Digital Business Security Development: Management Technologies

Digital Business Security Development: Management Technologies

Indexed In: SCOPUS View 1 More Indices
Release Date: July, 2010|Copyright: © 2011 |Pages: 240
DOI: 10.4018/978-1-60566-806-2
ISBN13: 9781605668062|ISBN10: 1605668060|EISBN13: 9781605668079
Hardcover:
Available
$180.00
TOTAL SAVINGS: $180.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
Hardcover:
Available
$180.00
TOTAL SAVINGS: $180.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
E-Book:
Available
$180.00
TOTAL SAVINGS: $180.00
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
E-Book:
Available
$180.00
TOTAL SAVINGS: $180.00
Benefits
  • Immediate access after purchase
  • No DRM
  • PDF download
  • Receive a 10% Discount on eBooks
Hardcover +
E-Book:
Available
$215.00
TOTAL SAVINGS: $215.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
Hardcover +
E-Book:
Available
$215.00
TOTAL SAVINGS: $215.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Immediate access after purchase
  • No DRM
  • PDF download
Article Processing Charge:
Available
$700.00
TOTAL SAVINGS: $700.00
OnDemand:
(Individual Chapters)
Available
$37.50
TOTAL SAVINGS: $37.50
Benefits
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
Description & Coverage
Description:

Security is an increasingly important area of study for businesses as failure to address company protection can have severe ramifications for the long-term viability of any e-commerce enterprise.

Digital Business Security Development: Management Technologies provides comprehensive coverage of issues associated with maintaining business protection in digital environments. Containing state-of-the-art research relevant to informing business practice, this Premier Reference Source provides base level knowledge for managers who are not specialists in the field as well as advanced undergraduate and postgraduate students undertaking research and further study.

Coverage:

The many academic areas covered in this publication include, but are not limited to:

  • Authentication
  • Business Continuity Planning
  • Data Security
  • Digital Evidence
  • Fraud and identity theft
  • Password-based systems
  • Privacy policy statements
  • Uncertainty in complex and dynamic environments
  • Web 2.0 Technologies
  • Wireless devices and security issues
Reviews & Statements

This book contains state of the art research relevant to informing business practice. It provides base level knowledge for business managers who are not specialists in the field; however, the main audience will be advanced undergraduate and postgraduate students undertaking research and further study in the field, or looking towards a specialised career in this area. By providing an overview of the issues, coupled with in-depth chapters on specific key topics, both breadth and depth are addressed for these readerships.

– Don Kerr, University of the Sunshine Coast, Australia; and John Gammack, Griffith University, Australia
Download OnDemand Chapters Banner
Table of Contents
Search this Book:
Reset
Editor/Author Biographies
Don Kerr, PhD, is an Associate Professor of Information Systems at the University of the Sunshine Coast. His research interests include assessing and monitoring the level of online fraud amongst senior citizens, the development and evaluation of decision support systems and the evaluation of the implementation of enterprise resource planning systems with particular emphasis on training and security. He has published 76 peer reviewed papers in both agricultural and management journals and conferences over the past 20 years.
John Gammack (PhD Cambridge, 1988) is an adjunct Professor at Murdoch University in Perth, and also at Griffith University in Queensland, Australia. He has around 200 internationally recognised publications mostly concerning informatics, and was lead author of the first popular textbook in this general field. Professor Gammack is a former head of both IT and management schools, and was research director for cross-university interdisciplinary groups specialising in Internet studies and in user and societal (IT) needs. Currently John spends time at various Chinese institutions as a visiting faculty member, and continues his research in informatics and digital life.
Kay Bryant is an independent contractor with experience in information systems. She has extensive academic experience in teaching information systems. Her research covers information systems and data security and includes publications in the Australasian Journal of Information Systems and Expert Systems with Applications.
Abstracting & Indexing
Archiving
All of IGI Global's content is archived via the CLOCKSS and LOCKSS initiative. Additionally, all IGI Global published content is available in IGI Global's InfoSci® platform.
Editorial Advisory Board
  • John Gammack, Griffith University, Australia
  • John Campbell, University of Canberra, Australia
  • Kay Bryant, University of Canberra, Australia
  • Raj Gururajan, University of Southern Queensland, Australia