Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues: Emerging Organizational, Ethical, and Human Issues

Front Cover
Nemati, Hamid
IGI Global, Mar 31, 2009 - Computers - 414 pages

Advances in technology are causing new privacy concerns as an increasing number of citizens are engaging in online activities.

Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues provides a thorough understanding of issues and concerns in information technology security. An advanced reference source covering topics such as security management, privacy preservation, and authentication, this book outlines the field and provides a basic understanding of the most salient issues in privacy concerns for researchers and practitioners.


What people are saying - Write a review

We haven't found any reviews in the usual places.


Email Worm Detection Using Data Mining
Cases of Network Administrator Threats
Assessing US and Korean Knowledge and Perceptions
PrivacyPreserving Data Mining and the Need for Confluence of Research and Practice
A Dimensionality ReductionBased Transformation to Support Business Collaboration
PrivacyPreserving Transactions Protocol using Mobile Agents with Mutual Authentication
Dynamic Control Mechanisms for User Privacy Enhancement
A Projection of the Future Effects of Quantum Computation on Information Privacy
An Examination of a Student Information System
The Effect of Increased Knowledge on Privacy Concerns and Internet Shopping Site Personalization Preferences
An ExperienceBased Model for Trustworthiness Evaluation
Confidentiality Privacy and Trust Management
An Ontology of Information Security
Conceptualization and Validation of a Theory
A Simulation Model of IS Security
Compilation of References

On the Design of an Authentication System Based on Keystroke Dynamics Using a Predefined Input Text
Defeating Active Phishing Attacks for WebBased Transactions
A ContentBased Watermarking Scheme for Image Authentication Using Discrete Wavelet Transform InterCoefficient Relations
Privacy and Security in the Age of Electronic Customer Relationship Management
About the Contributors

Other editions - View all

Common terms and phrases

About the author (2009)

Hamid Nemati is an associate professor of information systems in the Department of Information Systems and Operations Management at the University of North Carolina at Greensboro. He holds a doctorate from the University of Georgia and a Master of Business Administration from the University of Massachusetts. Before coming to UNCG, he was on the faculty of J. Mack Robinson College of Business Administration at Georgia State University. He has extensive professional experience in various consulting, business intelligence, and analyst positions and has consulted for a number of major organizations. His research specialization is in the areas of decision support systems, data warehousing, data mining, knowledge management, and information privacy and security. He has presented numerous research and scholarly papers nationally and internationally. His articles have appeared in a number of premier professional and scholarly journals. [Editor]

Bibliographic information