Techniques and applications for advanced information privacy and security emerging organizational, ethical, and human issues /

"This book provides a thorough understanding of issues and concerns in information technology security"--Provided by publisher.

Bibliographic Details
Corporate Author: IGI Global.
Other Authors: Nemati, Hamid R., 1958-
Format: Electronic
Language:English
Published: Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), c2009.
Subjects:
Online Access:View fulltext via EzAccess
LEADER 04696nam a2200625 a 4500
001 29911
003 IGIG
005 20100824171214.0
006 m e d
007 cr bn||||m|||a
008 100726s2009 paua fsb 000 0 eng d
010 # # |z 2008051169 
020 # # |a 9781605662114 (ebook) 
020 # # |a 1605662119 (ebook) 
020 # # |z 1605662100; (hardcover) 
020 # # |z 9781605662107 (hardcover) 
020 # # |z 9781616924997 (pbk.) 
024 7 # |a 10.4018/978-1-60566-210-7  |2 doi 
035 # # |a (CaBNVSL)gtp00543132 
035 # # |a (OCoLC)707611846 
040 # # |a CaBNVSL  |c CaBNVSL  |d CaBNVSL 
050 # 4 |a HF5548.37  |b .T43 2009e 
082 0 4 |a 658.4/78  |2 22 
245 0 0 |a Techniques and applications for advanced information privacy and security  |b emerging organizational, ethical, and human issues /  |c [edited by] Hamid R. Nemati.  |h [electronic resource] : 
260 # # |a Hershey, Pa. :  |b IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),  |c c2009. 
300 # # |a electronic texts (xxxiv, 378 p. : ill.) :  |b digital files. 
504 # # |a Includes bibliographical references. 
505 0 # |a 1. A rule-based and game-theoretic approach to on-line credit card fraud detection / Vishal Vatsa, Shamik Sural, A.K. Majumdar -- 2. Email worm detection using data mining / Mohammad Masud, Latifur Khan, Bhavani Thuraisingham -- 3. Information systems security / Hamid Jahankhani, Shantha Fernando, Mathews Nkhoma -- 4. Rootkits and what we know / Kirk Arnett ... [et al.] -- 5. Privacy-preserving data mining and the need for confluence of research and practice / Lixin Fu, Hamid Nemati, Fereidoon Sadri -- 6. A dimensionality reduction-based transformation to support business collaboration / Stanley Oliveira, Osmar Zaiane -- 7. Privacy-preserving transactions protocol using mobile agents with mutual authentication / Song Han ... [et al.] -- 8. Dynamic control mechanisms for user privacy enhancement / Amr Ali Eldin -- 9. A projection of the future effects of quantum computation on information privacy / Geoff Skinner, Elizabeth Chang -- 10. On the design of an authentication system based on keystroke dynamics using a predefined input text / Dieter Bartmann, Idir Bakdi, Michael Achatz -- 11. Defeating active phishing attacks for Web-based transactions / Xin Luo, Teik Guan Tan -- 12. A content-based watermarking scheme for image authentication using discrete wavelet transform inter-coefficient relations / Latha Parameswaran, K Anbumani -- 13. Privacy and security in the age of electronic customer relationship management / Nicholas Romano, Jerry Fjermestad -- 14. The impact of privacy Risk Harm (RH) and Risk Likelihood (RL) on IT acceptance / Joseph Cazier, E. Wilson, B. Medlin -- 15. Ignorance is bliss / Thomas Van Dyke -- 16. Trustworthy Web services / Stephen Yang ... [et al.] -- 17. Administering the Semantic Web / Bhavani Thuraisingham, Natasha Tsybulnik, Ashraful Alam -- 18. An ontology of information security / Almut Herzog, Nahid Shahmehri, Claudiu Duma -- 19. Information security effectiveness / Kenneth Knapp ... [et al.] -- 20. A simulation model of IS security / Norman Pendegraft, Mark Rounds. 
506 # # |a Restricted to subscribers or individual electronic text purchasers. 
520 3 # |a "This book provides a thorough understanding of issues and concerns in information technology security"--Provided by publisher. 
530 # # |a Also available in print. 
538 # # |a Mode of access: World Wide Web. 
588 # # |a Title from PDF t.p. (viewed on July 27, 2010). 
650 # 0 |a Electronic commerce  |x Security measures. 
650 # 0 |a Information technology  |x Security measures. 
650 # 0 |a Computer security. 
650 # 0 |a Data protection. 
653 # # |a Authentication system design 
653 # # |a Dynamic control mechanisms 
653 # # |a Effects of quantum computation on information privacy 
653 # # |a Evaluating information security and privacy 
653 # # |a Image authentication 
653 # # |a Information security and privacy 
653 # # |a Information security effectiveness 
653 # # |a Information systems security 
653 # # |a Privacy preservation and techniques 
653 # # |a Privacy-preserving clustering 
653 # # |a Privacy-preserving transactions protocol 
653 # # |a Security and privacy management 
653 # # |a Web security and privacy issues and technologies 
700 1 # |a Nemati, Hamid R.,  |d 1958- 
710 2 # |a IGI Global. 
776 0 # |c (Original)  |w (DLC) 2008051169  |z 9781605662107  |z 1605662100 
856 4 0 |u https://ezaccess.library.uitm.edu.my/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-210-7  |z View fulltext via EzAccess