Limit search to available items
Your search query has been changed... Tried: (liberalism and sweden and värmlands and län) no results found... Tried: (liberalism or sweden or värmlands or län)
18258 results found. Sorted by relevance .
Book Cover
Book

Title Techniques and applications for advanced information privacy and security : emerging organizational, ethical, and human issues / [edited by] Hamid R. Nemati
Published Hershey, PA : Information Science Reference, [2009]
©2009
©2009

Copies

Location Call no. Vol. Availability
 MELB  658.478 Nem/Tap  AVAILABLE
Description xxxiv, 378 pages : illustrations ; 29 cm
Contents Machine derived contents note: Section I -- Information Security and Privacy: -- Threats and Solutions -- Chapter I -- A Rule-Based and Game-Theoretic Approach to On-Line Credit Card Fraud Detection I -- Vishal Vatsa, Indian Institute of Technology, India -- Shamik Sural, Indian Institute of Technology, India -- A. K Majumdar Indian Institute of Technology, India -- Chapter II -- Email Worm Detection Using Data Mining 20 -- Mohammad M Masud, University of Texas at Dallas, USA -- Latifur Khan, University of Texas at Dallas, USA -- Bhavani Thuraisingham, University of Texas at Dallas, USA -- Chapter III -- Information Systems Security: Cases of Network Administrator Threats 35 -- Hamid Jahankhani, University of East London, UK -- Shantha Fernando, University of Moratuwa, Sri Lanka -- Mathews Z. Nkhoma, University of East London, UK -- Chapter IV -- Rootkits and What We Know: Assessing U.S. and Korean Knowledge and Perceptions 47 -- Kirk P Arnett, Mississippi State University, USA
Mark B. Schmidt, St. Cloud State University, USA -- Allen C. Johnston, University ofAlabama, Birmingham, USA -- Jongki Kim, Pusan National University, Korea -- HJ Hwang, Catholic University of Daegu, Korea -- Section II -- Privacy Preservation and Techniques -- Chapter V -- Privacy-Preserving Data Mining and the Need for Confluence of Research and Practice 60 -- Lixin Fitu, University of North Carolina, Greensboro, USA -- Hamid Nemati, University of North Carolina, Greensboro, USA -- Fereidoon Sadri, University of North Carolina, Greensboro, USA -- Chapter VI -- A Dimensionality Reduction-Based Transformation to Support Business Collaboration 79 -- Stanley R. M. Oliveira, Embrapa hiformcitica Agropecutiria, Brasil -- Osmar R. Zaiane, University ofAlberta, Canada -- Chapter VII -- Privacy-Preserving Transactions Protocol using Mobile Agents with Mutual Authentication 103 -- Song Han, Curtin University of Technology, Australia
Vidyasagar Potdar, Curtin University of Technology, Australia -- Elizabeth Chang, Curtin University of Technology, Australia -- Tharam Dillon, Curtin University of Technology, Australia -- Chapter VIII -- Dynamic Control Mechanisms for User Privacy Enhancement 115 -- Amr Ali Eldin, Accenture, The Netherlands -- Chapter IX -- A Projection of the Future Effects of Quantum Computation on Information Privacy 138 -- Geojf Skinner Curtin University of Technology, Australia -- Elizabeth Chang, Curtin University of Technology, Australia -- Section III -- Authentication Techniques -- Chapter X -- On the Design of an Authentication System Based on Keystroke Dynamics Using a -- Predefined Input Text 149 -- Dieter Bartmann, Universitait Regensburg, Germany -- Idir Bakdi, Universitit Regensburg, Germany -- Michael Achatz, Universitit Regensburg, Germany -- Chapter XI -- Defeating Active Phishing Attacks for Web-Based Transactions 16 I1 -- Xin Luo, Virginia State University, USA
Teik Guan Tan, Data Security Systems Solutions Pte Ltd, Singapore -- Chapter XII -- A Content-Based Watermarking Scheme for Image Authentication Using Discrete -- Wavelet Transform Inter-Coefficient Relations 173 -- Latha Parameswaran, Anmrita University, India -- K. Anbumani, Karunya University, India -- Section IV -- Security and Privacy Management -- Chapter XIII -- Privacy and Security in the Age of Electronic Customer Relationship Management 189 -- Nicholas C. Romano, Jr, Oklahoma State University, USA -- Jerry Fjermestad, New Jersey Institute of Technology, USA -- Chapter XIV -- The Impact of Privacy Risk Harm (RH) and Risk Likelihood (RL) on IT Acceptance: -- An Examination of a Student Information System 211 -- Joseph A. Cazier, Appalachian State University, USA -- E. Vance Wilson, Arizona State University, USA -- B. Dawn Medlin, Appalachian State University, USA -- Chapter XV -- Ignorance is Bliss: The Effect of Increased Knowledge on Privacy Concerns and Internet
Shopping Site Personalization Preferences 225 -- Thomas P Van Dyke, University of North Carolina, Greensboro, USA -- Section V -- Web Security and Privacy Issues and Technologies -- Chapter XVI -- Trustworthy Web Services: An Experience-Based Model for Trustworthiness Evaluation 245 -- Stephen J. H. Yang, National Central University, Taiwan -- Blue C. W Lan, National Central University, Taiwan -- James S.F Hsieh, Ulead Systems Inc., Taiwan -- Jen- Yao Chung, IBM T J. Watson Research Center; USA -- Chapter XVII -- Administering the Semantic Web: Confidentiality, Privacy and Trust Management 262 -- Bhavani Thuraisingham, University of Texas at Dallas, USA -- Natasha Tsybulnik, University of Texas at Dallas, ULSA -- Ashrafid Alain, University of Texas at Dallas, USA -- Chapter XVIII -- An Ontology of Information Security 278 -- Alhnut Herzog, Linkopings Universitet, Sweden -- Nahid Shahmehri, Linkopings Universitet, Sweden -- Claudiu Duma, Linkopings Universitet, Sweden -- Section VI
Evaluating Information Security and Privacy: -- Where are We Going from Here? -- Chapter XIX -- Information Security Effectiveness: Conceptualization and Validation of a Theory 303 -- Kenneth J. Knapp, US. Air Force Academy, USA -- Thomas E. Marshall, Auburn University, USA -- R. Kelly Rainer Jr, Auburn University, USA -- F Nelson Ford, Auburn University, USA -- Chapter XX -- A Simulation Model of IS Security 327 -- Norman Pendegraft, University of Idaho, USA -- Mark Rounds, University of Idaho, USA -- Com pilation of References 340 -- About the Contributors 366
Summary "This book provides a thorough understanding of issues and concerns in information technology security"--Provided by publisher
Notes "Premier reference source"--Cover
Bibliography Includes bibliographical references (pages 340-365) and index
Subject Electronic commerce -- Security measures.
Information technology -- Security measures.
Computer security.
Data protection.
Author Nemati, Hamid R., 1958- editor of compilation
LC no. 2008051169
ISBN 9781605662107 (hardcover)
1605662100 (hardcover)
9781605662114 (ebook)
1605662119 (ebook)