Handbook of research on social and organizational liabilities in information security

"This book offers insightful articles on the most salient contemporary issues of managing social and human aspects of information security"--Provided by publisher.

Bibliographic Details
Corporate Author: IGI Global.
Other Authors: Gupta, Manish, 1978-, Sharman, Raj.
Format: Electronic
Language:English
Published: Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), c2009.
Subjects:
Online Access:View fulltext via EzAccess
LEADER 04657nam a2200637 a 4500
001 29361
003 IGIG
005 20100616114802.0
006 m e d
007 cr bn||||m|||a
008 080808s2009 paua fsbf 001 0 eng d
010 # # |z 2008035140 
020 # # |a 9781605661339 (ebook) 
020 # # |a 1605661333 (ebook) 
020 # # |z 9781605661322 (hardcover) 
020 # # |z 1605661325 (hardcover) 
024 7 # |a 10.4018/978-1-60566-132-2  |2 doi 
035 # # |a (CaBNVSL)gtp00541040 
035 # # |a (OCoLC)707611743 
040 # # |a CaBNVSL  |c CaBNVSL  |d CaBNVSL 
050 # 4 |a QA76.9.A25  |b H365 2009e 
082 0 4 |a 658.4/78  |2 22 
245 0 0 |a Handbook of research on social and organizational liabilities in information security  |c [edited by] Manish Gupta, Raj Sharman.  |h [electronic resource] / 
260 # # |a Hershey, Pa. :  |b IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),  |c c2009. 
300 # # |a electronic texts (xxxvii, 558 p. : ill.) :  |b digital files. 
504 # # |a Includes bibliographical references (p. 503-540) and index. 
505 0 # |a Section 1. Organizational Security -- 1. Responsibilities and Liabilities with respect to catastrophes -- 2. The Complex New World of Information Security -- 3. Employee Surveillance Based on Free Text Detection of Keystroke Dynamics -- 4. E-Risk Insurance Product Design: A Copula Based Bayesian Belief Network Model -- 5. E-Commerce Security and Honesty-Credit -- 6. Towards a Scalable Role and Organization Based Access Control Model with Decentralized Security Administration -- 7. Enterprise Information System Security: A Life-Cycle Approach -- 8. An Alternative Model of Information Security Investment -- 
505 0 # |a Section 2. Privacy and Social Engineering -- 9. Avoiding Pitfalls in Policy-Based Privacy Management -- 10. Privacy and Banking in Australia -- 11. A Multistage Framework to Defend Against Phishing Attacks -- 12. A New Approach to Reducing Social Engineering Impact -- 13. Privacy-Enhancing Technologies -- 14. Social Engineering and its Countermeasures -- 15. Social Networking Site: Opportunities and Security Challenges -- 
505 0 # |a Section 3. Security Education and Awareness -- 16. Designing Antiphishing Education -- 17. Theories Used in Information Security Research: Survey and Agenda -- 18. Information Assurance and Security Curriculum Meeting the SIGITE Guidelines -- 19. Information Security Awareness -- 20. Creating a Security Education, Training, and Awareness Program -- 21. Information Security Within an E-Learning Environment -- 22. Research Notes on Emerging Areas of Conflict in Security -- 
505 0 # |a Section 4. Human and Interaction Issues -- 23. The Human Attack in Linguistic Steganography -- 24. Using Technology to Overcome the Password's Contradiction -- 25. Formal Analysis of Security in Interactive Systems -- 26. Internet Crime: How Vulnerable Are You? Do Gender, Social Influence and Education Play a Role in Vulnerability -- 27. Detecting Shill Bidding in Online English Auctions -- 28. Information Security at Large Public Displays -- 29. The Sense of Security and Trust -- Compilation of References -- About the Contributors -- Index. 
506 # # |a Restricted to subscribers or individual electronic text purchasers. 
520 3 # |a "This book offers insightful articles on the most salient contemporary issues of managing social and human aspects of information security"--Provided by publisher. 
530 # # |a Also available in print. 
538 # # |a Mode of access: World Wide Web. 
650 # 0 |a Computer security  |v Handbooks, manuals, etc.  |x Management 
650 # 0 |a Data protection  |v Handbooks, manuals, etc.  |x Management 
650 # 0 |a Computer crimes  |v Handbooks, manuals, etc.  |x Prevention 
650 # 0 |a Human-computer interaction  |v Handbooks, manuals, etc. 
653 # # |a Digital convergence 
653 # # |a Employee surveillance 
653 # # |a Information availability and sharing 
653 # # |a Information security 
653 # # |a Information security culture 
653 # # |a Password authentication 
653 # # |a Privacy protection 
653 # # |a Safety-critical information system 
653 # # |a Security breaches 
653 # # |a Security configuration 
653 # # |a Security requirements elicitation 
653 # # |a Software verification 
700 1 # |a Gupta, Manish,  |d 1978- 
700 1 # |a Sharman, Raj. 
710 2 # |a IGI Global. 
776 0 # |c (Original)  |w (DLC) 2008035140  |z 9781605661322  |z 1605661325 
856 4 0 |u https://ezaccess.library.uitm.edu.my/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-132-2  |z View fulltext via EzAccess