Contemporary research in information science and technology
يادداشت کلی
متن يادداشت
"Premier reference source"--Cover.
یادداشتهای مربوط به کتابنامه ، واژه نامه و نمایه های داخل اثر
متن يادداشت
Includes bibliographical references.
یادداشتهای مربوط به مندرجات
متن يادداشت
Title Page; List of Contributors; Contentsby Volume; Preface; Introductory Chapter:Information Security and Ethics; About the Editor; Section 1:Fundamental Conceptsand Theories; Chapter 1.1:E-Government andDenial of Service Attacks; Chapter 1.2:Policy Frameworks forSecure Electronic Business; Chapter 1.3:Audio Watermarking:Properties, Techniques, and Evaluation; Chapter 1.4:Software Piracy:Possible Causes and Cures; Chapter 1.5:Administering theSemantic Web:Confidentiality, Privacy, andTrust Management.
متن يادداشت
Chapter 1.14:Integrating Security andSoftware Engineering:An IntroductionChapter 1.15:Ethics of Data Mining; Chapter 1.16:Privacy-Dangersand Protections; Chapter 1.17:Ethics of New Technologies; Chapter 1.18:Ethics and HCI; Chapter 1.19:The Central Problem inCyber Ethics and How StoriesCan Be Used to Address It; Chapter 1.20:Digital Watermarking:An Introduction; Chapter 1.21:Signals of Trustworthinessin E-Commerce:Consumer Understanding ofThird-Party Assurance Seals; Chapter 1.22:Moral Foundations ofData Mining; Chapter 1.23:Privacy and Security inE-Learning.
متن يادداشت
Chapter 1.24:Telework Information SecurityChapter 1.25:Conducting EthicalResearch Online:Respect for Individuals, Identities, and theOwnership of Words; Chapter 1.26:A Unified Information SecurityManagement Plan; Chapter 1.27:Information SecurityManagement; Chapter 1.28:The Challenge of Privacy andSecurity and theImplementation of HealthKnowledge ManagementSystems; Chapter 1.29:Would Be Pirates:Webcasters, Intellectual Property, and Ethics; Chapter 1.30:Check-Off PasswordSystem (COPS):An Advancement in User AuthenticationMethods and Information Security.
متن يادداشت
Chapter 1.31:The Game of Defenseand SecurityChapter 1.32:Data Hiding inDocument Images; Chapter 1.33:Ethics of Digital Government; Chapter 1.34:Digital Morality and Ethics; Chapter 1.35:Net Diplomacy; Chapter 1.36:Ethical Issues inInformation Technology; Chapter 1.37:Protecting One's Privacy:Insight into the Views and Nature of theEarly Adopters of Privacy Services; Chapter 1.38:The Desire for Privacy:Insights into the Views and Nature of theEarly Adopters of Privacy Services; Chapter 1.39:Security in Service-OrientedArchitecture:Issues, Standards, and Implementations.
متن يادداشت
Chapter 1.6:Human and Social Perspectivesin Information Technology:An Examination of Fraud on the InternetChapter 1.7: Codes of Ethics in Virtual Communities; Chapter 1.8:Digital Audio Watermarking; Chapter 1.9: Secure Authentication Process for High Sensitive Data E-Services: A Roadmap; Chapter 1.10: Evolution of Information- Hiding Technology; Chapter 1.11:Description of PoliciesEnriched by Semantics forSecurity Management; Chapter 1.12:Privacy and Securityin E-Learning1; Chapter 1.13:Ethical Challenges forInformation SystemsProfessionals.
بدون عنوان
0
بدون عنوان
8
بدون عنوان
8
بدون عنوان
8
بدون عنوان
8
یادداشتهای مربوط به خلاصه یا چکیده
متن يادداشت
Information Security and Ethics: Concepts, Methodologies, Tools, and Applications serves as the ultimate source on all theories and models associated with information privacy and safeguard practices to help anchor and guide the development of technologies, standards, and best practices to meet these challenges.
ویراست دیگر از اثر در قالب دیگر رسانه
عنوان
Information security and ethics.
شماره استاندارد بين المللي کتاب و موسيقي
9781599049373
موضوع (اسم عام یاعبارت اسمی عام)
موضوع مستند نشده
Computer security.
موضوع مستند نشده
Information technology-- Moral and ethical aspects.
موضوع مستند نشده
Information technology-- Security measures.
موضوع مستند نشده
Computer security.
موضوع مستند نشده
Information technology-- Moral and ethical aspects.