Handbook of Research on Emerging Developments in Data Privacy, 1st Edition

  • Manish Gupta
  • Published By:
  • ISBN-10: 1466673826
  • ISBN-13: 9781466673823
  • DDC: 005.8
  • Grade Level Range: College Freshman - College Senior
  • 507 Pages | eBook
  • Original Copyright 2015 | Published/Released January 2016
  • This publication's content originally published in print form: 2015

  • Price:  Sign in for price

About

Overview

Data collection allows today's businesses to cater to each customer's individual needs and provides a necessary edge in a competitive market. However, any breach in confidentiality can cause serious consequences for both the consumer and the company. THE HANDBOOK OF RESEARCH ON EMERGING DEVELOPMENTS IN DATA PRIVACY brings together new ideas on how to deal with potential leaks of valuable customer information. Highlighting the legal aspects of identity protection, trust and security, and detection techniques, this comprehensive work is a valuable resource for any business, legal, or technology professional looking to improve information security within their organization.

Table of Contents

Front Cover.
Title Page.
Copyright Page.
Advances in Information Security, Privacy, and Ethics (Aispe) Book Series.
Titles in This Series.
List of Contributors.
Table of Contents.
Detailed Table of Contents.
Preface.
Legal Aspects.
1: Cloud State Surveillance: Dark Octopus Tentacle Clouds from the Atlantic.
2: Data Protection in EU Law after Lisbon: Challenges, Developments, and Limitations.
3: File-Sharing of Copyrighted Works, P2P, and the Cloud: Reconciling Copyright and Privacy Rights.
4: Dataveillance in the Workplace: Privacy Threat or Market Imperative?.
5: Social Engineering Techniques, Password Selection, and Health Care Legislation: A Health Care Setting.
Identity Protection.
6: Play That Funky Password! Recent Advances in Authentication with Music.
7: Privacy, Security, and Identity Theft Protection: Advances and Trends.
8: Identity Management Systems: Models, Standards, and COTS Offerings.
9: How Private Is Your Financial Data? Survey of Authentication Methods in Web and Mobile Banking.
Trust and Security.
10: Security and Privacy Requirements Engineering.
11: An Information Security Model for Implementing the New ISO 27001.
12: Health IT:A Framework for Managing Privacy Impact Assessment of Personally Identifiable Data.
13: Do We Need Security Management Systems for Data Privacy?.
14: Trust and Trust Building of Virtual Communities in the Networked Age.
15: The Security, Privacy, and Ethical Implications of Social Networking Sites.
Detection Techniques.
16: Guidance for Selecting Data Collection Mechanisms for Intrusion Detection.
17: An Auto-Reclosing-Based Intrusion Detection Technique for Enterprise Networks.
18: A Dynamic Subspace Anomaly Detection Method Using Generic Algorithm for Streaming Network Data.
19: Detecting Botnet Traffic from a Single Host.
Compilation of References.
About the Contributors.
Index.