×
Receive a 20% Discount on All Purchases Directly Through IGI Global's Online Bookstore.
Additionally, libraries can receive an extra 5% discount.
Learn More
Shopping Cart
Login
Register
Language:
English
All Products
All Products
Books
Journals
Videos
Book Chapters
Journal Articles
Video Lessons
Teaching Cases
Special Offers
Subscribe to the latest research through IGI Global's new InfoSci-OnDemand Plus
InfoSci®-OnDemand Plus, a subscription-based service, provides researchers the ability to access full-text content from over 93,000+ peer-reviewed book chapters and 24,000+ scholarly journal articles covering 11 core subjects. Users can select articles or chapters that meet their interests and gain access to the full content permanently in their
personal online InfoSci-OnDemand Plus library
.
Subscribe
Purchase the Encyclopedia of Information Science and Technology, Fourth Edition
and Receive Complimentary E-Books of Previous Editions
When ordering directly through IGI Global's Online Bookstore, receive the complimentary e-books for the first, second, and third editions with the purchase of the Encyclopedia of Information Science and Technology, Fourth Edition e-book.
Purchase
Create a Free IGI Global Library Account to Receive a 25% Discount on All Purchases
Exclusive benefits include one-click shopping, flexible payment options, free COUNTER 4 and MARC records, and a 25% discount on all titles as well as the award-winning InfoSci
®
-Databases.
Sign Up Now!
InfoSci
®
-Journals Annual Subscription Price for New Customers: As Low As US$ 4,080*
This collection of over 185 e-journals offers unlimited access to highly-cited, forward-thinking content in full-text PDF and HTML with no DRM. There are no platform or maintenance fees and a guarantee of no more than 5% increase annually.
Learn More
Discounted Titles Only Available through IGI Global’s Online Bookstore
Take 20% off all publications purchased directly through the IGI Global Online Bookstore.
Shop Now
Books
Journals
InfoSci
®
-Databases
Articles/Chapters
Publish
with Us
Resources
Librarians
InfoSci
®
-Databases
Book Title List
Journal Title List
Video Title List
Consortia Partnerships
Library and Publisher Collaborations
Product Distributors
Catalogs
Library Account Program
Instructors
Course Adoption
Teaching Cases
Researchers
Browse Books
Browse Journals
Streaming Videos
OnDemand Downloads
Webinars
Authors and Editors
eEditorial Discovery
®
System
Peer Review Process
Ethics and Malpractice
Fair Use Policy
Copy Editing Service
FAQ
Distributors
Distributor Resources
Book Distributors
Journal Subscription Agencies
E-Resource Partners
Catalogs
About Us
Newsroom
Bookstore Search
Reset
Total results: 467
Sort by:
Relevancy
Title (asc)
Title (desc)
Copyright Year (asc)
Copyright Year (desc)
Sample PDF
New Media and Communication Across Religions and Cultures
Isaac Nahon-Serfaty, Rukhsana Ahmed. © 2014. 328 pages.
The connection of interfaith and intercultural understanding stems from a conceptual foundation on the dialogue between religions and cultures. These types of conversation are essential for the clarification and reflection of practical opportunities and challenges that these exchanges are facing. New...
Reference Book
Sample PDF
International Journal of Cyber Research and Education (IJCRE)
Lawrence A. Tomei. © 2019.
The International Journal of Cyber Research and Education (IJCRE) is a high quality, peer-reviewed journal that covers applied, theoretical, and operational research, sponsored academic education and corporate training, and the application to knowledge in academia, government, corporate, and law...
Journal
Sample PDF
A Brief History of Storytelling: From Primitive Dance to Digital Narration
Recep Yılmaz, Fatih Mehmet Ciğerci. © 2019. 14 pages.
The aim of this chapter is to examine the history of storytelling. This brief history includes the concept of storytelling from myths to the digital era. In the first part of the chapter, the origins of storytelling in primitive communities and its development in later periods are examined. In the...
Source:
Handbook of Research on Transmedia Storytelling and Narrative Strategies
Sample PDF
The Transformative Role of Institutional Repositories in Academic Knowledge Management
Arjun Sabharwal. © 2019. 22 pages.
Institutional repositories (IRs) play a significant and transformative role in academic knowledge management (KM) focused on sharing, disseminating, reusing, and preserving knowledge. The contents of IRs span faculty research, Open Access (OA) publications, electronic theses and dissertations, graduate...
Source:
Digital Curation: Breakthroughs in Research and Practice
Sample PDF
Network Forensics: Practice
© 2019. 27 pages.
In the last few decades, networks have grown to accommodate evolved technologies on every open system for interconnection (OSI) level. On the physical and data link layers, numerous wireless innovations introduced the mobile networks and the interconnection of smart objects. The innovations in network...
Source:
Mobile Network Forensics: Emerging Research and Opportunities
Sample PDF
Lightweight Secure Architectural Framework for Internet of Things
Muthuramalingam S., Nisha Angeline C. V., Raja Lavanya. © 2019. 12 pages.
In this IoT era, we have billions of devices connected to the internet. These devices generate tons of data that has to be stored, processed, and used for making intelligent decisions. This calls for the need for a smart heterogeneous network which could handle this data and make the real-time systems...
Source:
Countering Cyber Attacks and Preserving the Integrity and Availability of...
Sample PDF
Introducing Psychological Concepts and Methods to Cybersecurity Students
Jacqui Taylor, Helen Thackray, Sarah E. Hodge, John McAlaney. © 2018. 11 pages.
This chapter begins with a brief review of the literature that highlights what psychology research and practice can offer to cybersecurity education. The authors draw on their wide-ranging inter-disciplinary teaching experience, and in this chapter, they discuss their observations gained from teaching...
Source:
Psychological and Behavioral Examinations in Cyber Security
Sample PDF
The Role of Religiosity in Technology Acceptance: The Case of Privacy in Saudi Arabia
Rami Mohammed Baazeem. © 2018. 22 pages.
Religion plays a major role in shaping individual behaviour, especially in the religious countries. This chapter sheds light on the effect of religiosity on the intention to use technology and privacy and will use Saudi Arabia as an example. Using the unified theory of acceptance and use of technology...
Source:
Psychological and Behavioral Examinations in Cyber Security
Sample PDF
Cyberattacks, Cybercrime and Cyberterrorism
Saurabh Ranjan Srivastava, Sachin Dube. © 2018. 22 pages.
This chapter describes how with growing reliance of modern society over internet and web-based services in every nook and corner of our daily lives, the threats of disruption and damage to these services has also evolved at a parallel rate. One of these threats having a potential of severe and...
Source:
Handbook of Research on Network Forensics and Analysis Techniques
Sample PDF
On Creating Digital Evidence in IP Networks With NetTrack
Diana Berbecaru. © 2018. 21 pages.
Computer forensic is the practice of collecting, analyzing, and reporting digital evidence in a way that is legally admissible in open court. Network forensics, an offset of computer forensic, is mainly concerned with the monitoring and analysis of network traffic, both local and WAN/internet, in order...
Source:
Handbook of Research on Network Forensics and Analysis Techniques
Sample PDF
Impact of Big Data on Security
Ramgopal Kashyap, Albert D. Piersson. © 2018. 17 pages.
The motivation behind this chapter is to highlight the qualities, security issue, advantages, and disadvantages of big data. In the recent researches, the issue and challenges are due to the exponential growth of social media data and other images and videos. Big data security threats are rising, which...
Source:
Handbook of Research on Network Forensics and Analysis Techniques
Sample PDF
Impact of Big Data on Security: Big Data Security Issues and Defense Schemes
Kasarapu Ramani. © 2018. 25 pages.
Big data has great commercial importance to major businesses, but security and privacy challenges are also daunting this storage, processing, and communication. Big data encapsulate organizations' most important and sensitive data with multi-level complex implementation. The challenge for any...
Source:
Handbook of Research on Network Forensics and Analysis Techniques
Sample PDF
Big Data Security Framework for Distributed Cloud Data Centers
Chandu Thota, Gunasekaran Manogaran, Daphne Lopez, Vijayakumar V. © 2018. 19 pages.
The rapid development of data generation sources such as digital sensors, networks, and smart devices along with their extensive use is leading to create huge database and coins the term Big Data. Cloud Computing enables computing resources such as hardware, storage space and computing tools to be...
Source:
Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications
Sample PDF
A Novel Ammonic Conversion Algorithm for Securing Data in DNA Using Parabolic Encryption
Shipra Jain, Vishal Bhatnagar. © 2018. 10 pages.
In today's era, the traditional cryptographic methods are not sufficient to provide security to the data. Everyone wants to secure their data whether the data is bank transaction, email transaction, personal data or the data related to work. To provide security to the data, DNA cryptography emerges...
Source:
Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications
Sample PDF
Navigating Through Choppy Waters of PCI DSS Compliance
Amrita Nanda, Priyal Popat, Deepak Vimalkumar. © 2018. 32 pages.
PCI Data Security Standard is increasingly becoming one of the major compliance requirements all organizations are concerned about. This chapter taking a holistic approach, provides an overview of various components of PCI DSS. We discuss various versions of PCI DSS and the industries affected by this...
Source:
Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications
Sample PDF
Cloud Crime and Fraud: A Study of Challenges for Cloud Security and Forensics
Nimisha Singh. © 2018. 17 pages.
Changing trends in IT industry are opening new avenues. With the scalability, flexibility, and economic advantage offered by cloud computing, more and more organizations are moving towards cloud for their applications. With all the benefits of cloud computing, it poses a danger of digital crime and...
Source:
Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications
Sample PDF
Cyber-Security Intelligence Gathering: Issues With Knowledge Management
Ezer Osei Yeboah-Boateng, Elvis Akwa-Bonsu. © 2018. 25 pages.
Recently, KM has found applications in cyber-security. Though the actionable information gathered is intangible, they are used to improve knowledge sharing in organizations. Key cyber-security objectives are to prevent, detect and respond to threats. Using open-sharing of vulnerabilities and exploits...
Source:
Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications
Sample PDF
Current State Survey and Future Opportunities for Trust and Security in Green Cloud Computing
Amine Haouari, Zbakh Mostapha, Samadi Yassir. © 2018. 25 pages.
In this paper, the authors present a state of art survey of cloud computing, highlighting its architectural principles, implementation as well as research directions in this increasingly important domain. They cover the different security issues that has emanated due to the nature of the service...
Source:
Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications
Sample PDF
Cyber Security Education in the Fourth Industrial Revolution: The Case of South Africa
Paul Kariuki. © 2018. 14 pages.
It is critical that cyber education curriculum considers the growing cyber technologies and which aspects of these technologies need to be aligned with the fourth industrial revolution. This chapter seeks to present a comprehensive analysis of the current level of cyber security education in South...
Source:
Handbook of Research on Information and Cyber Security in the Fourth...
Sample PDF
SOHO Users' Perceptions of Reliability and Continuity of Cloud-Based Services
Cornel L. Levy, Nilsa I. Elias. © 2017. 40 pages.
The adaptation of cloud computing services is continually growing because of its popularity, its ubiquitous, ease-of-use, and inexpensive nature. Small office/home office (SOHO) businesses are joining large organizations and purchasing cloud services to help with the continuity of their business...
Source:
Cybersecurity Breaches and Issues Surrounding Online Threat Protection
Sample PDF
Interviewing for Television: A Forgery of Practice and Influence
Evans Matu Nguri. © 2016. 23 pages.
An examination of television interviewing in Kenya provides an emerging sketch of its practice and theory. This Chapter considers television interviewing at three levels that it considers as prioritized by the times - interviewing at the change frontier site, interviewing on behalf of bio-change beings...
Source:
Political Influence of the Media in Developing Countries
Sample PDF
Advances in Biometrics for Secure Human Authentication System: Biometric Authentication System
Jagannath Mohan, Adalarasu Kanagasabai, Vetrivelan Pandu. © 2016. 19 pages.
In the recent decade, one of our major concerns in the global technological society of information security is confirmation that a person accessing confidential information is authorized to perform so. Such mode of access is generally accomplished by a person's confirming their identity by the use...
Source:
Combating Security Breaches and Criminal Activity in the Digital Sphere
Sample PDF
Effective Recognition of Stereo Image Concealed Media of Interpolation Error with Difference Expansion
Hemalatha J., Kavitha Devi M. K. © 2016. 9 pages.
In this chapter, a new data conceal technique is anticipated for digital images. The method computes the interpolation error of the image by using histogram shifting method and difference expansion. With the expectation of embedding high payload and less distortion, the undisclosed data has embedded in...
Source:
Combating Security Breaches and Criminal Activity in the Digital Sphere
Sample PDF
Network Intrusion Detection and Prevention Systems on Flooding and Worm Attacks
P. Vetrivelan, M. Jagannath, T. S. Pradeep Kumar. © 2016. 25 pages.
The Internet has transformed greatly the improved way of business, this vast network and its associated technologies have opened the doors to an increasing number of security threats which are dangerous to networks. The first part of this chapter presents a new dimension of denial of service attacks...
Source:
Combating Security Breaches and Criminal Activity in the Digital Sphere
Sample PDF
A Systematic Mapping of Security Mechanisms
Gayathri RajaKumaran, NeelaNarayanan Venkataraman. © 2016. 24 pages.
In the Internet Era, millions of computer systems are connected to the Internet and the number is increasing infinitely. Maintaining proper Control and configuration for all such networked systems has proved to be impossible. This loophole makes the Internet systems vulnerable to various type of...
Source:
Combating Security Breaches and Criminal Activity in the Digital Sphere
Page
/
19