Strategic and practical approaches for information security governance technologies and applied solutions /
"This book provides organizations with insights into practical and applied solutions, frameworks, technologies and practices on technological and organizational factors in information security"--Provided by publisher.
Corporate Author: | |
---|---|
Other Authors: | , , |
Format: | Electronic |
Language: | English |
Published: |
Hershey, Pa. :
IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),
c2012.
|
Subjects: | |
Online Access: | Chapter PDFs via platform: |
Table of Contents:
- 1. Investigating the concept of information security culture / Daniel Oost and Eng K. Chew
- 2. Assessing market compliance of IT security solutions: a structured approach using diffusion of innovations theory / Heiko Rossnagel and Jan Zibuschka
- 3. Identity assurance in open networks / Ivonne Thomas and Christoph Meinel
- 4. Information security governance / Janne J. Korhonen, Kari Hiekkanen and Juha Mykkänen
- 5. Enterprise information security policies, standards, and procedures: a survey of available standards and guidelines / Syed Irfan Nabi, Ghmlas Saleh Al-Ghmlas and Khaled Alghathbar
- 6. ISMS building for SMEs through the reuse of knowledge / Lus̕ Enrique Sánchez, Antonio Santos-Olmo, Eduardo Fernandez-Medina and Mario Piattini
- 7. Information security and management in social network / Alkesh Patel and Ajit Balakrishnan
- 8. Music is the key: using our enduring memory for songs to help users log on / Marcia Gibson ... [et al.]
- 9. Information system integrated security / Milena Tvrdk̕ová
- 10. Surveillance communities of practice: supporting aspects of information assurance for safeguards and compliance monitoring / Peter Goldschmidt
- 11. Not every cloud brings rain: legal risks on the horizon / Sylvia Kierkegaard
- 12. Securing the extended enterprise: a method for analyzing external insider threat / Virginia N. L. Franqueira ... [et al.]
- 13. Information security management systems cybernetics / Wolfgang Boehmer
- 14. Fraud and identity theft issues / Ranaganayakulu Dhanalakshmi and Chenniappan Chellappan
- 15. Information security governance and standard based management systems / Margareth Stoll and Ruth Breu
- 16. A construct grid approach to security classification and analysis / Michael Van Hilst and Eduardo B. Fernandez
- 17. Towards an organizational culture framework for information security practices / Joo Soon Lim ... [et al.]
- 18. Establishment of enterprise secured information architecture / Shyh-Chang Liu and Tsang- Hung Wu
- 19. Information security management based on adaptive security policy using user behavior analysis / Ines Brosso and Alessandro La Neve
- 20. Detecting credit fraud in e-business system: an information security perspective on the banking sector in UK / Md Delwar Hussain Mahdi and Karim Mohammed Rezaul
- 21. Safeguarding Australia from cyber-terrorism: a SCADA risk framework / Christopher Beggs and Matthew Warren
- 22. Detecting compliance failures in unmanaged processes / Yurdaer N. Doganata
- 23. Loss of data: reflective case studies / Ian Rosewall and Matt Warren.