Handbook of research on social and organizational liabilities in information security
"This book offers insightful articles on the most salient contemporary issues of managing social and human aspects of information security"--Provided by publisher.
Corporate Author: | |
---|---|
Other Authors: | , |
Format: | Electronic |
Language: | English |
Published: |
Hershey, Pa. :
IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),
c2009.
|
Subjects: | |
Online Access: | View fulltext via EzAccess |
Table of Contents:
- Section 1. Organizational Security
- 1. Responsibilities and Liabilities with respect to catastrophes
- 2. The Complex New World of Information Security
- 3. Employee Surveillance Based on Free Text Detection of Keystroke Dynamics
- 4. E-Risk Insurance Product Design: A Copula Based Bayesian Belief Network Model
- 5. E-Commerce Security and Honesty-Credit
- 6. Towards a Scalable Role and Organization Based Access Control Model with Decentralized Security Administration
- 7. Enterprise Information System Security: A Life-Cycle Approach
- 8. An Alternative Model of Information Security Investment
- Section 2. Privacy and Social Engineering
- 9. Avoiding Pitfalls in Policy-Based Privacy Management
- 10. Privacy and Banking in Australia
- 11. A Multistage Framework to Defend Against Phishing Attacks
- 12. A New Approach to Reducing Social Engineering Impact
- 13. Privacy-Enhancing Technologies
- 14. Social Engineering and its Countermeasures
- 15. Social Networking Site: Opportunities and Security Challenges
- Section 3. Security Education and Awareness
- 16. Designing Antiphishing Education
- 17. Theories Used in Information Security Research: Survey and Agenda
- 18. Information Assurance and Security Curriculum Meeting the SIGITE Guidelines
- 19. Information Security Awareness
- 20. Creating a Security Education, Training, and Awareness Program
- 21. Information Security Within an E-Learning Environment
- 22. Research Notes on Emerging Areas of Conflict in Security
- Section 4. Human and Interaction Issues
- 23. The Human Attack in Linguistic Steganography
- 24. Using Technology to Overcome the Password's Contradiction
- 25. Formal Analysis of Security in Interactive Systems
- 26. Internet Crime: How Vulnerable Are You? Do Gender, Social Influence and Education Play a Role in Vulnerability
- 27. Detecting Shill Bidding in Online English Auctions
- 28. Information Security at Large Public Displays
- 29. The Sense of Security and Trust
- Compilation of References
- About the Contributors
- Index.