Information Security and Ethics: Concepts, Methodologies, Tools, and Applications: Concepts, Methodologies, Tools, and ApplicationsNemati, Hamid Information Security and Ethics: Concepts, Methodologies, Tools, and Applicationsserves as the ultimate source on all theories and models associated with information privacy and safeguard practices to help anchor and guide the development of technologies, standards, and best practices to meet these challenges. Compiling over 250 chapters representing the work of 484 international experts in these fields, this commanding, six-volume collection examines a complete array of topics in this area, including authentication technologies, cyber crime, cryptographic tools, monitoring systems, forensic computing, and confidentiality applications and their relation to raising the level of security and ethical standards in technology-driven environments. Essential to the information technology collection of any library, Information Security and Ethics: Concepts, Methodologies, Tools, and Applications will serve the needs of researchers in a variety of related fields, including business, e-commerce, government, law enforcement, and many more. |
Contents
xxxv | |
xxxix | |
lxxvi | |
lxxviii | |
1 | |
16 | |
23 | |
62 | |
Privacy and Trust in AgentSupported Distributed Learning | 2012 |
Better Securing an Infrastructure for Telework | 2044 |
A Method of Assessing Information System Security Controls | 2059 |
Electronic Banking and Information Assurance Issues Survey and Synthesis | 2075 |
Security Privacy and Trust in Mobile Systems | 2095 |
Seamlessly Securing Web Services by a Signing Proxy | 2103 |
A TAM Analysis of an Alternative HighSecurity User Authentication Procedure | 2114 |
IT Security Governance and Centralized Security Controls | 2130 |
72 | |
89 | |
101 | |
109 | |
130 | |
Evolution of Information Hiding Technology | 144 |
Description of Policies Enriched by Semantics for Security Management | 155 |
Privacy and Security in ELearning1 | 174 |
Ethical Challenges for Information Systems Professionals | 191 |
Integrating Security and Software Engineering An Introduction | 200 |
Ethics of Data Mining | 211 |
PrivacyDangers and Protections | 218 |
Ethics of New Technologies | 225 |
Ethics and HCI | 231 |
The Central Problem in Cyber Ethics and How Stories Can Be Used to Address It | 238 |
Digital Watermarking An Introduction | 253 |
Signals of Trustworthiness in ECommerce Consumer Understanding of ThirdParty Assurance Seals | 272 |
Moral Foundations of Data Mining | 292 |
Privacy and Security in ELearning | 299 |
Telework Information Security | 316 |
Conducting Ethical Research Online Respect for Individuals Identities and the Ownership of Words | 324 |
A Unified Information Security Management Plan | 340 |
Information Security Management | 350 |
The Challenge of Privacy and Security and the Implementation of Health Knowledge Management Systems | 358 |
Would Be Pirates Webcasters Intellectual Property and Ethics | 380 |
CheckOff Password System COPS An Advancement in User Authentication Methods and Information Security | 402 |
The Game of Defense and Security | 419 |
Data Hiding in Document Images | 438 |
Ethics of Digital Government | 451 |
Digital Morality and Ethics | 457 |
Net Diplomacy | 465 |
Ethical Issues in Information Technology | 473 |
Protecting Ones Privacy Insight into the Views and Nature of the Early Adopters of Privacy Services | 481 |
The Desire for Privacy Insights into the Views and Nature of the Early Adopters of Privacy Services | 488 |
Security in ServiceOriented Architecture Issues Standards and Implementations | 496 |
Leadership Style Anonymity and the Discussion of an Ethical Issue in an Electronic Context | 513 |
An Overview of Electronic Attacks | 532 |
An Introduction in Digital Watermarking Applications Principles and Problems | 554 |
Digital Rights Management for EContent and ETechnologies | 570 |
EHealth Security and Privacy | 580 |
Privacy and Confidentiality Issues in Data Mining | 589 |
Development and Design Methodologies | 595 |
Evaluation of Computer Adaptive Testing Systems | 596 |
A Comparison of Authentication Authorization and Auditing in Windows and Linux | 613 |
PrivacyPreserving Data Mining Development and Directions | 627 |
A SEEP Security Enhanced Electronic Payment Protocol Design using 3BC ECC F2 m and HECC Algorithm | 639 |
A Methodology to Develop Secure Systems using Patterns | 654 |
An Adaptive Access Control Model for Web Services | 671 |
Integrating Security in the Development Process with UML | 704 |
Storage and Access Control Issues for XML Documents | 713 |
Taxonomies of User Authentication Methods in Computer Networks | 737 |
WLAN Security Management | 761 |
Architectures for Advanced Cryptographic Systems | 771 |
Web Services Enabled EMarket Access Control Model | 818 |
Security Laboratory Design and Implementation | 837 |
Chapter 214 Extending Security in Agile Software Development Methods | 845 |
Invisibility and the Ethics of Digitalization Designing so as not to Hurt Others | 859 |
A Methodology for Developing Trusted Information Systems The Security Requirements Analysis Phase | 872 |
Design Principles for Active Audio and Video Fingerprinting | 900 |
Modeling Method for Assessing Privacy Technologies | 912 |
Software Security Engineering Toward Unifying Software Engineering and Security Engineering | 927 |
Identifying Security Requirements Using the Security Quality Requirements Engineering SQUARE Method | 943 |
Do Information Security Policies Reduce the Incidence of Security Breaches An Exploratory Analysis | 964 |
Modelling Security and Trust with Secure Tropos | 981 |
Text Mining Names and Security | 1006 |
Framework for Secure Information Management in Critical Systems | 1012 |
Building an Online Security System with Web Services | 1027 |
Designing Secure Data Warehouses | 1048 |
Developing a Theory of Portable Public Key Infrastructure PORTABLEPKI for Mobile Business Security | 1062 |
Potential Security Issues in a PeertoPeer Network from a Database Perspective | 1070 |
Strategic Alliances of Information Technology Among Supply Chain Channel Members | 1080 |
Chinese Wall Security Policy Model Granular Computing on DAC Model | 1096 |
Tools and Technologies | 1107 |
IAIS A Methodology to Enable InterAgency Information Sharing in eGovernment | 1108 |
Network Robustness for Critical Infrastructure Networks | 1125 |
Secure Semantic Grids | 1145 |
From CCTV to Biometrics Through Mobile Surveillance | 1158 |
Robust Face Recognition for Data Mining | 1165 |
Securing an Electronic Legislature Using Threshold Signatures | 1176 |
Use of RFID In Supply Chain Data Processing | 1184 |
Digital SignatureBased Image Authentication | 1192 |
Digital Certificates and PublicKey Infrastructures | 1210 |
A Flexible Authorization Framework | 1236 |
A New PublicKey Algorithm for Watermarking of Digital Images | 1257 |
Protecting Privacy Using XML XACML and SAML | 1267 |
Multimedia Security and Digital Rights Management Technology | 1288 |
Merkle Tree Authentication in UDDI Registries | 1321 |
Current Network Security Systems | 1339 |
WLAN Security Management | 1349 |
Scalable Security and Accounting Services for ContentBased PublishSubscribe Systems | 1361 |
A MultimediaBased Threat Management and Information Security Framework | 1378 |
Metric Based Security Assessment | 1396 |
Multiplecasting in a Wired LAN Using CDMA Technique | 1416 |
Exposing the Wired Equivalent Privacy Protocol Weaknesses in Wireless Networks | 1426 |
Trust Models for Ubiquitous Mobile Systems | 1450 |
Access Control Specification in UML | 1456 |
Modelling Security Patterns Using NFR Analysis | 1476 |
Security and Trust in P2P Systems | 1488 |
Monitoring Technologies and Digital Governance | 1504 |
Integrating Access Policies into the Development Process of Hypermedia Web Systems | 1514 |
Kernelized Database Systems Security | 1531 |
High Assurance Products in IT Security | 1537 |
Protecting Data Through Perturbation Techniques The Impact on Knowledge Discovery in Databases | 1550 |
Deploying Honeynets | 1562 |
PeertoPeer Security Issues in Nomadic Networks | 1580 |
PrivacyPreserving Transactions Protocol Using Mobile Agents with Mutual Authenticatio | 1591 |
Herding 3000 Cats Enabling Continuous Real Estate Transaction Processing | 1603 |
Intrusion Detection Using Modern Techniques Integration of Genetic Algorithms and Rough Sets with Neural Nets | 1611 |
A National Information Infrastructure Model for Information Warfare Defence | 1626 |
Utilization and Application | 1638 |
Distributed Intrusion Detection Systems A Computational Intelligence Approa | 1639 |
Emerging Mobile Technology and Supply Chain Integration Using RFID to Streamline the Integrated Supply Chain | 1660 |
Trust and Security in Ambient Intelligence A Research Agenda for Europe | 1671 |
Law Cyber Crime and Digital Forensics Trailing Digital Suspects | 1681 |
ASKARI A Crime Text Mining Approach | 1701 |
Digital Watermarking for Multimedia Security Management | 1719 |
A Case Study of Effectively Implemented Information Systems Security Policy | 1727 |
A ServiceBased Approach for RBAC and MAC Security | 1741 |
Security in Health Information Systems | 1759 |
Mobile Commerce Security and Payment | 1766 |
Creating a PolicyAware Web Discretionary RuleBased Access for the World Wide Web | 1774 |
Intrusion Detection and Response | 1795 |
EBusiness Systems Security for Intelligent Enterprise | 1806 |
Security and Trust in Mobile Multimedia | 1812 |
Comparing the Security Architectures of Sun ONE and Microsoft NET | 1828 |
Secure Data Dissemination | 1839 |
Experiences from Using the CORAS Methodology to Analyze a Web Application | 1865 |
Smart Card Applications and Systems Market Trends and Impact on Other Technological Developments | 1884 |
RFID in Retail Supply Chain | 1923 |
Business Ethics and Technology in Turkey An Emerging Country at the Crossroad of Civilizations | 1931 |
Online Signature Recognition | 1947 |
Security Issues and Possible Countermeasures for a Mobile Agent Based MCommerce Application | 1956 |
Realized Applications of Positioning Technologies in Defense Intelligence | 1975 |
Computer Security and Risky Computing Practices A Rational Choice Perspective | 1994 |
Securing ELearning Systems A Case of Insider Cyber Attacks and Novice IT Management in a Small University | 2139 |
The Next Big RFID Application Correctly Steering Two Billion Bags a Year Through Todays LessThanFriendly Skies | 2149 |
PolicyBased Access Control for ContextAware Services over the Wireless Internet | 2163 |
Data and Application Security for Distributed Application Hosting Services | 2187 |
Information Privacy in a Surveillance State A Perspective from Thailand | 2220 |
An Integrated Security Verification and Security Solution Design TradeOff Analysis Approach | 2234 |
MPayment Solutions and MCommerce Fraud Management | 2259 |
Secure Agent for ECommerce Applications | 2278 |
A Case Study on a Security Maturity Assessment of a BusinesstoBusiness Electronic Commerce Organization | 2286 |
Trustworthy Web Services An ExperienceBased Model for Trustworthiness Evaluation | 2303 |
Perceptions of EndUsers on the Requirements in Personal Firewall Software An Exploratory Study | 2319 |
Determining the Intention to Use Biometric Devices An Application and Extension of the Technology Acceptance Model | 2335 |
Security System for Distributed Business Applications | 2356 |
Incident Preparedness and Response Developing a Security Policy | 2366 |
Applying Directory Services to Enhance Identification Authentication and Authorization for B2B Applications | 2388 |
Risk Factors to Retrieve Anomaly Intrusion Information and Profile User Behavior | 2407 |
Information Security for Legal Safety | 2422 |
Organizational and Social Implications | 2431 |
We Cannot Eat Data The Need for Computer Ethics to Address the Cultural and Ecological Impacts of Computing | 2432 |
Privacy and Property in the Global Datasphere | 2448 |
A Social Ontology for Integrating Security and Software Engineering | 2462 |
Computer Security in ELearning | 2492 |
Trust in Virtual Communities | 2500 |
Online Communities Democratic Ideals | 2505 |
Security and Privacy in Distance Education | 2516 |
Ethics and Privacy of Communications in the EPolis | 2524 |
A Process Data Warehouse for Tracing and Reuse of Engineering Design Processes | 2531 |
The Impact of SarbanesOxley SOX Act on Information Security Governance | 2545 |
Privacy Implications of Organizational Data Mining | 2561 |
Patents and Standards in the ICT Sector Are Submarine Patents a Substantive Problem or a Red Herring? | 2577 |
Gender Influences on Ethical Considerations in the IT Environment | 2615 |
Gender Differences in the Navigation of Electronic Worlds | 2634 |
Identity Management A Comprehensive Approach to Ensuring a Secure Network Infrastructure | 2641 |
Conducting Congruent Ethical Qualitative Research in InternetMediated Research Environments | 2650 |
Electronic Banking and Information Assurance Issues Survey and Synthesis | 2666 |
Model Driven Security for InterOrganizational Workflows in EGovernment | 2686 |
Entrepreneur Behaviors on ECommerce Security | 2704 |
Ethics of Deception in Virtual Communities | 2717 |
Information Security Policies in Large Organisations The Development of a Conceptual Framework to Explore Their Impact | 2722 |
IT Security Policy in Public Organizations | 2739 |
Interactions among Thai Culture ICT and IT Ethics | 2750 |
HIPAA Privacy and Security in Health Care Networks | 2767 |
Communication Security Technologies in Smart Organizations | 2781 |
The Social Contract Revised Obligation and Responsibility in the Information Society | 2797 |
Examining User Perceptions of ThirdParty Organization Credibility and Trust in an ERetailer | 2814 |
Repeated Use of EGov Web Sites A Satisfaction and Confidentiality Perspective | 2830 |
Information Security Risk Analysis A Pedagogic Model Based on a Teaching Hospital | 2849 |
Authorization Service for Web Services and its Application in a Healthcare Domain | 2865 |
Secure Agent Roaming for Mobile Business | 2892 |
Social Issues of Trust and Digital Government | 2905 |
Managerial Impact | 2914 |
Online Information Privacy and its Implications for EEntrepreneurship and EBusiness Ethics | 2915 |
EBusiness Systems Security for Intelligent Enterprise | 2931 |
Resistance A Medium for the Successful Implementation of Technological Innovation | 2949 |
A Model of Information Security Governance for EBusiness | 2958 |
Implementing IT Security for Small and Medium Enterprises | 2970 |
Workarounds and Security | 2986 |
PolicyBased Management of Web and Information System Security An Emerging Technology | 2991 |
Exploring the Behavioral Dimension of ClientServer Technology Implementation An Empirical Investigation | 3006 |
A Security Blueprint for EBusiness Applications A Crime Text Mining Approach | 3020 |
Integration of Business Event and Rule Management with the Web Services Model | 3031 |
Privacy and Security in the Age of Electronic Customer Relationship Management | 3045 |
Malware and Antivirus Deployment for Enterprise Security | 3067 |
Critical Issues | 3083 |
Computer Ethics Constitutive and Consequential Morality | 3084 |
Identity Theft and EFraud as Critical CRM Concerns | 3094 |
Web Accessibility for Users with Disabilities A Multifaceted Ethical Analysis | 3112 |
Trust in ETechnologies | 3122 |
Password Security Issues on an ECommerce Site | 3133 |
MAMA on the Web Ethical Considerations for Our Networked World | 3142 |
What is the Social Responsibility in the Information Age? Maximising Profits? | 3157 |
Responsibility for Information Assurance and Privacy A Problem of Individual Ethics? | 3170 |
Intellectual Property Rights Resources Allocation and Ethical Usefulness | 3188 |
Arguing Satisfaction of Security Requirements | 3199 |
Negotiating Online Privacy Rights | 3222 |
Integrity and Security in the ECentury | 3229 |
Simulating ComplexityBased Ethics for Crucial Decision Making in Counter Terrorism | 3250 |
Moral Psychology and Information Ethics Psychological Distance and the Components of Moral Behavior in a Digital World | 3269 |
Issues on Image Authentication | 3282 |
Data Confidentiality on the Semantic Web Is There an Inference Problem? | 3309 |
Blurring the Boundaries Ethical Considerations for Online Research Using Synchronous CMC Forums | 3321 |
Computing Ethics Intercultural Comparisons | 3340 |
3352 | |
A Psychoanalytic Perspective of Internet Abuse | 3366 |
Protection of Minors from Harmful Internet Content | 3375 |
A Critical Systems View of PowerEthics Interactions in Information Systems Evaluation | 3387 |
Information Quality Critical Ingredient for National Security | 3404 |
Insights from Y2K and 911 for Enhancing IT Security | 3419 |
Gender Differences in Ethics Perceptions in Information Technology | 3433 |
Cryptography Deciphering Its Progress | 3442 |
PrivacyPreserving Data Mining and the Need for Confluence of Research and Practice | 3451 |
The Existential Significance of the Digital Divide for Americas Historically Underserved Populations | 3470 |
Ethics in Internet Ethnography | 3484 |
The Critical Role of Digital Rights Management Processes in the Context of the Digital Media Management Value Chain | 3499 |
Peering into Online Bedroom Windows Considering the Ethical Implications of Investigating Internet Relationships and Sexuality | 3510 |
Analyzing the Influence of Web Site Design Parameters on Web Site Usability | 3525 |
Biometrics A Critical Consideration in Information Security Management | 3542 |
Online Privacy Consumer Concerns and Technological Competence | 3550 |
Security Issues in Distributed Transaction Processing Systems | 3572 |
Hacker Wars ECollaboration by Vandals and Warriors | 3577 |
3590 | |
Ethics of Parasitic Computing Fair Use or Abuse of TCPIP Over the Internet | 3600 |
Ethical Dilemmas in Online Research | 3612 |
Security Vulnerabilities and Exposures in Internet Systems and Services | 3620 |
Security in Pervasive Computing | 3627 |
Analysis and Justification of Privacy from a Buddhist Perspective | 3644 |
3659 | |
Culture and Technology A MutualShaping Approach | 3676 |
Emerging Trends | 3690 |
Security Engineering for Ambient Intelligence A Manifesto | 3691 |
Enforcing Privacy on the Semantic Web | 3713 |
Strategic Importance of Security Standards | 3728 |
Computer Security in Electronic Government A StateLocal Education Information System | 3739 |
Teaching Gender Inclusive Computer Ethics | 3758 |
A Secure Authentication Infrastructure for Mobile Users | 3765 |
3784 | |
Copyright Protection in Virtual Communities through Digital Watermarking | 3788 |
Analyzing the Privacy of a Vickrey Auction Mechanism | 3794 |
The Ethics of Web Design Ensuring Access for Everyone | 3805 |
3824 | |
3829 | |
Radio Frequency Identification as a Challenge to Information Secuirty and Privacy | 3848 |
Intellectual Property Rightsor Rights to the Immaterialin Digitally Distributable Media Gone All Wrong | 3856 |
Computer Security and Risky Computing Practices A Rational Choice Perspective | 3866 |
Information Technology as a Target and Shield in the Post 911 Enviornment | 3887 |
Digital Watermarking for Protection of Intellectual Property | 3902 |
Tracing Cyber Crimes with a PrivacyEnabled Forensic Profiling System | 3938 |
The Ethics of Conducting EMail Surveys | 3953 |
Face Recognition Technology A Biometric Solution to Security Problems | 3968 |
A Model for Monitoring and Enforcing Online Auction Ethics | 4000 |
Malware An Evolving Threat | 4014 |
4039 | |