Handbook of Research on Social and Organizational Liabilities in Information Security

Front Cover
Gupta, Manish
IGI Global, Dec 31, 2008 - Law - 596 pages
1 Review

As the diffusion and use of technology applications have accelerated in organizational and societal domains, behavioral and social dynamics have inevitably created the potential for negative as well as positive consequences and events associated with technology. A pressing need within organizations and societies has therefore emerged for robust, proactive information security measures that can prevent as well as ameliorate breaches, attacks, and abuses.

The Handbook of Research on Social and Organizational Liabilities in Information Security offers a critical mass of insightful, authoritative articles on the most salient contemporary issues of managing social and human aspects of information security. Aimed at providing immense scholarly value to researchers, academicians, and practitioners in the area of information technology and security, this landmark reference collection provides estimable coverage of pertinent issues such as employee surveillance, information security policies, and password authentication.

 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Preface
Responsibilities and Liabilities with Respect to Catastrophes
The Complex New World of Information Security
Employee Surveillance Based on Free Text Detection of Keystroke Dynamics
A Copula Based Bayesian Belief Network Model
ECommerce Security and HonestyCredit
Towards a Scalable Role and Organization Based Access Control Model with Decentralized Security Administration
A LifeCycle Approach
Designing Antiphishing Education
Survey and Agenda
Information Assurance and Security Curriculum Meeting the SIGITE Guidelines
Information Security Awareness
Creating a Security Education Training and Awareness
Information Security Within an ELearning Environment
Research Notes on Emerging Areas of Conflict in Security
The Human Attack in Linguistic Steganography

An Alternative Model of Information Security Investment
Avoiding Pitfalls in PolicyBased Privacy Management
Privacy and Banking in Australia
A Multistage Framework to Defend Against Phishing Attacks
A New Approach to Reducing Social Engineering Impact
PrivacyEnhancing Technologies
Social Engineering and its Countermeasures
Opportunities and Security Challenges
Using Technology to Overcome the Passwords Contradiction
Formal Analysis of Security in Interactive Systems
How Vulnerable Are You? Do Gender Social Influence and Education play a Role in Vulnerability?
Detecting Shill Bidding in Online English Auctions
Information Security at Large Public Displays
The Sense of Security and Trust
Copyright

Other editions - View all

Common terms and phrases

About the author (2008)

Manish Gupta is an information security professional in M&T Bank, Buffalo and also a PhD candidate at the State University of New York - Buffalo. He received his bachelor’s degree in mechanical engineering from the Institute of Engineering and Technology, Lucknow (India) in 1998 and an MBA in information systems from the State University of New York - Buffalo (USA) in 2003. He has more than ten years of industry experience in information systems, policies, and technologies. He has published three books in the area of information security and assurance. He has published more than 30 research articles in leading journals, conference proceedings and books including DSS, ACM Transactions, IEEE, and JOEUC. He serves in editorial boards of eight international journals and has served in program committees of several international conferences. He is listed in Cambridge Who’s Who Among Executives and Professionals, 2007 and Who’s Who among students in American Universities and Colleges, 2003. He holds several professional designations including CISSP, CISA, CISM, ISSPCS, and PMP. He is a member of ACM, AIS, IEEE, INFORMS, APWG, ISACA, and ISC2. He is recipient of 2008 ISC2 information security scholarship.

Raj Sharman is an associate professor in the Management Science and Systems Department at SUNY Buffalo, NY. He received his B. Tech and M. Tech degree from IIT Bombay (India) and his M.S degree in Industrial Engineering and PhD in Computer Science from Louisiana State University. His research streams include information assurance, extreme events, and improving performance on the Web. His papers have been published in a number of national and international journals. He is also the recipient of several grants from the university as well as external agencies. He serves as an associate editor for the Journal of Information Systems Security. [Editor]

Bibliographic information