Digital Business Security Development: Management Technologies

Digital Business Security Development: Management Technologies

Don Kerr (University of the Sunshine Coast, Australia), John G. Gammack (Griffith University, Australia) and Kay Bryant (Griffith University, Australia)
Indexed In: SCOPUS View 1 More Indices
Release Date: July, 2010|Copyright: © 2011 |Pages: 240
DOI: 10.4018/978-1-60566-806-2
ISBN13: 9781605668062|ISBN10: 1605668060|EISBN13: 9781605668079
Hardcover:
Available
$180.00
TOTAL SAVINGS: $180.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
E-Book:
(Multi-User License)
Available
$162.00
List Price: $180.00
10% Discount:-$18.00
TOTAL SAVINGS: $18.00
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
Hardcover +
E-Book:
(Multi-User License)
Available
$215.00
TOTAL SAVINGS: $215.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
OnDemand:
(Individual Chapters)
Available
$37.50
TOTAL SAVINGS: $37.50
Benefits
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
Description & Coverage
Description:

Security is an increasingly important area of study for businesses as failure to address company protection can have severe ramifications for the long-term viability of any e-commerce enterprise.

Digital Business Security Development: Management Technologies provides comprehensive coverage of issues associated with maintaining business protection in digital environments. Containing state-of-the-art research relevant to informing business practice, this Premier Reference Source provides base level knowledge for managers who are not specialists in the field as well as advanced undergraduate and postgraduate students undertaking research and further study.

Coverage:

The many academic areas covered in this publication include, but are not limited to:

  • Authentication
  • Business Continuity Planning
  • Data Security
  • Digital Evidence
  • Fraud and identity theft
  • Password-based systems
  • Privacy policy statements
  • Uncertainty in complex and dynamic environments
  • Web 2.0 Technologies
  • Wireless devices and security issues
Reviews and Testimonials

This book contains state of the art research relevant to informing business practice. It provides base level knowledge for business managers who are not specialists in the field; however, the main audience will be advanced undergraduate and postgraduate students undertaking research and further study in the field, or looking towards a specialised career in this area. By providing an overview of the issues, coupled with in-depth chapters on specific key topics, both breadth and depth are addressed for these readerships.

– Don Kerr, University of the Sunshine Coast, Australia; and John Gammack, Griffith University, Australia
Table of Contents
Search this Book:
Reset
Editor/Author Biographies
Don Kerr, PhD, is an Associate Professor of Information Systems at the University of the Sunshine Coast. His research interests include assessing and monitoring the level of online fraud amongst senior citizens, the development and evaluation of decision support systems and the evaluation of the implementation of enterprise resource planning systems with particular emphasis on training and security. He has published 76 peer reviewed papers in both agricultural and management journals and conferences over the past 20 years.
John Gammack (PhD Cambridge, 1988) is an adjunct Professor at Murdoch University in Perth, and also at Griffith University in Queensland, Australia. He has around 200 internationally recognised publications mostly concerning informatics, and was lead author of the first popular textbook in this general field. Professor Gammack is a former head of both IT and management schools, and was research director for cross-university interdisciplinary groups specialising in Internet studies and in user and societal (IT) needs. Currently John spends time at various Chinese institutions as a visiting faculty member, and continues his research in informatics and digital life.
Kay Bryant is an independent contractor with experience in information systems. She has extensive academic experience in teaching information systems. Her research covers information systems and data security and includes publications in the Australasian Journal of Information Systems and Expert Systems with Applications.
Editorial Policy
In order to ensure the highest ethical practices are achieved for each book, IGI Global provides a full document of policies and guidelines that all editors, authors, and reviewers are expected to follow. View Full Editorial Policy
Peer Review Process
The peer review process is the driving force behind all IGI Global books and journals. All IGI Global reviewers maintain the highest ethical standards and each manuscript undergoes a rigorous double-blind peer review process, which is backed by our full membership to the Committee on Publication Ethics (COPE). The full publishing process and peer review are conducted within the IGI Global eEditorial Discovery® online submission system and on average takes 30 days. Learn More
Ethics & Malpractice
IGI Global affirms that ethical publication practices are critical to the successful development of knowledge. Therefore, it is the policy of IGI Global to maintain high ethical standards in all publications. These standards pertain to all books, journals, chapters, and articles accepted for publication. This is in accordance with standard scientific principles and IGI Global’s position as a source of scientific knowledge. Learn More
Abstracting & Indexing
Archiving
All of IGI Global's content is archived via the CLOCKSS and LOCKSS initiative. Additionally, all IGI Global published content is available in IGI Global's InfoSci® platform.
Editorial Review Board
  • John Gammack, Griffith University, Australia
  • John Campbell, University of Canberra, Australia
  • Kay Bryant, University of Canberra, Australia
  • Raj Gururajan, University of Southern Queensland, Australia