|
|
|
|
LEADER |
04657nam a2200637 a 4500 |
001 |
29361 |
003 |
IGIG |
005 |
20100616114802.0 |
006 |
m e d |
007 |
cr bn||||m|||a |
008 |
080808s2009 paua fsbf 001 0 eng d |
010 |
# |
# |
|z 2008035140
|
020 |
# |
# |
|a 9781605661339 (ebook)
|
020 |
# |
# |
|a 1605661333 (ebook)
|
020 |
# |
# |
|z 9781605661322 (hardcover)
|
020 |
# |
# |
|z 1605661325 (hardcover)
|
024 |
7 |
# |
|a 10.4018/978-1-60566-132-2
|2 doi
|
035 |
# |
# |
|a (CaBNVSL)gtp00541040
|
035 |
# |
# |
|a (OCoLC)707611743
|
040 |
# |
# |
|a CaBNVSL
|c CaBNVSL
|d CaBNVSL
|
050 |
# |
4 |
|a QA76.9.A25
|b H365 2009e
|
082 |
0 |
4 |
|a 658.4/78
|2 22
|
245 |
0 |
0 |
|a Handbook of research on social and organizational liabilities in information security
|c [edited by] Manish Gupta, Raj Sharman.
|h [electronic resource] /
|
260 |
# |
# |
|a Hershey, Pa. :
|b IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),
|c c2009.
|
300 |
# |
# |
|a electronic texts (xxxvii, 558 p. : ill.) :
|b digital files.
|
504 |
# |
# |
|a Includes bibliographical references (p. 503-540) and index.
|
505 |
0 |
# |
|a Section 1. Organizational Security -- 1. Responsibilities and Liabilities with respect to catastrophes -- 2. The Complex New World of Information Security -- 3. Employee Surveillance Based on Free Text Detection of Keystroke Dynamics -- 4. E-Risk Insurance Product Design: A Copula Based Bayesian Belief Network Model -- 5. E-Commerce Security and Honesty-Credit -- 6. Towards a Scalable Role and Organization Based Access Control Model with Decentralized Security Administration -- 7. Enterprise Information System Security: A Life-Cycle Approach -- 8. An Alternative Model of Information Security Investment --
|
505 |
0 |
# |
|a Section 2. Privacy and Social Engineering -- 9. Avoiding Pitfalls in Policy-Based Privacy Management -- 10. Privacy and Banking in Australia -- 11. A Multistage Framework to Defend Against Phishing Attacks -- 12. A New Approach to Reducing Social Engineering Impact -- 13. Privacy-Enhancing Technologies -- 14. Social Engineering and its Countermeasures -- 15. Social Networking Site: Opportunities and Security Challenges --
|
505 |
0 |
# |
|a Section 3. Security Education and Awareness -- 16. Designing Antiphishing Education -- 17. Theories Used in Information Security Research: Survey and Agenda -- 18. Information Assurance and Security Curriculum Meeting the SIGITE Guidelines -- 19. Information Security Awareness -- 20. Creating a Security Education, Training, and Awareness Program -- 21. Information Security Within an E-Learning Environment -- 22. Research Notes on Emerging Areas of Conflict in Security --
|
505 |
0 |
# |
|a Section 4. Human and Interaction Issues -- 23. The Human Attack in Linguistic Steganography -- 24. Using Technology to Overcome the Password's Contradiction -- 25. Formal Analysis of Security in Interactive Systems -- 26. Internet Crime: How Vulnerable Are You? Do Gender, Social Influence and Education Play a Role in Vulnerability -- 27. Detecting Shill Bidding in Online English Auctions -- 28. Information Security at Large Public Displays -- 29. The Sense of Security and Trust -- Compilation of References -- About the Contributors -- Index.
|
506 |
# |
# |
|a Restricted to subscribers or individual electronic text purchasers.
|
520 |
3 |
# |
|a "This book offers insightful articles on the most salient contemporary issues of managing social and human aspects of information security"--Provided by publisher.
|
530 |
# |
# |
|a Also available in print.
|
538 |
# |
# |
|a Mode of access: World Wide Web.
|
650 |
# |
0 |
|a Computer security
|v Handbooks, manuals, etc.
|x Management
|
650 |
# |
0 |
|a Data protection
|v Handbooks, manuals, etc.
|x Management
|
650 |
# |
0 |
|a Computer crimes
|v Handbooks, manuals, etc.
|x Prevention
|
650 |
# |
0 |
|a Human-computer interaction
|v Handbooks, manuals, etc.
|
653 |
# |
# |
|a Digital convergence
|
653 |
# |
# |
|a Employee surveillance
|
653 |
# |
# |
|a Information availability and sharing
|
653 |
# |
# |
|a Information security
|
653 |
# |
# |
|a Information security culture
|
653 |
# |
# |
|a Password authentication
|
653 |
# |
# |
|a Privacy protection
|
653 |
# |
# |
|a Safety-critical information system
|
653 |
# |
# |
|a Security breaches
|
653 |
# |
# |
|a Security configuration
|
653 |
# |
# |
|a Security requirements elicitation
|
653 |
# |
# |
|a Software verification
|
700 |
1 |
# |
|a Gupta, Manish,
|d 1978-
|
700 |
1 |
# |
|a Sharman, Raj.
|
710 |
2 |
# |
|a IGI Global.
|
776 |
0 |
# |
|c (Original)
|w (DLC) 2008035140
|z 9781605661322
|z 1605661325
|
856 |
4 |
0 |
|u https://ezaccess.library.uitm.edu.my/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-132-2
|z View fulltext via EzAccess
|