Securing the External Interfaces of a Federated Infrastructure Cloud.