Techniques and applications for advanced information privacy and security emerging organizational, ethical, and human issues
by
 
Nemati, Hamid R., 1958-

Title
Techniques and applications for advanced information privacy and security emerging organizational, ethical, and human issues

Author
Nemati, Hamid R., 1958-

ISBN
9781605662114

Publication Information
Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), c2009.

Physical Description
electronic texts (xxxiv, 378 p. : ill.) : digital files.

Contents
1. A rule-based and game-theoretic approach to on-line credit card fraud detection / Vishal Vatsa, Shamik Sural, A.K. Majumdar -- 2. Email worm detection using data mining / Mohammad Masud, Latifur Khan, Bhavani Thuraisingham -- 3. Information systems security / Hamid Jahankhani, Shantha Fernando, Mathews Nkhoma -- 4. Rootkits and what we know / Kirk Arnett ... [et al.] -- 5. Privacy-preserving data mining and the need for confluence of research and practice / Lixin Fu, Hamid Nemati, Fereidoon Sadri -- 6. A dimensionality reduction-based transformation to support business collaboration / Stanley Oliveira, Osmar Zaiane -- 7. Privacy-preserving transactions protocol using mobile agents with mutual authentication / Song Han ... [et al.] -- 8. Dynamic control mechanisms for user privacy enhancement / Amr Ali Eldin -- 9. A projection of the future effects of quantum computation on information privacy / Geoff Skinner, Elizabeth Chang -- 10. On the design of an authentication system based on keystroke dynamics using a predefined input text / Dieter Bartmann, Idir Bakdi, Michael Achatz -- 11. Defeating active phishing attacks for Web-based transactions / Xin Luo, Teik Guan Tan -- 12. A content-based watermarking scheme for image authentication using discrete wavelet transform inter-coefficient relations / Latha Parameswaran, K Anbumani -- 13. Privacy and security in the age of electronic customer relationship management / Nicholas Romano, Jerry Fjermestad -- 14. The impact of privacy Risk Harm (RH) and Risk Likelihood (RL) on IT acceptance / Joseph Cazier, E. Wilson, B. Medlin -- 15. Ignorance is bliss / Thomas Van Dyke -- 16. Trustworthy Web services / Stephen Yang ... [et al.] -- 17. Administering the Semantic Web / Bhavani Thuraisingham, Natasha Tsybulnik, Ashraful Alam -- 18. An ontology of information security / Almut Herzog, Nahid Shahmehri, Claudiu Duma -- 19. Information security effectiveness / Kenneth Knapp ... [et al.] -- 20. A simulation model of IS security / Norman Pendegraft, Mark Rounds.

Abstract
"This book provides a thorough understanding of issues and concerns in information technology security"--Provided by publisher.

Subject Term
Electronic commerce -- Security measures.
 
Information technology -- Security measures.
 
Computer security.
 
Data protection.

Added Author
Nemati, Hamid R., 1958-

Added Corporate Author
IGI Global.

Electronic Access
Chapter PDFs via platform: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-210-7


LibraryMaterial TypeItem BarcodeShelf NumberStatus
IYTE LibraryE-Book2261969-1001HF5548.37 .T43 2009EIGI Global