Cyber Crime: Concepts, Methodologies, Tools And Applications, 1st Edition

  • Published By:
  • ISBN-10: 1613503245
  • ISBN-13: 9781613503249
  • DDC: 364.16
  • Grade Level Range: College Freshman - College Senior
  • 1886 Pages | eBook
  • Original Copyright 2012 | Published/Released February 2012
  • This publication's content originally published in print form: 2012

  • Price:  Sign in for price



This is a three-volume reference that explores all aspects of computer-based crime and threats, offering solutions and best practices from experts in software development, information security, and law.

Table of Contents

Front Cover.
Title Page.
Copyright Page.
Editorial Board.
List of Contributors.
Table of Contents.
1: Fundamental Concepts and Theories.
2: Internet Crime: How Vulnerable Are You? Do Gender, Social Influence and Education Play a Role in Vulnerability?.
3: Introduction to Basic Concepts and Considerations of Wireless Networking Security.
4: Cyber Identity Theft.
5: Identity Theft through the Web.
6: How Safe Is Your Identity? Security Threats, Data Mining, and Digital Fingerprints/Footprints.
7: Antecedents of Online Privacy Protection Behavior: Towards an Integrative Model.
8: Protection of Privacy on the Web.
9: Online Privacy, Vulnerabilities, and Threats: A Manager's Perspective.
10: Intrusion in the Sphere of Personal Communications.
11: Data Mining and Privacy.
12: Data Mining and Privacy Protection.
13: Deciphering the Hacker Underground: First Quantitative Insights.
14: Globalization and Data Privacy: An Exploratory Study.
15: Development and Design Methodologies.
16: A Simulation Model of IS Security.
17: Security, Trust, and Privacy on Mobile Devices and Multimedia Applications.
18: A Multistage Framework to Defend Against Phishing Attacks.
19: A Framework for Privacy Assurance and Ubiquitous Knowledge Discovery in Health 2.0 Data Mashups.
20: A Policy–Based Security Framework for Privacy–Enhancing Data Access and Usage Control in Grids.
21: Surveillance in Public Spaces as a Means of Protecting Security: Questions of Legitimacy and Policy.
22: An SOA-Based Architecture to Share Medical Data with Privacy Preservation.
23: A Partial Optimization Approach for Privacy Preserving Frequent Itemset Mining.
24: A Methodology for UICC–Based Security Services in Pervasive Fixed Mobile Convergence Systems.
25: An Analysis of Privacy and Security in the Zachman and Federal Enterprise Architecture Frameworks.
26: A Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments.
27: Distributed Privacy Preserving Clustering via Homomorphic Secret Sharing and Its Application to (Vertically) Partitioned Spatio–Temporal Data.
28: Tools and Technologies.
29: Current Network Security Technology.
30: Data Breach Disclosure: A Policy Analysis.
31: Computer Hacking and the Techniques of Neutralization: An Empirical Assessment.
32: Biometric Security in the E–World.
33: Biometric Controls and Privacy.
34: Dynamic Control Mechanisms for User Privacy Enhancement.
35: Privacy Regulation in the Metaverse.
36: Efficient and Reliable Pseudonymous Authentication.
37: Image Watermarking.
38: Memorizing Algorithm: Protecting User Privacy Using Historical Information of Location–Based Services.
1: Tools and Technologies.
2: Detecting Shill Bidding in Online English Auctions.
3: Essential Mobile–Commerce Technology.
4: Cryptographic Approaches for Privacy Preservation in Location–Based Services: A Survey.
5: Do Privacy Statements Really Work? The Effect of Privacy Statements and Fair Information Practices on Trust and Perceived Risk in E-Commerce.
6: Utilization and Application.
7: A Comparison of CyberCrime Definitions in India and the United States.
8: Cross Cultural Perceptions on Privacy in the United States, Vietnam, Indonesia, and Taiwan.
9: Cyber Victimization of Women and Cyber Laws in India.
10: Cyber Crime Against Women and Regulations in Australia.
11: Cyber Laws for Preventing Cyber Crimes Against Women in Canada.
12: Legal Treatment of Cyber Crimes Against Women in USA.
13: Telecommunications Interception in Turkey: Rights to Privacy vs. Discourses of Security.
14: Online Privacy Protection in Japan: The Current Status and Practices.
15: Cross-Border Transfer of Personal Data: The Example of Romanian Legislation.
16: Digital Child Pornography: Offender or Not Offender.
17: Health Care Information Systems and the Risk of Privacy Issues for the Disabled.
18: Safeguarding the Privacy of Electronic Medical Records.
19: Electronic Surveillance, Privacy and Enforcement of Intellectual Property Rights: A Digital Panopticon?.
20: Secure Electronic Voting with Cryptography.
21: U.S. Federal Data Mining Programs in the Context of the War on Terror: The Congress, Court, and Concerns for Privacy Protection.
22: A Performance Study of Secure Data Mining on the Cell Processor.
23: Cryptographic and Steganographic Approaches to Ensure Multimedia Information Security and Privacy.
24: Organizational and Social Implications.
25: ICT Security Policy: Challenges and Potential Remedies.
26: Definition, Typology and Patterns of Victimization.
27: Human Factors in Information Security and Privacy.
28: Ensuring Users' Rights to Privacy, Confidence and Reputation in the Online Learning Environment: What Should Instructors Do to Protect Their Students' Privacy?.
29: Female and Male Hacker Conferences Attendees: Their Autism-Spectrum Quotient (AQ) Scores and Self-Reported Adulthood Experiences.
30: Social/Ethical Issues in Predictive Insider Threat Monitoring.
31: The Human Attack in Linguistic Steganography.
32: How Much Is Too Much? How Marketing Professionals Can Avoid Violating Privacy Laws by Understanding the Privacy Principles.
33: Audience Intelligence in Online Advertising.
34: Effects of Individual Trust in Broadcast Media and the Internet on Privacy–Risking Uses of E–Health: An Expanded Analysis.
35: Do You Know Where Your Data Is? A Study of the Effect of Enforcement Strategies on Privacy Policies.
36: Publicly Available Computers: An Investigation of Transactional Website Use through Computers in Public Locations1.
1: Managerial Impact.
2: Managing IS Security and Privacy.
3: Six Keys to Improving Wireless Security.
4: A Game Theoretic Approach for Sensitive Information Sharing in Supply Chain.
5: An Analysis of Online Privacy Policies of Fortune 100 Companies.
6: Building and Management of Trust in Networked Information Systems.
7: Regulation of Cybercafés in Nigeria.
8: E–Government, Security, and Cyber–Privacy: Individual Rights vs. Government Responsibility.
9: Responsibilities and Liabilities with Respect to Catastrophes.
10: A Global Perspective of Laws and Regulations Dealing with Information Security and Privacy.
11: A Case for Consumer Virtual Property.
12: A Model–Based Privacy Compliance Checker1.
13: Preventative Actions for Enhancing Online Protection and Privacy.
14: Critical Issues.
15: The Sense of Security and Trust.
16: Examining an Individual's Perceived Need for Privacy and Security: Construct and Scale Development.
17: The Personalization Privacy Paradox: Mobile Customers' Perceptions of Push-Based vs. Pull-Based Location Commerce.
18: Balancing the Public Policy Drivers in the Tension between Privacy and Security.
19: A Profile of the Demographics, Psychological Predispositions, and Social/Behavioral Patterns of Computer Hacker Insiders and Outsiders.
20: Etiology, Motives, and Crime Hubs.
21: The General Theory of Crime and Computer Hacking: Low Self–Control Hackers?.
22: Between Hackers and White–Collar Offenders.
23: What about the Balance between Law Enforcement and Data Protection?.
24: A Taxonomic View of Consumer Online Privacy Legal Issues, Legislation, and Litigation.
25: Which Rights for Which Subjects? Genetic Confidentiality and Privacy in the Post-Genomic Era.
26: Provable Security for Outsourcing Database Operations.
27: Minimising Collateral Damage: Privacy–Preserving Investigative Data Acquisition Platform.
28: Emerging Trends.
29: Future Trends in Digital Security.
30: Advances in Security and Privacy in Wireless Sensor Networks.
31: Advances in Privacy Preserving Record Linkage.
32: Emerging Security Issues in VANETs for E–Business.
33: Cyber Security and Privacy in the Age of Social Networks.
34: Current Measures to Protect E–Consumers' Privacy in Australia.
35: Genetic Testing and Protection of Genetic Privacy: A Comparative Legal Analysis in Europe and Australia.
36: Cryptography–Based Authentication for Protecting Cyber Systems.
37: Aspect-Oriented Programming and Aspect.NET as Security and Privacy Tool for Web and 3D Web Programming.