Analyzing Security, Trust, and Crime in the Digital World

Analyzing Security, Trust, and Crime in the Digital World

Hamid R. Nemati (The University of North Carolina at Greensboro, USA)
Indexed In: SCOPUS View 1 More Indices
Release Date: December, 2013|Copyright: © 2014 |Pages: 281|DOI: 10.4018/978-1-4666-4856-2
ISBN13: 9781466648562|ISBN10: 1466648562|EISBN13: 9781466648579
Hardcover:
Available
$195.00
TOTAL SAVINGS: $195.00
Benefits
  • Free shipping on orders $395+
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • 20% discount on 5+ titles*
E-Book:
(Multi-User License)
Available
$195.00
TOTAL SAVINGS: $195.00
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
  • 20% discount on 5+ titles*
Hardcover +
E-Book:
(Multi-User License)
Available
$235.00
TOTAL SAVINGS: $235.00
Benefits
  • Free shipping on orders $395+
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
  • 20% discount on 5+ titles*
OnDemand:
(Individual Chapters)
Available
$37.50
TOTAL SAVINGS: $37.50
Benefits
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
  • 20% discount on 5+ titles*

Description

In the digital era, information is the most valuable resource, and protecting one’s assets is a constant struggle for both individuals and organizations.

Analyzing Security, Trust, and Crime in the Digital World explores techniques and technologies used to secure data and prevent intrusion in virtual environments. Within these pages, computer scientists, programmers, engineers, and practitioners will find meaningful research on intrusion detection and authentication techniques in order to further defend their own systems and protect the information therein.

Topics Covered

The many academic areas covered in this publication include, but are not limited to:

  • Cyber Crime
  • Data Security
  • Information Privacy
  • Intrusion Detection Systems
  • Network Security
  • Security Technologies
  • Trust Management
  • User Authentication

Reviews and Testimonials

Scholars of business, information, and computer science set out a new approach to algorithm-based fault tolerance for high performance computing systems. Among their topics are methods for determining the investment in information technology security, authenticity in online knowledge sharing, information privacy concerns and workplace surveillance, control mechanisms of identity theft and its integrative impact on consumers' purchase intention in electronic commerce, and technology-related risks in virtual and traditional information systems projects.

– ProtoView Book Abstracts (formerly Book News, Inc.)

Table of Contents and List of Contributors

Search this Book:
Reset

Author(s)/Editor(s) Biography

Dr. Hamid Nemati is an Associate Professor of Information Systems at the Information Systems and Operations Management Department of The University of North Carolina at Greensboro. He holds a doctorate from the University of Georgia and a Master of Business Administration from The University of Massachusetts. Before coming to UNCG, he was on the faculty of J. Mack Robinson College of Business Administration at Georgia State University. He also has extensive professional experience as a consultant with a number of major corporations. Dr. Nemati is the Editor-in-Chief of International Journal of Information Security and Privacy and the Advances in Information Security and Privacy (AISP) Book Series. His research specialization is in the areas of decision support systems, data warehousing and mining, and information security and privacy. His research articles have appeared in a number of premier journals. He has presented numerous research and scholarly papers nationally and internationally.

Indices