Techniques And Applications For Advanced Information Privacy And Security
by Hamid R. Nemati
Advances in technology are causing new privacy concerns as an increasing number of citizens are engaging in online activities. Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues provides a thorough understanding of issues and concerns in information technology security. An advanced
… See more details belowOverview
Advances in technology are causing new privacy concerns as an increasing number of citizens are engaging in online activities. Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues provides a thorough understanding of issues and concerns in information technology security. An advanced reference source covering topics such as security management, privacy preservation, and authentication, this book outlines the field and provides a basic understanding of the most salient issues in privacy concerns for researchers and practitioners.
Product Details
- ISBN-13:
- 9781605662107
- Publisher:
- IGI Global
- Publication date:
- 03/31/2009
- Series:
- Premier Reference Source Series
- Pages:
- 416
- Product dimensions:
- 8.70(w) x 11.30(h) x 3.90(d)
Table of Contents
Sect. I Information Security and Privacy: Threats and Solutions
Ch. I A Rule-Based and Game-Theoretic Approach to On-Line Credit Card Fraud Detection Vishal Vatsa Vatsa, Vishal Shamik Sural Sural, Shamik A. K. Majumdar Majumdar, A. K. 1
Ch. II Email Worm Detection Using Data Mining Mohammad M. Masud Masud, Mohammad M. Latifur Khan Khan, Latifur Bhavani Thuraisingham Thuraisingham, Bhavani 20
Ch. III Information Systems Security: Cases of Network Administrator Threats Hamid Jahankhani Jahankhani, Hamid Shantha Fernando Fernando, Shantha Mathews Z. Nkhoma Nkhoma, Mathews Z. 35
Ch. IV Rootkits and What We Know: Assessing U.S. and Korean Knowledge and Perceptions Kirk P. Arnett Arnett, Kirk P. Mark B. Schmidt Schmidt, Mark B. Allen C. Johnston Johnston, Allen C. Jongki Kim Kim, Jongki HJ Hwang Hwang, HJ 47
Sect. II Privacy Preservation and Techniques
Ch. V Privacy-Preserving Data Mining and the Need for Confluence of Research and Practice Lixin Fu Fu, Lixin Hamid Nemati Nemati, Hamid Fereidoon Sadri Sadri, Fereidoon 60
Ch. VI A Dimensionality Reduction-Based Transformation to Support Business Collaboration Stanley R. M. Oliveira Oliveira, Stanley R. M. Osmar R. Zaiane Zaiane, Osmar R. 79
Ch. VII Privacy-Preserving Transactions Protocol using Mobile Agents with Mutual Authentication Song Han Song, Han Vidyasagar Potdar Potdar, Vidyasagar Elizabeth Chang Chang, Elizabeth Tharam Dillon Dillon, Tharam 103
Ch. VIII Dynamic Control Mechanisms for User Privacy Enhancement Amr Ali Eldin Eldin, Amr Ali 115
Ch. IX A Projection of the Future Effects of Quantum Computation on Information Privacy Geoff Skinner Skinner, Geoff Elizabeth Chang Chang, Elizabeth 138
Sect. III Authentication Techniques
Ch. X On the Design of an Authentication System Based on Keystroke Dynamics Using a Predefined Input Text Dieter Bartmann Bartmann, Dieter Idir Bakdi Bakdi, Idir Michael Achatz Achatz, Michael 149
Ch. XI Defeating Active Phishing Attacks for Web-Based Transactions Xin Luo Xin, Luo Teik Guan Tan Tan, Teik Guan 161
Ch. XII A Content-Based Watermarking Scheme for Image Authentication Using Discrete Wavelet Transform Inter-Coefficient Relations Latha Parameswaran Parameswaran, Latha K. Anbumani Anbumani, K. 173
Sect. IV Security and Privacy Management
Ch. XIII Privacy and Security in the Age of Electronic Customer Relationship Management Nicholas C. Romano, Jr. Romano, Nicholas C., Jr. Jerry Fjermestad Fjermestad, Jerry 189
Ch. XIV The Impact of Privacy Risk Harm (RH) and Risk Likelihood (RL) on IT Acceptance: An Examination of a Student Information System Joseph A. Cazier Cazier, Joseph A. E. Vance Wilson Wilson, E. Vance B. Dawn Medlin Medlin, B. Dawn 211
Ch. XV Ignorance is Bliss: The Effect of Increased Knowledge on Privacy Concerns and Internet Shopping Site Personalization Preferences Thomas P. Van Dyke Van Dyke, Thomas P. 225
Sect. V Web Security and Privacy Issues and Technologies
Ch. XVI Trustworthy Web Services: An Experience-Based Model for Trustworthiness Evaluation Stephen J. H. Yang Yang, Stephen J. H. Blue C. W. Lan Lan, Blue C. W. James S. R. Hsieh Hsieh, James S. R. Jen-Yao Chung Chung, Jen-Yao 245
Ch. XVII Administering the Semantic Web: Confidentiality, Privacy and Trust Management Bhavani Thuraisingham Thuraisingham, Bhavani Natasha Tsybulnik Tsybulnik, Natasha Ashraful Alam Alam, Ashraful 262
Ch. XVIII An Ontology of Information Security Almut Herzog Herzog, Almut Nahid Shahmehri Shahmehri, Nahid Claudiu Duma Duma, Claudiu 278
Sect. VI Evaluating Information Security and Privacy: Where are We Going from Here?
Ch. XIX Information Security Effectiveness: Conceptualization and Validation of a Theory Kenneth J. Knapp Knapp, Kenneth J. Thomas E. Marshall Marshall, Thomas E. R. Kelly Rainer, Jr. Rainer, R. Kelly, Jr. F. Nelson Ford Ford, F. Nelson 303
Ch. XX A Simulation Model of IS Security Norman Pendegraft Pendegraft, Norman Mark Rounds Rounds, Mark 327
Compilation of References 340
About the Contributors 366
Index 376
Customer Reviews
Average Review: