Analyzing Security, Trust, and Crime in the Digital World

Analyzing Security, Trust, and Crime in the Digital World

Indexed In: SCOPUS View 1 More Indices
Release Date: December, 2013|Copyright: © 2014 |Pages: 281
DOI: 10.4018/978-1-4666-4856-2
ISBN13: 9781466648562|ISBN10: 1466648562|EISBN13: 9781466648579
Hardcover:
Available
$195.00
TOTAL SAVINGS: $195.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
Hardcover:
Available
$195.00
TOTAL SAVINGS: $195.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
E-Book:
Available
$195.00
TOTAL SAVINGS: $195.00
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
E-Book:
Available
$195.00
TOTAL SAVINGS: $195.00
Benefits
  • Immediate access after purchase
  • No DRM
  • PDF download
  • Receive a 10% Discount on eBooks
Hardcover +
E-Book:
Available
$235.00
TOTAL SAVINGS: $235.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
Hardcover +
E-Book:
Available
$235.00
TOTAL SAVINGS: $235.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Immediate access after purchase
  • No DRM
  • PDF download
Article Processing Charge:
Available
$700.00
TOTAL SAVINGS: $700.00
OnDemand:
(Individual Chapters)
Available
$37.50
TOTAL SAVINGS: $37.50
Benefits
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
Effective immediately, IGI Global has discontinued softcover book production. The softcover option is no longer available for direct purchase.
Description & Coverage
Description:

In the digital era, information is the most valuable resource, and protecting one’s assets is a constant struggle for both individuals and organizations.

Analyzing Security, Trust, and Crime in the Digital World explores techniques and technologies used to secure data and prevent intrusion in virtual environments. Within these pages, computer scientists, programmers, engineers, and practitioners will find meaningful research on intrusion detection and authentication techniques in order to further defend their own systems and protect the information therein.

Coverage:

The many academic areas covered in this publication include, but are not limited to:

  • Cyber Crime
  • Data Security
  • Information Privacy
  • Intrusion Detection Systems
  • Network Security
  • Security Technologies
  • Trust Management
  • User Authentication
Reviews & Statements

Scholars of business, information, and computer science set out a new approach to algorithm-based fault tolerance for high performance computing systems. Among their topics are methods for determining the investment in information technology security, authenticity in online knowledge sharing, information privacy concerns and workplace surveillance, control mechanisms of identity theft and its integrative impact on consumers' purchase intention in electronic commerce, and technology-related risks in virtual and traditional information systems projects.

– ProtoView Book Abstracts (formerly Book News, Inc.)
Table of Contents
Search this Book:
Reset
Editor/Author Biographies
Dr. Hamid Nemati is an Associate Professor of Information Systems at the Information Systems and Operations Management Department of The University of North Carolina at Greensboro. He holds a doctorate from the University of Georgia and a Master of Business Administration from The University of Massachusetts. Before coming to UNCG, he was on the faculty of J. Mack Robinson College of Business Administration at Georgia State University. He also has extensive professional experience as a consultant with a number of major corporations. Dr. Nemati is the Editor-in-Chief of International Journal of Information Security and Privacy and the Advances in Information Security and Privacy (AISP) Book Series. His research specialization is in the areas of decision support systems, data warehousing and mining, and information security and privacy. His research articles have appeared in a number of premier journals. He has presented numerous research and scholarly papers nationally and internationally.
Abstracting & Indexing
Archiving
All of IGI Global's content is archived via the CLOCKSS and LOCKSS initiative. Additionally, all IGI Global published content is available in IGI Global's InfoSci® platform.