Techniques And Applications For Advanced Information Privacy And Security

Techniques And Applications For Advanced Information Privacy And Security

by Hamid R. Nemati
     
 

Advances in technology are causing new privacy concerns as an increasing number of citizens are engaging in online activities. Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues provides a thorough understanding of issues and concerns in information technology security. An advanced

See more details below

Overview

Advances in technology are causing new privacy concerns as an increasing number of citizens are engaging in online activities. Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues provides a thorough understanding of issues and concerns in information technology security. An advanced reference source covering topics such as security management, privacy preservation, and authentication, this book outlines the field and provides a basic understanding of the most salient issues in privacy concerns for researchers and practitioners.

Product Details

ISBN-13:
9781605662107
Publisher:
IGI Global
Publication date:
03/31/2009
Series:
Premier Reference Source Series
Pages:
416
Product dimensions:
8.70(w) x 11.30(h) x 3.90(d)

Table of Contents

Sect. I Information Security and Privacy: Threats and Solutions

Ch. I A Rule-Based and Game-Theoretic Approach to On-Line Credit Card Fraud Detection Vishal Vatsa Vatsa, Vishal Shamik Sural Sural, Shamik A. K. Majumdar Majumdar, A. K. 1

Ch. II Email Worm Detection Using Data Mining Mohammad M. Masud Masud, Mohammad M. Latifur Khan Khan, Latifur Bhavani Thuraisingham Thuraisingham, Bhavani 20

Ch. III Information Systems Security: Cases of Network Administrator Threats Hamid Jahankhani Jahankhani, Hamid Shantha Fernando Fernando, Shantha Mathews Z. Nkhoma Nkhoma, Mathews Z. 35

Ch. IV Rootkits and What We Know: Assessing U.S. and Korean Knowledge and Perceptions Kirk P. Arnett Arnett, Kirk P. Mark B. Schmidt Schmidt, Mark B. Allen C. Johnston Johnston, Allen C. Jongki Kim Kim, Jongki HJ Hwang Hwang, HJ 47

Sect. II Privacy Preservation and Techniques

Ch. V Privacy-Preserving Data Mining and the Need for Confluence of Research and Practice Lixin Fu Fu, Lixin Hamid Nemati Nemati, Hamid Fereidoon Sadri Sadri, Fereidoon 60

Ch. VI A Dimensionality Reduction-Based Transformation to Support Business Collaboration Stanley R. M. Oliveira Oliveira, Stanley R. M. Osmar R. Zaiane Zaiane, Osmar R. 79

Ch. VII Privacy-Preserving Transactions Protocol using Mobile Agents with Mutual Authentication Song Han Song, Han Vidyasagar Potdar Potdar, Vidyasagar Elizabeth Chang Chang, Elizabeth Tharam Dillon Dillon, Tharam 103

Ch. VIII Dynamic Control Mechanisms for User Privacy Enhancement Amr Ali Eldin Eldin, Amr Ali 115

Ch. IX A Projection of the Future Effects of Quantum Computation on Information Privacy Geoff Skinner Skinner, Geoff Elizabeth Chang Chang, Elizabeth 138

Sect. III Authentication Techniques

Ch. X On the Design of an Authentication System Based on Keystroke Dynamics Using a Predefined Input Text Dieter Bartmann Bartmann, Dieter Idir Bakdi Bakdi, Idir Michael Achatz Achatz, Michael 149

Ch. XI Defeating Active Phishing Attacks for Web-Based Transactions Xin Luo Xin, Luo Teik Guan Tan Tan, Teik Guan 161

Ch. XII A Content-Based Watermarking Scheme for Image Authentication Using Discrete Wavelet Transform Inter-Coefficient Relations Latha Parameswaran Parameswaran, Latha K. Anbumani Anbumani, K. 173

Sect. IV Security and Privacy Management

Ch. XIII Privacy and Security in the Age of Electronic Customer Relationship Management Nicholas C. Romano, Jr. Romano, Nicholas C., Jr. Jerry Fjermestad Fjermestad, Jerry 189

Ch. XIV The Impact of Privacy Risk Harm (RH) and Risk Likelihood (RL) on IT Acceptance: An Examination of a Student Information System Joseph A. Cazier Cazier, Joseph A. E. Vance Wilson Wilson, E. Vance B. Dawn Medlin Medlin, B. Dawn 211

Ch. XV Ignorance is Bliss: The Effect of Increased Knowledge on Privacy Concerns and Internet Shopping Site Personalization Preferences Thomas P. Van Dyke Van Dyke, Thomas P. 225

Sect. V Web Security and Privacy Issues and Technologies

Ch. XVI Trustworthy Web Services: An Experience-Based Model for Trustworthiness Evaluation Stephen J. H. Yang Yang, Stephen J. H. Blue C. W. Lan Lan, Blue C. W. James S. R. Hsieh Hsieh, James S. R. Jen-Yao Chung Chung, Jen-Yao 245

Ch. XVII Administering the Semantic Web: Confidentiality, Privacy and Trust Management Bhavani Thuraisingham Thuraisingham, Bhavani Natasha Tsybulnik Tsybulnik, Natasha Ashraful Alam Alam, Ashraful 262

Ch. XVIII An Ontology of Information Security Almut Herzog Herzog, Almut Nahid Shahmehri Shahmehri, Nahid Claudiu Duma Duma, Claudiu 278

Sect. VI Evaluating Information Security and Privacy: Where are We Going from Here?

Ch. XIX Information Security Effectiveness: Conceptualization and Validation of a Theory Kenneth J. Knapp Knapp, Kenneth J. Thomas E. Marshall Marshall, Thomas E. R. Kelly Rainer, Jr. Rainer, R. Kelly, Jr. F. Nelson Ford Ford, F. Nelson 303

Ch. XX A Simulation Model of IS Security Norman Pendegraft Pendegraft, Norman Mark Rounds Rounds, Mark 327

Compilation of References 340

About the Contributors 366

Index 376

Read More

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >