Hamid R. Nemati, Hamid R. Nemati9781605662107, 1605662100, 9781605662114, 1605662119
Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues provides a thorough understanding of issues and concerns in information technology security. An advanced reference source covering topics such as security management, privacy preservation, and authentication, this book outlines the field and provides a basic understanding of the most salient issues in privacy concerns for researchers and practitioners.
Table of contents :
Title
……Page 2
Associate Editors……Page 6
Table of Contents……Page 8
Detailed Table of Contents……Page 12
Preface……Page 23
A Rule-Based and Game-Theoretic Approach to On-Line Credit Card Fraud Detection……Page 38
Email Worm Detection Using Data Mining……Page 57
Information Systems Security: Cases of Network Administrator Threats……Page 72
Rootkits and What We Know: Assessing U.S. and Korean Knowledge and Perceptions……Page 84
Privacy-Preserving Data Mining and the Need for Confluence of
Research and Practice……Page 97
A Dimensionality Reduction-Based Transformation to Support Business Collaboration……Page 116
Privacy-Preserving Transactions Protocol using Mobile Agents with Mutual Authentication……Page 140
Dynamic Control Mechanisms for User Privacy Enhancement……Page 152
A Projection of the Future Effects of Quantum Computation on Information Privacy……Page 175
On the Design of an Authentication System Based on Keystroke Dynamics Using a Predefined Input Text……Page 186
Defeating Active Phishing Attacks for Web-Based Transactions……Page 198
A Content-Based Watermarking Scheme for Image Authentication Using Discrete Wavelet Transform Inter-Coefficient Relations……Page 210
Privacy and Security in the Age of Electronic Customer Relationship Management……Page 226
The Impact of Privacy Risk Harm (RH) and Risk Likelihood (RL) on IT Acceptance: An Examination of a Student Information System……Page 248
Ignorance is Bliss: The Effect of Increased Knowledge on Privacy Concerns and Internet Shopping Site Personalization Preferences……Page 262
Trustworthy Web Services: An Experience-Based Model for Trustworthiness Evaluation……Page 282
Administering the Semantic Web: Confidentiality, Privacy and Trust Management……Page 299
An Ontology of Information Security……Page 315
Information Security Effectiveness: Conceptualization and Validation of a Theory……Page 340
A Simulation Model of IS Security……Page 364
Compilation of References……Page 377
About the Contributors……Page 403
Index……Page 413
Reviews
There are no reviews yet.