Front Cover.
Title Page.
Copyright Page.
Editorial Board.
List of Contributors.
Table of Contents.
Preface.
1: Fundamental Concepts and Theories.
2: Internet Crime: How Vulnerable Are You? Do Gender, Social Influence and Education Play a Role in Vulnerability?.
3: Introduction to Basic Concepts and Considerations of Wireless Networking Security.
4: Cyber Identity Theft.
5: Identity Theft through the Web.
6: How Safe Is Your Identity? Security Threats, Data Mining, and Digital Fingerprints/Footprints.
7: Antecedents of Online Privacy Protection Behavior: Towards an Integrative Model.
8: Protection of Privacy on the Web.
9: Online Privacy, Vulnerabilities, and Threats: A Manager's Perspective.
10: Intrusion in the Sphere of Personal Communications.
11: Data Mining and Privacy.
12: Data Mining and Privacy Protection.
13: Deciphering the Hacker Underground: First Quantitative Insights.
14: Globalization and Data Privacy: An Exploratory Study.
15: Development and Design Methodologies.
16: A Simulation Model of IS Security.
17: Security, Trust, and Privacy on Mobile Devices and Multimedia Applications.
18: A Multistage Framework to Defend Against Phishing Attacks.
19: A Framework for Privacy Assurance and Ubiquitous Knowledge Discovery in Health 2.0 Data Mashups.
20: A Policy–Based Security Framework for Privacy–Enhancing Data Access and Usage Control in Grids.
21: Surveillance in Public Spaces as a Means of Protecting Security: Questions of Legitimacy and Policy.
22: An SOA-Based Architecture to Share Medical Data with Privacy Preservation.
23: A Partial Optimization Approach for Privacy Preserving Frequent Itemset Mining.
24: A Methodology for UICC–Based Security Services in Pervasive Fixed Mobile Convergence Systems.
25: An Analysis of Privacy and Security in the Zachman and Federal Enterprise Architecture Frameworks.
26: A Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments.
27: Distributed Privacy Preserving Clustering via Homomorphic Secret Sharing and Its Application to (Vertically) Partitioned Spatio–Temporal Data.
28: Tools and Technologies.
29: Current Network Security Technology.
30: Data Breach Disclosure: A Policy Analysis.
31: Computer Hacking and the Techniques of Neutralization: An Empirical Assessment.
32: Biometric Security in the E–World.
33: Biometric Controls and Privacy.
34: Dynamic Control Mechanisms for User Privacy Enhancement.
35: Privacy Regulation in the Metaverse.
36: Efficient and Reliable Pseudonymous Authentication.
37: Image Watermarking.
38: Memorizing Algorithm: Protecting User Privacy Using Historical Information of Location–Based Services.
1: Tools and Technologies.
2: Detecting Shill Bidding in Online English Auctions.
3: Essential Mobile–Commerce Technology.
4: Cryptographic Approaches for Privacy Preservation in Location–Based Services: A Survey.
5: Do Privacy Statements Really Work? The Effect of Privacy Statements and Fair Information Practices on Trust and Perceived Risk in E-Commerce.
6: Utilization and Application.
7: A Comparison of CyberCrime Definitions in India and the United States.
8: Cross Cultural Perceptions on Privacy in the United States, Vietnam, Indonesia, and Taiwan.
9: Cyber Victimization of Women and Cyber Laws in India.
10: Cyber Crime Against Women and Regulations in Australia.
11: Cyber Laws for Preventing Cyber Crimes Against Women in Canada.
12: Legal Treatment of Cyber Crimes Against Women in USA.
13: Telecommunications Interception in Turkey: Rights to Privacy vs. Discourses of Security.
14: Online Privacy Protection in Japan: The Current Status and Practices.
15: Cross-Border Transfer of Personal Data: The Example of Romanian Legislation.
16: Digital Child Pornography: Offender or Not Offender.
17: Health Care Information Systems and the Risk of Privacy Issues for the Disabled.
18: Safeguarding the Privacy of Electronic Medical Records.
19: Electronic Surveillance, Privacy and Enforcement of Intellectual Property Rights: A Digital Panopticon?.
20: Secure Electronic Voting with Cryptography.
21: U.S. Federal Data Mining Programs in the Context of the War on Terror: The Congress, Court, and Concerns for Privacy Protection.
22: A Performance Study of Secure Data Mining on the Cell Processor.
23: Cryptographic and Steganographic Approaches to Ensure Multimedia Information Security and Privacy.
24: Organizational and Social Implications.
25: ICT Security Policy: Challenges and Potential Remedies.
26: Definition, Typology and Patterns of Victimization.
27: Human Factors in Information Security and Privacy.
28: Ensuring Users' Rights to Privacy, Confidence and Reputation in the Online Learning Environment: What Should Instructors Do to Protect Their Students' Privacy?.
29: Female and Male Hacker Conferences Attendees: Their Autism-Spectrum Quotient (AQ) Scores and Self-Reported Adulthood Experiences.
30: Social/Ethical Issues in Predictive Insider Threat Monitoring.
31: The Human Attack in Linguistic Steganography.
32: How Much Is Too Much? How Marketing Professionals Can Avoid Violating Privacy Laws by Understanding the Privacy Principles.
33: Audience Intelligence in Online Advertising.
34: Effects of Individual Trust in Broadcast Media and the Internet on Privacy–Risking Uses of E–Health: An Expanded Analysis.
35: Do You Know Where Your Data Is? A Study of the Effect of Enforcement Strategies on Privacy Policies.
36: Publicly Available Computers: An Investigation of Transactional Website Use through Computers in Public Locations1.
1: Managerial Impact.
2: Managing IS Security and Privacy.
3: Six Keys to Improving Wireless Security.
4: A Game Theoretic Approach for Sensitive Information Sharing in Supply Chain.
5: An Analysis of Online Privacy Policies of Fortune 100 Companies.
6: Building and Management of Trust in Networked Information Systems.
7: Regulation of Cybercafés in Nigeria.
8: E–Government, Security, and Cyber–Privacy: Individual Rights vs. Government Responsibility.
9: Responsibilities and Liabilities with Respect to Catastrophes.
10: A Global Perspective of Laws and Regulations Dealing with Information Security and Privacy.
11: A Case for Consumer Virtual Property.
12: A Model–Based Privacy Compliance Checker1.
13: Preventative Actions for Enhancing Online Protection and Privacy.
14: Critical Issues.
15: The Sense of Security and Trust.
16: Examining an Individual's Perceived Need for Privacy and Security: Construct and Scale Development.
17: The Personalization Privacy Paradox: Mobile Customers' Perceptions of Push-Based vs. Pull-Based Location Commerce.
18: Balancing the Public Policy Drivers in the Tension between Privacy and Security.
19: A Profile of the Demographics, Psychological Predispositions, and Social/Behavioral Patterns of Computer Hacker Insiders and Outsiders.
20: Etiology, Motives, and Crime Hubs.
21: The General Theory of Crime and Computer Hacking: Low Self–Control Hackers?.
22: Between Hackers and White–Collar Offenders.
23: What about the Balance between Law Enforcement and Data Protection?.
24: A Taxonomic View of Consumer Online Privacy Legal Issues, Legislation, and Litigation.
25: Which Rights for Which Subjects? Genetic Confidentiality and Privacy in the Post-Genomic Era.
26: Provable Security for Outsourcing Database Operations.
27: Minimising Collateral Damage: Privacy–Preserving Investigative Data Acquisition Platform.
28: Emerging Trends.
29: Future Trends in Digital Security.
30: Advances in Security and Privacy in Wireless Sensor Networks.
31: Advances in Privacy Preserving Record Linkage.
32: Emerging Security Issues in VANETs for E–Business.
33: Cyber Security and Privacy in the Age of Social Networks.
34: Current Measures to Protect E–Consumers' Privacy in Australia.
35: Genetic Testing and Protection of Genetic Privacy: A Comparative Legal Analysis in Europe and Australia.
36: Cryptography–Based Authentication for Protecting Cyber Systems.
37: Aspect-Oriented Programming and Aspect.NET as Security and Privacy Tool for Web and 3D Web Programming.
Index.