Cover image for Techniques and applications for advanced information privacy and security emerging organizational, ethical, and human issues
Techniques and applications for advanced information privacy and security emerging organizational, ethical, and human issues
Title:
Techniques and applications for advanced information privacy and security emerging organizational, ethical, and human issues
Author:
Nemati, Hamid R., 1958-
ISBN:
9781605662114
Publication Information:
Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), c2009.
Physical Description:
electronic texts (xxxiv, 378 p. : ill.) : digital files.
Contents:
1. A rule-based and game-theoretic approach to on-line credit card fraud detection / Vishal Vatsa, Shamik Sural, A.K. Majumdar -- 2. Email worm detection using data mining / Mohammad Masud, Latifur Khan, Bhavani Thuraisingham -- 3. Information systems security / Hamid Jahankhani, Shantha Fernando, Mathews Nkhoma -- 4. Rootkits and what we know / Kirk Arnett ... [et al.] -- 5. Privacy-preserving data mining and the need for confluence of research and practice / Lixin Fu, Hamid Nemati, Fereidoon Sadri -- 6. A dimensionality reduction-based transformation to support business collaboration / Stanley Oliveira, Osmar Zaiane -- 7. Privacy-preserving transactions protocol using mobile agents with mutual authentication / Song Han ... [et al.] -- 8. Dynamic control mechanisms for user privacy enhancement / Amr Ali Eldin -- 9. A projection of the future effects of quantum computation on information privacy / Geoff Skinner, Elizabeth Chang -- 10. On the design of an authentication system based on keystroke dynamics using a predefined input text / Dieter Bartmann, Idir Bakdi, Michael Achatz -- 11. Defeating active phishing attacks for Web-based transactions / Xin Luo, Teik Guan Tan -- 12. A content-based watermarking scheme for image authentication using discrete wavelet transform inter-coefficient relations / Latha Parameswaran, K Anbumani -- 13. Privacy and security in the age of electronic customer relationship management / Nicholas Romano, Jerry Fjermestad -- 14. The impact of privacy Risk Harm (RH) and Risk Likelihood (RL) on IT acceptance / Joseph Cazier, E. Wilson, B. Medlin -- 15. Ignorance is bliss / Thomas Van Dyke -- 16. Trustworthy Web services / Stephen Yang ... [et al.] -- 17. Administering the Semantic Web / Bhavani Thuraisingham, Natasha Tsybulnik, Ashraful Alam -- 18. An ontology of information security / Almut Herzog, Nahid Shahmehri, Claudiu Duma -- 19. Information security effectiveness / Kenneth Knapp ... [et al.] -- 20. A simulation model of IS security / Norman Pendegraft, Mark Rounds.
Abstract:
"This book provides a thorough understanding of issues and concerns in information technology security"--Provided by publisher.
Added Corporate Author:
Holds: Copies: