Social and Human Elements of Information Security: Emerging Trends and Countermeasures: Emerging Trends and Countermeasures

Front Cover
Gupta, Manish
IGI Global, Sep 30, 2008 - Business & Economics - 412 pages

"More often than not, it is becoming increasingly evident that the weakest links in the information-security chain are the people. Due an increase in information security threats, it is imperative for organizations and professionals to learn more on the human nature and social interactions behind those creating the problem.

Social and Human Elements of Information Security: Emerging Trends and Countermeasures provides insightful, high-quality research into the social and human aspects of information security. A comprehensive source of the latest trends, issues, and findings in the field, this book fills the missing gap in existing literature by bringing together the most recent work from researchers in the fast and evolving field of information security."

 

What people are saying - Write a review

User Review - Flag as inappropriate

Does anyone know if these book has been update to reflect the changes that came info effect since the General Data Protection Regulation (GDPR)??

Contents

Preface
Human and Social Aspects of Password Authentication
Why Humans are the Weakest Link
Impact of the Human Element on Information Security
A Psychological Perspective on Why Users Make Poor Security Decisions
Software Verification in a SafetyCritical Information Society
Some Notes of Information Availability and Sharing
An International Perspective
Security Usability Challenges for EndUsers
Differentiating between Human and Bots
Privacy Concerns when Modeling Users in Collaborative Filtering Recommender Systems
An Adaptive ThreatVulnerability Model and the Economics of Protection
Bridging the Gap between Employee Surveillance and Privacy Protection
Aligning IT Teams Risk Management to Business Requirements
An Agenda for Acquisition of Human Factors
An Exploratory Analysis

A Case Study
Effects of Digital Convergence on Social Engineering Attack Channels
A Social Ontology for Integrating Security and Software Engineering
A Case Study in Wireless Network Configuration
Compilation of References
About the Contributors
Index
Copyright

Other editions - View all

Common terms and phrases

About the author (2008)

Manish Gupta is an information security professional in M&T Bank, Buffalo and also a PhD candidate at the State University of New York - Buffalo. He received his bachelor’s degree in mechanical engineering from the Institute of Engineering and Technology, Lucknow (India) in 1998 and an MBA in information systems from the State University of New York - Buffalo (USA) in 2003. He has more than ten years of industry experience in information systems, policies, and technologies. He has published three books in the area of information security and assurance. He has published more than 30 research articles in leading journals, conference proceedings and books including DSS, ACM Transactions, IEEE, and JOEUC. He serves in editorial boards of eight international journals and has served in program committees of several international conferences. He is listed in Cambridge Who’s Who Among Executives and Professionals, 2007 and Who’s Who among students in American Universities and Colleges, 2003. He holds several professional designations including CISSP, CISA, CISM, ISSPCS, and PMP. He is a member of ACM, AIS, IEEE, INFORMS, APWG, ISACA, and ISC2. He is recipient of 2008 ISC2 information security scholarship.

Raj Sharman is an associate professor in the Management Science and Systems Department at SUNY Buffalo, NY. He received his B. Tech and M. Tech degree from IIT Bombay (India) and his M.S degree in Industrial Engineering and PhD in Computer Science from Louisiana State University. His research streams include information assurance, extreme events, and improving performance on the Web. His papers have been published in a number of national and international journals. He is also the recipient of several grants from the university as well as external agencies. He serves as an associate editor for the Journal of Information Systems Security. [Editor]

Bibliographic information