๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Techniques and applications for advanced information privacy and security: emerging organizational, ethical, and human issues

โœ Scribed by Hamid R. Nemati, Hamid R. Nemati


Publisher
Information Science Reference
Year
2009
Tongue
English
Leaves
415
Series
Advances in Information Security and Privacy
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


Advances in technology are causing new privacy concerns as an increasing number of citizens are engaging in online activities.

Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues provides a thorough understanding of issues and concerns in information technology security. An advanced reference source covering topics such as security management, privacy preservation, and authentication, this book outlines the field and provides a basic understanding of the most salient issues in privacy concerns for researchers and practitioners.

โœฆ Table of Contents


Title
......Page 2
Associate Editors......Page 6
Table of Contents......Page 8
Detailed Table of Contents......Page 12
Preface......Page 23
A Rule-Based and Game-Theoretic Approach to On-Line Credit Card Fraud Detection......Page 38
Email Worm Detection Using Data Mining......Page 57
Information Systems Security: Cases of Network Administrator Threats......Page 72
Rootkits and What We Know: Assessing U.S. and Korean Knowledge and Perceptions......Page 84
Privacy-Preserving Data Mining and the Need for Confluence of
Research and Practice......Page 97
A Dimensionality Reduction-Based Transformation to Support Business Collaboration......Page 116
Privacy-Preserving Transactions Protocol using Mobile Agents with Mutual Authentication......Page 140
Dynamic Control Mechanisms for User Privacy Enhancement......Page 152
A Projection of the Future Effects of Quantum Computation on Information Privacy......Page 175
On the Design of an Authentication System Based on Keystroke Dynamics Using a Predefined Input Text......Page 186
Defeating Active Phishing Attacks for Web-Based Transactions......Page 198
A Content-Based Watermarking Scheme for Image Authentication Using Discrete Wavelet Transform Inter-Coefficient Relations......Page 210
Privacy and Security in the Age of Electronic Customer Relationship Management......Page 226
The Impact of Privacy Risk Harm (RH) and Risk Likelihood (RL) on IT Acceptance: An Examination of a Student Information System......Page 248
Ignorance is Bliss: The Effect of Increased Knowledge on Privacy Concerns and Internet Shopping Site Personalization Preferences......Page 262
Trustworthy Web Services: An Experience-Based Model for Trustworthiness Evaluation......Page 282
Administering the Semantic Web: Confidentiality, Privacy and Trust Management......Page 299
An Ontology of Information Security......Page 315
Information Security Effectiveness: Conceptualization and Validation of a Theory......Page 340
A Simulation Model of IS Security......Page 364
Compilation of References......Page 377
About the Contributors......Page 403
Index......Page 413


๐Ÿ“œ SIMILAR VOLUMES


Handbook of Research on Machine and Deep
โœ Padmavathi Ganapathi (editor), D. Shanmugapriya (editor) ๐Ÿ“‚ Library ๐Ÿ“… 2019 ๐Ÿ› Information Science Reference ๐ŸŒ English

As the advancement of technology continues, cyber security continues to play a significant role in today's world. With society becoming more dependent on the internet, new opportunities for virtual attacks can lead to the exposure of critical information. Machine and deep learning techniques to prev

Information Security and Ethics: Social
โœ Marian Quigley ๐Ÿ“‚ Library ๐Ÿ“… 2004 ๐Ÿ› IRM Press ๐ŸŒ English

Information Security and Ethics: Social and Organizational Issues brings together examples of the latest research from a number of international scholars addressing a wide range of issues significant to this important and growing field of study. These issues are relevant to the wider society, as wel

Information Security and Ethics: Social
โœ Quigley M. (Ed) ๐Ÿ“‚ Library ๐Ÿ“… 2004 ๐ŸŒ English

Emphasizing the importance of ethics to electronic societies, fourteen chapters by an international panel of academics in information technology and business provide an overview of the growing field of information ethics and its intersection with information security. Chapters delve into topics incl