Information Security and Ethics: Concepts, Methodologies, Tools, and Applications: Concepts, Methodologies, Tools, and Applications

Front Cover
Nemati, Hamid
IGI Global, Sep 30, 2007 - Education - 4478 pages

Information Security and Ethics: Concepts, Methodologies, Tools, and Applicationsserves as the ultimate source on all theories and models associated with information privacy and safeguard practices to help anchor and guide the development of technologies, standards, and best practices to meet these challenges.

Compiling over 250 chapters representing the work of 484 international experts in these fields, this commanding, six-volume collection examines a complete array of topics in this area, including authentication technologies, cyber crime, cryptographic tools, monitoring systems, forensic computing, and confidentiality applications and their relation to raising the level of security and ethical standards in technology-driven environments. Essential to the information technology collection of any library, Information Security and Ethics: Concepts, Methodologies, Tools, and Applications will serve the needs of researchers in a variety of related fields, including business, e-commerce, government, law enforcement, and many more.

 

Contents

Privacy and Trust in AgentSupported Distributed Learning
2012
Better Securing an Infrastructure for Telework
2044
A Method of Assessing Information System Security Controls
2059
Electronic Banking and Information Assurance Issues Survey and Synthesis
2075
Security Privacy and Trust in Mobile Systems
2095
Seamlessly Securing Web Services by a Signing Proxy
2103
A TAM Analysis of an Alternative HighSecurity User Authentication Procedure
2114
IT Security Governance and Centralized Security Controls
2130

Administering the Semantic Web Confidentiality Privacy and Trust Management
72
Human and Social Perspectives in Information Technology An Examination of Fraud on the Internet
89
Codes of Ethics in Virtual Communities
101
Digital Audio Watermarking
109
Secure Authentication Process for High Sensitive Data EServices A Roadmap
130
Evolution of Information Hiding Technology
144
Description of Policies Enriched by Semantics for Security Management
155
Privacy and Security in ELearning1
174
Ethical Challenges for Information Systems Professionals
191
Integrating Security and Software Engineering An Introduction
200
Ethics of Data Mining
211
PrivacyDangers and Protections
218
Ethics of New Technologies
225
Ethics and HCI
231
The Central Problem in Cyber Ethics and How Stories Can Be Used to Address It
238
Digital Watermarking An Introduction
253
Signals of Trustworthiness in ECommerce Consumer Understanding of ThirdParty Assurance Seals
272
Moral Foundations of Data Mining
292
Privacy and Security in ELearning
299
Telework Information Security
316
Conducting Ethical Research Online Respect for Individuals Identities and the Ownership of Words
324
A Unified Information Security Management Plan
340
Information Security Management
350
The Challenge of Privacy and Security and the Implementation of Health Knowledge Management Systems
358
Would Be Pirates Webcasters Intellectual Property and Ethics
380
CheckOff Password System COPS An Advancement in User Authentication Methods and Information Security
402
The Game of Defense and Security
419
Data Hiding in Document Images
438
Ethics of Digital Government
451
Digital Morality and Ethics
457
Net Diplomacy
465
Ethical Issues in Information Technology
473
Protecting Ones Privacy Insight into the Views and Nature of the Early Adopters of Privacy Services
481
The Desire for Privacy Insights into the Views and Nature of the Early Adopters of Privacy Services
488
Security in ServiceOriented Architecture Issues Standards and Implementations
496
Leadership Style Anonymity and the Discussion of an Ethical Issue in an Electronic Context
513
An Overview of Electronic Attacks
532
An Introduction in Digital Watermarking Applications Principles and Problems
554
Digital Rights Management for EContent and ETechnologies
570
EHealth Security and Privacy
580
Privacy and Confidentiality Issues in Data Mining
589
Development and Design Methodologies
595
Evaluation of Computer Adaptive Testing Systems
596
A Comparison of Authentication Authorization and Auditing in Windows and Linux
613
PrivacyPreserving Data Mining Development and Directions
627
A SEEP Security Enhanced Electronic Payment Protocol Design using 3BC ECC F2 m and HECC Algorithm
639
A Methodology to Develop Secure Systems using Patterns
654
An Adaptive Access Control Model for Web Services
671
Integrating Security in the Development Process with UML
704
Storage and Access Control Issues for XML Documents
713
Taxonomies of User Authentication Methods in Computer Networks
737
WLAN Security Management
761
Architectures for Advanced Cryptographic Systems
771
Web Services Enabled EMarket Access Control Model
818
Security Laboratory Design and Implementation
837
Chapter 214 Extending Security in Agile Software Development Methods
845
Invisibility and the Ethics of Digitalization Designing so as not to Hurt Others
859
A Methodology for Developing Trusted Information Systems The Security Requirements Analysis Phase
872
Design Principles for Active Audio and Video Fingerprinting
900
Modeling Method for Assessing Privacy Technologies
912
Software Security Engineering Toward Unifying Software Engineering and Security Engineering
927
Identifying Security Requirements Using the Security Quality Requirements Engineering SQUARE Method
943
Do Information Security Policies Reduce the Incidence of Security Breaches An Exploratory Analysis
964
Modelling Security and Trust with Secure Tropos
981
Text Mining Names and Security
1006
Framework for Secure Information Management in Critical Systems
1012
Building an Online Security System with Web Services
1027
Designing Secure Data Warehouses
1048
Developing a Theory of Portable Public Key Infrastructure PORTABLEPKI for Mobile Business Security
1062
Potential Security Issues in a PeertoPeer Network from a Database Perspective
1070
Strategic Alliances of Information Technology Among Supply Chain Channel Members
1080
Chinese Wall Security Policy Model Granular Computing on DAC Model
1096
Tools and Technologies
1107
IAIS A Methodology to Enable InterAgency Information Sharing in eGovernment
1108
Network Robustness for Critical Infrastructure Networks
1125
Secure Semantic Grids
1145
From CCTV to Biometrics Through Mobile Surveillance
1158
Robust Face Recognition for Data Mining
1165
Securing an Electronic Legislature Using Threshold Signatures
1176
Use of RFID In Supply Chain Data Processing
1184
Digital SignatureBased Image Authentication
1192
Digital Certificates and PublicKey Infrastructures
1210
A Flexible Authorization Framework
1236
A New PublicKey Algorithm for Watermarking of Digital Images
1257
Protecting Privacy Using XML XACML and SAML
1267
Multimedia Security and Digital Rights Management Technology
1288
Merkle Tree Authentication in UDDI Registries
1321
Current Network Security Systems
1339
WLAN Security Management
1349
Scalable Security and Accounting Services for ContentBased PublishSubscribe Systems
1361
A MultimediaBased Threat Management and Information Security Framework
1378
Metric Based Security Assessment
1396
Multiplecasting in a Wired LAN Using CDMA Technique
1416
Exposing the Wired Equivalent Privacy Protocol Weaknesses in Wireless Networks
1426
Trust Models for Ubiquitous Mobile Systems
1450
Access Control Specification in UML
1456
Modelling Security Patterns Using NFR Analysis
1476
Security and Trust in P2P Systems
1488
Monitoring Technologies and Digital Governance
1504
Integrating Access Policies into the Development Process of Hypermedia Web Systems
1514
Kernelized Database Systems Security
1531
High Assurance Products in IT Security
1537
Protecting Data Through Perturbation Techniques The Impact on Knowledge Discovery in Databases
1550
Deploying Honeynets
1562
PeertoPeer Security Issues in Nomadic Networks
1580
PrivacyPreserving Transactions Protocol Using Mobile Agents with Mutual Authenticatio
1591
Herding 3000 Cats Enabling Continuous Real Estate Transaction Processing
1603
Intrusion Detection Using Modern Techniques Integration of Genetic Algorithms and Rough Sets with Neural Nets
1611
A National Information Infrastructure Model for Information Warfare Defence
1626
Utilization and Application
1638
Distributed Intrusion Detection Systems A Computational Intelligence Approa
1639
Emerging Mobile Technology and Supply Chain Integration Using RFID to Streamline the Integrated Supply Chain
1660
Trust and Security in Ambient Intelligence A Research Agenda for Europe
1671
Law Cyber Crime and Digital Forensics Trailing Digital Suspects
1681
ASKARI A Crime Text Mining Approach
1701
Digital Watermarking for Multimedia Security Management
1719
A Case Study of Effectively Implemented Information Systems Security Policy
1727
A ServiceBased Approach for RBAC and MAC Security
1741
Security in Health Information Systems
1759
Mobile Commerce Security and Payment
1766
Creating a PolicyAware Web Discretionary RuleBased Access for the World Wide Web
1774
Intrusion Detection and Response
1795
EBusiness Systems Security for Intelligent Enterprise
1806
Security and Trust in Mobile Multimedia
1812
Comparing the Security Architectures of Sun ONE and Microsoft NET
1828
Secure Data Dissemination
1839
Experiences from Using the CORAS Methodology to Analyze a Web Application
1865
Smart Card Applications and Systems Market Trends and Impact on Other Technological Developments
1884
RFID in Retail Supply Chain
1923
Business Ethics and Technology in Turkey An Emerging Country at the Crossroad of Civilizations
1931
Online Signature Recognition
1947
Security Issues and Possible Countermeasures for a Mobile Agent Based MCommerce Application
1956
Realized Applications of Positioning Technologies in Defense Intelligence
1975
Computer Security and Risky Computing Practices A Rational Choice Perspective
1994
Securing ELearning Systems A Case of Insider Cyber Attacks and Novice IT Management in a Small University
2139
The Next Big RFID Application Correctly Steering Two Billion Bags a Year Through Todays LessThanFriendly Skies
2149
PolicyBased Access Control for ContextAware Services over the Wireless Internet
2163
Data and Application Security for Distributed Application Hosting Services
2187
Information Privacy in a Surveillance State A Perspective from Thailand
2220
An Integrated Security Verification and Security Solution Design TradeOff Analysis Approach
2234
MPayment Solutions and MCommerce Fraud Management
2259
Secure Agent for ECommerce Applications
2278
A Case Study on a Security Maturity Assessment of a BusinesstoBusiness Electronic Commerce Organization
2286
Trustworthy Web Services An ExperienceBased Model for Trustworthiness Evaluation
2303
Perceptions of EndUsers on the Requirements in Personal Firewall Software An Exploratory Study
2319
Determining the Intention to Use Biometric Devices An Application and Extension of the Technology Acceptance Model
2335
Security System for Distributed Business Applications
2356
Incident Preparedness and Response Developing a Security Policy
2366
Applying Directory Services to Enhance Identification Authentication and Authorization for B2B Applications
2388
Risk Factors to Retrieve Anomaly Intrusion Information and Profile User Behavior
2407
Information Security for Legal Safety
2422
Organizational and Social Implications
2431
We Cannot Eat Data The Need for Computer Ethics to Address the Cultural and Ecological Impacts of Computing
2432
Privacy and Property in the Global Datasphere
2448
A Social Ontology for Integrating Security and Software Engineering
2462
Computer Security in ELearning
2492
Trust in Virtual Communities
2500
Online Communities Democratic Ideals
2505
Security and Privacy in Distance Education
2516
Ethics and Privacy of Communications in the EPolis
2524
A Process Data Warehouse for Tracing and Reuse of Engineering Design Processes
2531
The Impact of SarbanesOxley SOX Act on Information Security Governance
2545
Privacy Implications of Organizational Data Mining
2561
Patents and Standards in the ICT Sector Are Submarine Patents a Substantive Problem or a Red Herring?
2577
Gender Influences on Ethical Considerations in the IT Environment
2615
Gender Differences in the Navigation of Electronic Worlds
2634
Identity Management A Comprehensive Approach to Ensuring a Secure Network Infrastructure
2641
Conducting Congruent Ethical Qualitative Research in InternetMediated Research Environments
2650
Electronic Banking and Information Assurance Issues Survey and Synthesis
2666
Model Driven Security for InterOrganizational Workflows in EGovernment
2686
Entrepreneur Behaviors on ECommerce Security
2704
Ethics of Deception in Virtual Communities
2717
Information Security Policies in Large Organisations The Development of a Conceptual Framework to Explore Their Impact
2722
IT Security Policy in Public Organizations
2739
Interactions among Thai Culture ICT and IT Ethics
2750
HIPAA Privacy and Security in Health Care Networks
2767
Communication Security Technologies in Smart Organizations
2781
The Social Contract Revised Obligation and Responsibility in the Information Society
2797
Examining User Perceptions of ThirdParty Organization Credibility and Trust in an ERetailer
2814
Repeated Use of EGov Web Sites A Satisfaction and Confidentiality Perspective
2830
Information Security Risk Analysis A Pedagogic Model Based on a Teaching Hospital
2849
Authorization Service for Web Services and its Application in a Healthcare Domain
2865
Secure Agent Roaming for Mobile Business
2892
Social Issues of Trust and Digital Government
2905
Managerial Impact
2914
Online Information Privacy and its Implications for EEntrepreneurship and EBusiness Ethics
2915
EBusiness Systems Security for Intelligent Enterprise
2931
Resistance A Medium for the Successful Implementation of Technological Innovation
2949
A Model of Information Security Governance for EBusiness
2958
Implementing IT Security for Small and Medium Enterprises
2970
Workarounds and Security
2986
PolicyBased Management of Web and Information System Security An Emerging Technology
2991
Exploring the Behavioral Dimension of ClientServer Technology Implementation An Empirical Investigation
3006
A Security Blueprint for EBusiness Applications A Crime Text Mining Approach
3020
Integration of Business Event and Rule Management with the Web Services Model
3031
Privacy and Security in the Age of Electronic Customer Relationship Management
3045
Malware and Antivirus Deployment for Enterprise Security
3067
Critical Issues
3083
Computer Ethics Constitutive and Consequential Morality
3084
Identity Theft and EFraud as Critical CRM Concerns
3094
Web Accessibility for Users with Disabilities A Multifaceted Ethical Analysis
3112
Trust in ETechnologies
3122
Password Security Issues on an ECommerce Site
3133
MAMA on the Web Ethical Considerations for Our Networked World
3142
What is the Social Responsibility in the Information Age? Maximising Profits?
3157
Responsibility for Information Assurance and Privacy A Problem of Individual Ethics?
3170
Intellectual Property Rights Resources Allocation and Ethical Usefulness
3188
Arguing Satisfaction of Security Requirements
3199
Negotiating Online Privacy Rights
3222
Integrity and Security in the ECentury
3229
Simulating ComplexityBased Ethics for Crucial Decision Making in Counter Terrorism
3250
Moral Psychology and Information Ethics Psychological Distance and the Components of Moral Behavior in a Digital World
3269
Issues on Image Authentication
3282
Data Confidentiality on the Semantic Web Is There an Inference Problem?
3309
Blurring the Boundaries Ethical Considerations for Online Research Using Synchronous CMC Forums
3321
Computing Ethics Intercultural Comparisons
3340
Does Public Access Imply Ubiquitous or Immediate? Issues Surrounding Public Documents Online
3352
A Psychoanalytic Perspective of Internet Abuse
3366
Protection of Minors from Harmful Internet Content
3375
A Critical Systems View of PowerEthics Interactions in Information Systems Evaluation
3387
Information Quality Critical Ingredient for National Security
3404
Insights from Y2K and 911 for Enhancing IT Security
3419
Gender Differences in Ethics Perceptions in Information Technology
3433
Cryptography Deciphering Its Progress
3442
PrivacyPreserving Data Mining and the Need for Confluence of Research and Practice
3451
The Existential Significance of the Digital Divide for Americas Historically Underserved Populations
3470
Ethics in Internet Ethnography
3484
The Critical Role of Digital Rights Management Processes in the Context of the Digital Media Management Value Chain
3499
Peering into Online Bedroom Windows Considering the Ethical Implications of Investigating Internet Relationships and Sexuality
3510
Analyzing the Influence of Web Site Design Parameters on Web Site Usability
3525
Biometrics A Critical Consideration in Information Security Management
3542
Online Privacy Consumer Concerns and Technological Competence
3550
Security Issues in Distributed Transaction Processing Systems
3572
Hacker Wars ECollaboration by Vandals and Warriors
3577
Does Protecting Databases Using Perturbation Techniques Impact Knowledge Discovery?
3590
Ethics of Parasitic Computing Fair Use or Abuse of TCPIP Over the Internet
3600
Ethical Dilemmas in Online Research
3612
Security Vulnerabilities and Exposures in Internet Systems and Services
3620
Security in Pervasive Computing
3627
Analysis and Justification of Privacy from a Buddhist Perspective
3644
Up in Smoke Rebuilding after an IT Disaster
3659
Culture and Technology A MutualShaping Approach
3676
Emerging Trends
3690
Security Engineering for Ambient Intelligence A Manifesto
3691
Enforcing Privacy on the Semantic Web
3713
Strategic Importance of Security Standards
3728
Computer Security in Electronic Government A StateLocal Education Information System
3739
Teaching Gender Inclusive Computer Ethics
3758
A Secure Authentication Infrastructure for Mobile Users
3765
Inegrating Security and Software Engineering Future Vision and Challenges
3784
Copyright Protection in Virtual Communities through Digital Watermarking
3788
Analyzing the Privacy of a Vickrey Auction Mechanism
3794
The Ethics of Web Design Ensuring Access for Everyone
3805
Addressing the Central Problem in Cyber Ethics through Stories
3824
The Moral Status of Information and Information Technologies A Relational Theory of Moral Status
3829
Radio Frequency Identification as a Challenge to Information Secuirty and Privacy
3848
Intellectual Property Rightsor Rights to the Immaterialin Digitally Distributable Media Gone All Wrong
3856
Computer Security and Risky Computing Practices A Rational Choice Perspective
3866
Information Technology as a Target and Shield in the Post 911 Enviornment
3887
Digital Watermarking for Protection of Intellectual Property
3902
Tracing Cyber Crimes with a PrivacyEnabled Forensic Profiling System
3938
The Ethics of Conducting EMail Surveys
3953
Face Recognition Technology A Biometric Solution to Security Problems
3968
A Model for Monitoring and Enforcing Online Auction Ethics
4000
Malware An Evolving Threat
4014
Index
4039
Copyright

Other editions - View all

Common terms and phrases

About the author (2007)

Hamid Nemati is an associate professor of information systems in the Department of Information Systems and Operations Management at the University of North Carolina at Greensboro. He holds a doctorate from the University of Georgia and a Master of Business Administration from the University of Massachusetts. Before coming to UNCG, he was on the faculty of J. Mack Robinson College of Business Administration at Georgia State University. He has extensive professional experience in various consulting, business intelligence, and analyst positions and has consulted for a number of major organizations. His research specialization is in the areas of decision support systems, data warehousing, data mining, knowledge management, and information privacy and security. He has presented numerous research and scholarly papers nationally and internationally. His articles have appeared in a number of premier professional and scholarly journals. [Editor]

Bibliographic information