Handbook of Research on Social and Organizational Liabilities in Information Security, 1st Edition

  • Manish Gupta
  • Published By:
  • ISBN-10: 1605661333
  • ISBN-13: 9781605661339
  • DDC: 658.478
  • Grade Level Range: College Freshman - College Senior
  • 300 Pages | eBook
  • Original Copyright 2009 | Published/Released February 2009
  • This publication's content originally published in print form: 2009

  • Price:  Sign in for price



Explores numerous issues of managing social and human aspects of information security. Covers issues such as employee surveillance, information security policies, and password authentication.

Table of Contents

Cover Page.
Title Page.
Copyright Page.
Editorial Advisory Board.
List of Contributors.
Table of Contents.
Detailed Table of Contents.
1: Section I Organizational Security.
2: Responsibilities and Liabilities with Respect to Catastrophes.
3: The Complex New World of Information Security.
4: Employee Surveillance Based on Free Text Detection of Keystroke Dynamics.
5: E-Risk Insurance Product Design: A Copula Based Bayesian Belief Network Model.
6: E-Commerce Security and Honesty-Credit.
7: Towards a Scalable Role and Organization Based Access Control Model with Decentralized Security Administration.
8: Enterprise Information System Security: A Life-Cycle Approach.
9: An Alternative Model of Information Security Investment.
10: Section II Privacy and Social Engineering.
11: Avoiding Pitfalls in Policy-Based Privacy Management1.
12: Privacy and Banking in Australia.
13: A Multistage Framework to Defend Against Phishing Attacks.
14: A New Approach to Reducing Social Engineering Impact.
15: Privacy-Enhancing Technologies.
16: Social Engineering and its Countermeasures.
17: Social Networking Site: Opportunities and Security Challenges.
18: Section III Security Education and Awareness.
19: Designing Antiphishing Education.
20: Theories Used in Information Security Research: Survey and Agenda.
21: Information Assurance and Security Curriculum Meeting the SIGITE Guidelines.
22: Information Security Awareness.
23: Creating a Security Education, Training, and Awareness Program.
24: Information Security Within an E-Learning Environment.
25: Research Notes on Emerging Areas of Conflict in Security.
26: Section IV Human and Interaction Issues.
27: The Human Attack in Linguistic Steganography.
28: Using Technology to Overcome the Password's Contradiction.
29: Formal Analysis of Security in Interactive Systems.
30: Internet Crime: How Vulnerable Are You? Do Gender, Social Influence and Education play a Role in Vulnerability?.
31: Detecting Shill Bidding in Online English Auctions.
32: Information Security at Large Public Displays.
33: The Sense of Security and Trust.
Compilation of References.
About the Contributors.