Contemporary research in information science and technology
"Premier reference source"--Cover.
Includes bibliographical references.
Title Page; List of Contributors; Contentsby Volume; Preface; Introductory Chapter:Information Security and Ethics; About the Editor; Section 1:Fundamental Conceptsand Theories; Chapter 1.1:E-Government andDenial of Service Attacks; Chapter 1.2:Policy Frameworks forSecure Electronic Business; Chapter 1.3:Audio Watermarking:Properties, Techniques, and Evaluation; Chapter 1.4:Software Piracy:Possible Causes and Cures; Chapter 1.5:Administering theSemantic Web:Confidentiality, Privacy, andTrust Management.
Chapter 1.14:Integrating Security andSoftware Engineering:An IntroductionChapter 1.15:Ethics of Data Mining; Chapter 1.16:Privacy-Dangersand Protections; Chapter 1.17:Ethics of New Technologies; Chapter 1.18:Ethics and HCI; Chapter 1.19:The Central Problem inCyber Ethics and How StoriesCan Be Used to Address It; Chapter 1.20:Digital Watermarking:An Introduction; Chapter 1.21:Signals of Trustworthinessin E-Commerce:Consumer Understanding ofThird-Party Assurance Seals; Chapter 1.22:Moral Foundations ofData Mining; Chapter 1.23:Privacy and Security inE-Learning.
Chapter 1.24:Telework Information SecurityChapter 1.25:Conducting EthicalResearch Online:Respect for Individuals, Identities, and theOwnership of Words; Chapter 1.26:A Unified Information SecurityManagement Plan; Chapter 1.27:Information SecurityManagement; Chapter 1.28:The Challenge of Privacy andSecurity and theImplementation of HealthKnowledge ManagementSystems; Chapter 1.29:Would Be Pirates:Webcasters, Intellectual Property, and Ethics; Chapter 1.30:Check-Off PasswordSystem (COPS):An Advancement in User AuthenticationMethods and Information Security.
Chapter 1.31:The Game of Defenseand SecurityChapter 1.32:Data Hiding inDocument Images; Chapter 1.33:Ethics of Digital Government; Chapter 1.34:Digital Morality and Ethics; Chapter 1.35:Net Diplomacy; Chapter 1.36:Ethical Issues inInformation Technology; Chapter 1.37:Protecting One's Privacy:Insight into the Views and Nature of theEarly Adopters of Privacy Services; Chapter 1.38:The Desire for Privacy:Insights into the Views and Nature of theEarly Adopters of Privacy Services; Chapter 1.39:Security in Service-OrientedArchitecture:Issues, Standards, and Implementations.
Chapter 1.6:Human and Social Perspectivesin Information Technology:An Examination of Fraud on the InternetChapter 1.7: Codes of Ethics in Virtual Communities; Chapter 1.8:Digital Audio Watermarking; Chapter 1.9: Secure Authentication Process for High Sensitive Data E-Services: A Roadmap; Chapter 1.10: Evolution of Information- Hiding Technology; Chapter 1.11:Description of PoliciesEnriched by Semantics forSecurity Management; Chapter 1.12:Privacy and Securityin E-Learning1; Chapter 1.13:Ethical Challenges forInformation SystemsProfessionals.
0
8
8
8
8
Information Security and Ethics: Concepts, Methodologies, Tools, and Applications serves as the ultimate source on all theories and models associated with information privacy and safeguard practices to help anchor and guide the development of technologies, standards, and best practices to meet these challenges.
Information security and ethics.
9781599049373
Computer security.
Information technology-- Moral and ethical aspects.
Information technology-- Security measures.
Computer security.
Information technology-- Moral and ethical aspects.