Strategic and practical approaches for information security governance technologies and applied solutions /

"This book provides organizations with insights into practical and applied solutions, frameworks, technologies and practices on technological and organizational factors in information security"--Provided by publisher.

Bibliographic Details
Corporate Author: IGI Global.
Other Authors: Gupta, Manish, 1978-, Walp, John, 1967-, Sharman, Raj.
Format: Electronic
Language:English
Published: Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), c2012.
Subjects:
Online Access:Chapter PDFs via platform:
LEADER 05298nam a2200625 a 4500
001 19525
003 IGIG
005 20120130005730.0
006 m e d
007 cr bn||||m|||a
008 120123s2012 pau fsb 000 0 eng d
010 # # |z 2011042029 
020 # # |a 9781466601987 (ebook) 
020 # # |z 9781466601970 (hardcover) 
020 # # |z 9781466601994 (print & perpetual access) 
024 7 # |a 10.4018/978-1-4666-0197-0  |2 doi 
035 # # |a (CaBNVSL)gtp00550675 
035 # # |a (OCoLC)807848558 
040 # # |a CaBNVSL  |c CaBNVSL  |d CaBNVSL 
050 # 4 |a TK5105.59  |b .S766 2012e 
082 0 4 |a 005.8  |2 23 
245 0 0 |a Strategic and practical approaches for information security governance  |b technologies and applied solutions /  |c Manish Gupta, John Walp, Raj Sharman, editors.  |h [electronic resource] : 
260 # # |a Hershey, Pa. :  |b IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),  |c c2012. 
300 # # |a electronic texts (420 p.) :  |b digital files. 
504 # # |a Includes bibliographical references. 
505 0 # |a 1. Investigating the concept of information security culture / Daniel Oost and Eng K. Chew -- 2. Assessing market compliance of IT security solutions: a structured approach using diffusion of innovations theory / Heiko Rossnagel and Jan Zibuschka -- 3. Identity assurance in open networks / Ivonne Thomas and Christoph Meinel -- 4. Information security governance / Janne J. Korhonen, Kari Hiekkanen and Juha Mykkänen -- 5. Enterprise information security policies, standards, and procedures: a survey of available standards and guidelines / Syed Irfan Nabi, Ghmlas Saleh Al-Ghmlas and Khaled Alghathbar -- 6. ISMS building for SMEs through the reuse of knowledge / Lus̕ Enrique Sánchez, Antonio Santos-Olmo, Eduardo Fernandez-Medina and Mario Piattini -- 7. Information security and management in social network / Alkesh Patel and Ajit Balakrishnan -- 8. Music is the key: using our enduring memory for songs to help users log on / Marcia Gibson ... [et al.] -- 9. Information system integrated security / Milena Tvrdk̕ová -- 10. Surveillance communities of practice: supporting aspects of information assurance for safeguards and compliance monitoring / Peter Goldschmidt -- 11. Not every cloud brings rain: legal risks on the horizon / Sylvia Kierkegaard -- 12. Securing the extended enterprise: a method for analyzing external insider threat / Virginia N. L. Franqueira ... [et al.] -- 
505 8 # |a 13. Information security management systems cybernetics / Wolfgang Boehmer -- 14. Fraud and identity theft issues / Ranaganayakulu Dhanalakshmi and Chenniappan Chellappan -- 15. Information security governance and standard based management systems / Margareth Stoll and Ruth Breu -- 16. A construct grid approach to security classification and analysis / Michael Van Hilst and Eduardo B. Fernandez -- 17. Towards an organizational culture framework for information security practices / Joo Soon Lim ... [et al.] -- 18. Establishment of enterprise secured information architecture / Shyh-Chang Liu and Tsang- Hung Wu -- 19. Information security management based on adaptive security policy using user behavior analysis / Ines Brosso and Alessandro La Neve -- 20. Detecting credit fraud in e-business system: an information security perspective on the banking sector in UK / Md Delwar Hussain Mahdi and Karim Mohammed Rezaul -- 21. Safeguarding Australia from cyber-terrorism: a SCADA risk framework / Christopher Beggs and Matthew Warren -- 22. Detecting compliance failures in unmanaged processes / Yurdaer N. Doganata -- 23. Loss of data: reflective case studies / Ian Rosewall and Matt Warren. 
506 # # |a Restricted to subscribers or individual electronic text purchasers. 
520 3 # |a "This book provides organizations with insights into practical and applied solutions, frameworks, technologies and practices on technological and organizational factors in information security"--Provided by publisher. 
530 # # |a Also available in print. 
538 # # |a Mode of access: World Wide Web. 
588 # # |a Description based on title screen (IGI Global, viewed January 23, 2012). 
650 # 0 |a Computer networks  |x Security measures. 
650 # 0 |a Information networks  |x Security measures. 
650 # 0 |a Data protection  |x Security measures. 
653 # # |a Access control methods and models 
653 # # |a Data loss prevention approaches 
653 # # |a Enforcement policies 
653 # # |a Forensics and investigation 
653 # # |a Fraud and identity theft 
653 # # |a Identification and authentication technologies 
653 # # |a Information security governance frameworks 
653 # # |a Information security management frameworks 
653 # # |a Legal and regulatory oversight 
653 # # |a Security auditing 
653 # # |a Accountability 
653 # # |a Storage and device security 
700 1 # |a Gupta, Manish,  |d 1978- 
700 1 # |a Walp, John,  |d 1967- 
700 1 # |a Sharman, Raj. 
710 2 # |a IGI Global. 
776 0 # |c (Original)  |w (DLC)2011042029 
776 0 8 |i Print version:  |w (DLC) 2011042029  |z 9781466601970  |z 1466601973 
856 4 1 |u https://ezaccess.library.uitm.edu.my/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-0197-0  |3 Chapter PDFs via platform: