Information Security and Ethics: Concepts, Methodologies, Tools, and Applications (6 Volumes)

Information Security and Ethics: Concepts, Methodologies, Tools, and Applications (6 Volumes)

Hamid Nemati (The University of North Carolina at Greensboro, USA)
Release Date: September, 2007|Copyright: © 2008 |Pages: 4478
DOI: 10.4018/978-1-59904-937-3
ISBN13: 9781599049373|ISBN10: 1599049376|EISBN13: 9781599049380
TOTAL SAVINGS: $1,750.00
  • Printed-On-Demand (POD)
  • Usually ships one day from order
(Multi-User License)
List Price: $1,750.00
10% Discount:-$175.00
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
Hardcover +
(Multi-User License)
TOTAL SAVINGS: $1,750.00
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
(Individual Chapters)
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
Description & Coverage

Information Security and Ethics: Concepts, Methodologies, Tools, and Applicationsserves as the ultimate source on all theories and models associated with information privacy and safeguard practices to help anchor and guide the development of technologies, standards, and best practices to meet these challenges.

Compiling over 250 chapters representing the work of 484 international experts in these fields, this commanding, six-volume collection examines a complete array of topics in this area, including authentication technologies, cyber crime, cryptographic tools, monitoring systems, forensic computing, and confidentiality applications and their relation to raising the level of security and ethical standards in technology-driven environments. Essential to the information technology collection of any library, Information Security and Ethics: Concepts, Methodologies, Tools, and Applications will serve the needs of researchers in a variety of related fields, including business, e-commerce, government, law enforcement, and many more.


The many academic areas covered in this publication include, but are not limited to:

  • Codes of Ethics in Virtual Communities
  • Computer Security in E-Learning
  • Conducting Ethical Research Online
  • Designing Secure Data Warehouses
  • Digital Watermarking for Multimedia Security Management
  • E-Business Systems Security for Intelligent Enterprise
  • E-Government and Denial of Service Attacks
  • E-Health Security and Privacy
  • Electronic Banking and Information Assurance Issues
  • Enforcing Privacy on the Semantic Web
  • Ethical Challenges for Information Systems Professionals
  • Ethical Dilemmas in Online Research
  • Ethical Issues in Information Technology
  • Ethics of Digital Government
  • Information security management
  • Integrating Security and Software Engineering
  • Multimedia Security and Digital Rights Management Technology
  • Privacy and Confidentiality Issues in Data Mining
  • Privacy and Security in E-Learning
  • Privacy and Trust in Agent-Supported Distributed Learning
  • Privacy-Preserving Data Mining
  • Security and Privacy in Distance Education
  • Security and Trust in Mobile Multimedia
  • Security in Service-Oriented Architecture
  • Trust and Security in Ambient Intelligence
Reviews and Testimonials

As we face our situation as the first generation of humans that are almost fully dependent on information and technology, the need to apply security that guarantees the trustworthiness of the information and the integrity of the technology is at the forefront. This six volume publication on information security and ethics compiles the most definitive research in the industry into one single compendium making it an indispensable reference tool to be used by all.

– Hamid Nemati, The University of North Carolina at Greensboro, USA

Nearly 800 international authorities present exhaustive research on theories and models associated with informational privacy and safeguard practices, providing guidance on the development of technologies, standards, and best practices to keep up with those challenges.

– Kathy Dempsey, Computers in Libraries, November/December 2007, Vol. 27 No. 10

BOTTOM LINE: …since few other resources of this scope are available, it would be a valuable addition to upper-level university and research collections. And because information technology changes so rapidly, the publisher offers buyers free online updates.

– Library Journal, February 2008

Nemati and the editorial staff have done a fantastic job of compiling a plethora of topics that will allow anyone to find their area of interest and easily expand their understanding.

– CHOICE, Vol. 45, No. 8 (April 2008)

Information Security and Ethics: Concepts, Methodologies, Tools, and Applications is a one-of-a-kind compilation of up-to-date articles related to information security and ethics. It is recommended that public and academic libraries have a copy available for students interested in computer science, information technology, and social sciences.

– American Reference Books Annual, Vol. 39
Table of Contents
Search this Book:
Editor/Author Biographies
Hamid Nemati is an associate professor of information systems in the Department of Information Systems and Operations Management at the University of North Carolina at Greensboro. He holds a doctorate from the University of Georgia and a Master of Business Administration from the University of Massachusetts. Before coming to UNCG, he was on the faculty of J. Mack Robinson College of Business Administration at Georgia State University. He has extensive professional experience in various consulting, business intelligence, and analyst positions and has consulted for a number of major organizations. His research specialization is in the areas of decision support systems, data warehousing, data mining, knowledge management, and information privacy and security. He has presented numerous research and scholarly papers nationally and internationally. His articles have appeared in a number of premier professional and scholarly journals.
Peer Review Process
The peer review process is the driving force behind all IGI Global books and journals. All IGI Global reviewers maintain the highest ethical standards and each manuscript undergoes a rigorous double-blind peer review process, which is backed by our full membership to the Committee on Publication Ethics (COPE). The full publishing process and peer review are conducted within the IGI Global eEditorial Discovery® online submission system and on average takes 30 days. Learn More
Ethics & Malpractice
IGI Global affirms that ethical publication practices are critical to the successful development of knowledge. Therefore, it is the policy of IGI Global to maintain high ethical standards in all publications. These standards pertain to all books, journals, chapters, and articles accepted for publication. This is in accordance with standard scientific principles and IGI Global’s position as a source of scientific knowledge. Learn More
Abstracting & Indexing
All of IGI Global's content is archived via the CLOCKSS and LOCKSS initiative. Additionally, all IGI Global published content is available in IGI Global's InfoSci® platform.
Editorial Review Board
Associate Editors

Steve Clarke
University of Hull, UK

Murray Jennex
San Diego State University, USA

Annie Becker
Florida Institute of Technology USA

Ari-Veikko Anttiroiko
University of Tampere, Finland

Editorial Advisory Board

Sherif Kamel
American University in Cairo, Egypt

In Lee
Western Illinois University, USA

Jerzy Kisielnicki
Warsaw University, Poland

Keng Siau
University of Nebraska-Lincoln, USA

Amar Gupta
Arizona University, USA

Craig van Slyke
University of Central Florida, USA

John Wang
Montclair State University, USA

Vishanth Weerakkody
Brunel University, UK