Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues

Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues

Indexed In: SCOPUS View 1 More Indices
Release Date: March, 2009|Copyright: © 2009 |Pages: 414
DOI: 10.4018/978-1-60566-210-7
ISBN13: 9781605662107|ISBN10: 1605662100|EISBN13: 9781605662114
Hardcover:
Available
$195.00
TOTAL SAVINGS: $195.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
Hardcover:
Available
$195.00
TOTAL SAVINGS: $195.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
E-Book:
Available
$195.00
TOTAL SAVINGS: $195.00
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
E-Book:
Available
$195.00
TOTAL SAVINGS: $195.00
Benefits
  • Immediate access after purchase
  • No DRM
  • PDF download
  • Receive a 10% Discount on eBooks
Hardcover +
E-Book:
Available
$235.00
TOTAL SAVINGS: $235.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
Hardcover +
E-Book:
Available
$235.00
TOTAL SAVINGS: $235.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Immediate access after purchase
  • No DRM
  • PDF download
Article Processing Charge:
Available
$700.00
TOTAL SAVINGS: $700.00
OnDemand:
(Individual Chapters)
Available
$37.50
TOTAL SAVINGS: $37.50
Benefits
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
Effective immediately, IGI Global has discontinued softcover book production. The softcover option is no longer available for direct purchase.
Description & Coverage
Description:

Advances in technology are causing new privacy concerns as an increasing number of citizens are engaging in online activities.

Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues provides a thorough understanding of issues and concerns in information technology security. An advanced reference source covering topics such as security management, privacy preservation, and authentication, this book outlines the field and provides a basic understanding of the most salient issues in privacy concerns for researchers and practitioners.

Coverage:

The many academic areas covered in this publication include, but are not limited to:

  • Authentication system design
  • Dynamic control mechanisms
  • Effects of quantum computation on information privacy
  • Evaluating information security and privacy
  • Image Authentication
  • Information security and privacy
  • Information security effectiveness
  • Information Systems Security
  • Privacy preservation and techniques
  • Privacy-preserving clustering
  • Privacy-preserving transactions protocol
  • Security and privacy management
  • Web security and privacy issues and technologies
Reviews & Statements

This book introduces the topic of information security and privacy and discuss the fundamental concepts and theories from a technical, organizational and ethical point of view. This book also broadly discuss the tools and technologies used in achieving the goals of information security and privacy.

– Hamid Nemati, University of North Carolina at Greensboro, USA
Table of Contents
Search this Book:
Reset
Editor/Author Biographies
Hamid Nemati is an associate professor of information systems in the Department of Information Systems and Operations Management at the University of North Carolina at Greensboro. He holds a doctorate from the University of Georgia and a Master of Business Administration from the University of Massachusetts. Before coming to UNCG, he was on the faculty of J. Mack Robinson College of Business Administration at Georgia State University. He has extensive professional experience in various consulting, business intelligence, and analyst positions and has consulted for a number of major organizations. His research specialization is in the areas of decision support systems, data warehousing, data mining, knowledge management, and information privacy and security. He has presented numerous research and scholarly papers nationally and internationally. His articles have appeared in a number of premier professional and scholarly journals.
Abstracting & Indexing
Archiving
All of IGI Global's content is archived via the CLOCKSS and LOCKSS initiative. Additionally, all IGI Global published content is available in IGI Global's InfoSci® platform.
Editorial Advisory Board
Associate Editors
  • Jen-Yao Chung, IBM T. J. Watson Research Center, USA
  • Tom Coffey, University of Limerick, Ireland
  • Jerry Fjermestad, New Jersey Institute of Technology, USA
  • Richard Herschel, St. Joseph's University, USA
  • Abbie Homaifar, North Carolina A&T State University, USA
  • Sushil Jajodia, George Mason University, USA
  • Kevin Lowe, The University of North Carolina at Greensboro, USA
  • Christopher Ruhm, The University of North Carolina at Greensboro, USA
  • Fred Sadri, The University of North Carolina at Greensboro, USA
  • Jeff Smith, Wake Forest University, USA
  • Bhavani Thuraisingham, University of Texas at Dallas, USA
  • Rustam Vahidov, Concordia University, Canada
  • Brian Whitworth, Massey University, USA

    Editorial Review Board

  • Moses Acquaah, The University of North Carolina at Greensboro, USA
  • Alessandro Acquisti, Carnegie Mellon University, USA
  • Pierre Balthazard, Arizona State University, USA
  • Christopher Barko, Laboratory Corporation of America, USA
  • Dieter Bartmann, University of Regensburg, Germany
  • Joseph Cazier, Appalachian State University, USA
  • Elizabeth Chang, Curtin University of Technology, Australia
  • John Eatman, The University of North Carolina at Greensboro, USA
  • Simone Fischer-Hübner, Karlstad University, Sweden
  • Keith Frikken, Purdue University, USA
  • Philippe Golle, Palo Alto Research Center, USA
  • Rüdiger Grimm, University Koblenz-Landau, Germany
  • Liisa von Hellens, Griffith University, Australia
  • Harry Hochheiser, Towson University, USA
  • Lakshmi Iyer, The University of North Carolina at Greensboro, USA
  • Earp Julie, North Carolina State University, USA
  • Chang Koh, University of North Texas, USA
  • Mary Jane Lenard, Meredith College, USA
  • Dawn Medlin, Appalachian State University, USA
  • Mihir Parikh, University of Central Florida, USA
  • Norman Pendegraft, The University of Idaho, USA
  • Carol Pollard, Appalachian State University, USA
  • Ellen Rose, Massey University, New Zealand
  • Alain Mohsen Sadeghi, eTechSecurity Pro, USA
  • A.F. Salam, The University of North Carolina at Greensboro, USA
  • Kathy Schwaig, Kennesaw State University, USA
  • Rahul Singh, The University of North Carolina at Greensboro, USA
  • Victoria Skoularidou, Athens University of Economics and Business, USA
  • William Tullar, The University of North Carolina at Greensboro, USA
  • Sameer Verma, San Francisco State University, USA