Pervasive information security and privacy developments: trends and advancements
"This book compiles research on topics such as technical, regulatory, organizational, managerial, cultural, ethical, and human aspects of information security and privacy, offering methodologies, research frameworks, theory development and validation, case studies, simulations, technological ar...
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey ; New York
Information Science Reference
[2011]
|
Schriftenreihe: | Premier reference source
|
Schlagworte: | |
Online-Zugang: | DE-706 DE-1049 DE-898 DE-1050 DE-83 Volltext |
Zusammenfassung: | "This book compiles research on topics such as technical, regulatory, organizational, managerial, cultural, ethical, and human aspects of information security and privacy, offering methodologies, research frameworks, theory development and validation, case studies, simulations, technological architectures, infrastructure issues in design, and implementation of secure and privacy preserving initiatives" - Provided by publisher |
Beschreibung: | Includes bibliographical references |
Beschreibung: | 1 Online-Ressource (xxxvii, 428 Seiten) |
ISBN: | 9781616920012 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV044287888 | ||
003 | DE-604 | ||
005 | 20220307 | ||
007 | cr|uuu---uuuuu | ||
008 | 170427s2011 |||| o||u| ||||||eng d | ||
020 | |a 9781616920012 |9 978-1-61692-001-2 | ||
024 | 7 | |a 10.4018/978-1-61692-000-5 |2 doi | |
035 | |a (OCoLC)992514668 | ||
035 | |a (DE-599)BVBBV044287888 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-1049 |a DE-898 |a DE-1050 |a DE-83 | ||
245 | 1 | 0 | |a Pervasive information security and privacy developments |b trends and advancements |c Hamid Nemati (University of North Carolina, Greensboro, USA) |
264 | 1 | |a Hershey ; New York |b Information Science Reference |c [2011] | |
264 | 4 | |c © 2011 | |
300 | |a 1 Online-Ressource (xxxvii, 428 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Premier reference source | |
500 | |a Includes bibliographical references | ||
505 | 8 | |a 1. Examining an individual's perceived need for privacy and security / Taner Pirim, Tabitha James, Katherine Boswell, Brian Reithel, Reza Barkhi -- 2. Forty years of federal legislation in the area of data protection and information security / John Cassini, B. Medlin, Adriana Romaniello -- 3. The impact of privacy legislation on patient care / Jeff Barnett -- 4. A privacy protection model for patient data with multiple sensitive attributes / Tamas Gal, Zhiyuan Chen, Aryya Gangopadhyay -- 5. Protecting patient information in outsourced telehealth services / Patricia Logan, Debra Noles -- 6. Obtaining patient's information from hospital employees through social engineering techniques / B. Medlin, Joseph Cazier -- 7. Effects of individual trust in broadcast media and the Internet on privacy-risking uses of e-health / E. Wilson, David Dobrzykowski, Joseph Cazier -- 8. Safeguarding the privacy of electronic medical records / Jingquan Li, Michael Shaw -- 9. Using statistical texture analysis for medical image tamper proofing / Samia Boucherkha, Mohamed Benmohamed -- 10. Privacy inference disclosure control with access-unrestricted data anonymity / Zude Li -- 11. Designing efficient security services infrastructure for virtualization oriented architectures / Dr. Naqvi -- 12. Architectural support for enhancing critical secrets protection in chip-multiprocessors / Lu Peng, Li Yang, Balachandran Ramadass -- | |
505 | 8 | |a 13. Memory based anti-forensic tools and techniques / Hamid Jahankhani, Elidon Beqiri -- 14. Life cycle pattern study of malicious codes / June Wei, Randall Reid, Hongmei Zhang -- 15. Trust-based usage control in collaborative environment / Li Yang, Chang Phuong, Andy Novobilski, Raimund Ege -- 16. Will it be disclosure or fabrication of personal information? / Xun Li, Radhika Santhanam -- 17. Computer security practices and perceptions of the next generation of corporate computer users / S. Kruck, Faye Teer -- 18. Design and implementation of a framework for assured information sharing across organizational boundaries / Bhavani Thuraisingham, Yashaswini Kumar, Latifur Khan -- 19. A secure and trustful e-ordering architecture (TOES) for small and medium size enterprises (SMEs) / Spyridon Papastergiou, Despina Polemi -- 20. SEACON / Surya Yadav -- 21. Spam classification based on e-mail path analysis / Palla Srikanth, Dantu Ram, Cangussu Jo ao -- 22. A Decentralized security framework for Web-based social networks / Barbara Carminati, Elena Ferrari, Andrea Perego | |
520 | |a "This book compiles research on topics such as technical, regulatory, organizational, managerial, cultural, ethical, and human aspects of information security and privacy, offering methodologies, research frameworks, theory development and validation, case studies, simulations, technological architectures, infrastructure issues in design, and implementation of secure and privacy preserving initiatives" - Provided by publisher | ||
650 | 4 | |a Information technology / Security measures | |
650 | 4 | |a Data protection | |
650 | 4 | |a Computer security | |
650 | 4 | |a Privacy, Right of | |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Nemati, Hamid R. |d 1958- |0 (DE-588)140041923 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-61692-000-5 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1-61692-000-9 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-61692-370-9 |
856 | 4 | 0 | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61692-000-5 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB |a ZDB-1-IGE | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-029692065 | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61692-000-5 |l DE-706 |p ZDB-98-IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-61692-000-5 |l DE-1049 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-61692-000-5 |l DE-898 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-61692-000-5 |l DE-1050 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-61692-000-5 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1808138440298987520 |
---|---|
adam_text | |
any_adam_object | |
author2 | Nemati, Hamid R. 1958- |
author2_role | edt |
author2_variant | h r n hr hrn |
author_GND | (DE-588)140041923 |
author_facet | Nemati, Hamid R. 1958- |
building | Verbundindex |
bvnumber | BV044287888 |
collection | ZDB-98-IGB ZDB-1-IGE |
contents | 1. Examining an individual's perceived need for privacy and security / Taner Pirim, Tabitha James, Katherine Boswell, Brian Reithel, Reza Barkhi -- 2. Forty years of federal legislation in the area of data protection and information security / John Cassini, B. Medlin, Adriana Romaniello -- 3. The impact of privacy legislation on patient care / Jeff Barnett -- 4. A privacy protection model for patient data with multiple sensitive attributes / Tamas Gal, Zhiyuan Chen, Aryya Gangopadhyay -- 5. Protecting patient information in outsourced telehealth services / Patricia Logan, Debra Noles -- 6. Obtaining patient's information from hospital employees through social engineering techniques / B. Medlin, Joseph Cazier -- 7. Effects of individual trust in broadcast media and the Internet on privacy-risking uses of e-health / E. Wilson, David Dobrzykowski, Joseph Cazier -- 8. Safeguarding the privacy of electronic medical records / Jingquan Li, Michael Shaw -- 9. Using statistical texture analysis for medical image tamper proofing / Samia Boucherkha, Mohamed Benmohamed -- 10. Privacy inference disclosure control with access-unrestricted data anonymity / Zude Li -- 11. Designing efficient security services infrastructure for virtualization oriented architectures / Dr. Naqvi -- 12. Architectural support for enhancing critical secrets protection in chip-multiprocessors / Lu Peng, Li Yang, Balachandran Ramadass -- 13. Memory based anti-forensic tools and techniques / Hamid Jahankhani, Elidon Beqiri -- 14. Life cycle pattern study of malicious codes / June Wei, Randall Reid, Hongmei Zhang -- 15. Trust-based usage control in collaborative environment / Li Yang, Chang Phuong, Andy Novobilski, Raimund Ege -- 16. Will it be disclosure or fabrication of personal information? / Xun Li, Radhika Santhanam -- 17. Computer security practices and perceptions of the next generation of corporate computer users / S. Kruck, Faye Teer -- 18. Design and implementation of a framework for assured information sharing across organizational boundaries / Bhavani Thuraisingham, Yashaswini Kumar, Latifur Khan -- 19. A secure and trustful e-ordering architecture (TOES) for small and medium size enterprises (SMEs) / Spyridon Papastergiou, Despina Polemi -- 20. SEACON / Surya Yadav -- 21. Spam classification based on e-mail path analysis / Palla Srikanth, Dantu Ram, Cangussu Jo ao -- 22. A Decentralized security framework for Web-based social networks / Barbara Carminati, Elena Ferrari, Andrea Perego |
ctrlnum | (OCoLC)992514668 (DE-599)BVBBV044287888 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000zc 4500</leader><controlfield tag="001">BV044287888</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20220307</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">170427s2011 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781616920012</subfield><subfield code="9">978-1-61692-001-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-61692-000-5</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)992514668</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044287888</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Pervasive information security and privacy developments</subfield><subfield code="b">trends and advancements</subfield><subfield code="c">Hamid Nemati (University of North Carolina, Greensboro, USA)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey ; New York</subfield><subfield code="b">Information Science Reference</subfield><subfield code="c">[2011]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxxvii, 428 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Premier reference source</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">1. Examining an individual's perceived need for privacy and security / Taner Pirim, Tabitha James, Katherine Boswell, Brian Reithel, Reza Barkhi -- 2. Forty years of federal legislation in the area of data protection and information security / John Cassini, B. Medlin, Adriana Romaniello -- 3. The impact of privacy legislation on patient care / Jeff Barnett -- 4. A privacy protection model for patient data with multiple sensitive attributes / Tamas Gal, Zhiyuan Chen, Aryya Gangopadhyay -- 5. Protecting patient information in outsourced telehealth services / Patricia Logan, Debra Noles -- 6. Obtaining patient's information from hospital employees through social engineering techniques / B. Medlin, Joseph Cazier -- 7. Effects of individual trust in broadcast media and the Internet on privacy-risking uses of e-health / E. Wilson, David Dobrzykowski, Joseph Cazier -- 8. Safeguarding the privacy of electronic medical records / Jingquan Li, Michael Shaw -- 9. Using statistical texture analysis for medical image tamper proofing / Samia Boucherkha, Mohamed Benmohamed -- 10. Privacy inference disclosure control with access-unrestricted data anonymity / Zude Li -- 11. Designing efficient security services infrastructure for virtualization oriented architectures / Dr. Naqvi -- 12. Architectural support for enhancing critical secrets protection in chip-multiprocessors / Lu Peng, Li Yang, Balachandran Ramadass --</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">13. Memory based anti-forensic tools and techniques / Hamid Jahankhani, Elidon Beqiri -- 14. Life cycle pattern study of malicious codes / June Wei, Randall Reid, Hongmei Zhang -- 15. Trust-based usage control in collaborative environment / Li Yang, Chang Phuong, Andy Novobilski, Raimund Ege -- 16. Will it be disclosure or fabrication of personal information? / Xun Li, Radhika Santhanam -- 17. Computer security practices and perceptions of the next generation of corporate computer users / S. Kruck, Faye Teer -- 18. Design and implementation of a framework for assured information sharing across organizational boundaries / Bhavani Thuraisingham, Yashaswini Kumar, Latifur Khan -- 19. A secure and trustful e-ordering architecture (TOES) for small and medium size enterprises (SMEs) / Spyridon Papastergiou, Despina Polemi -- 20. SEACON / Surya Yadav -- 21. Spam classification based on e-mail path analysis / Palla Srikanth, Dantu Ram, Cangussu Jo ao -- 22. A Decentralized security framework for Web-based social networks / Barbara Carminati, Elena Ferrari, Andrea Perego</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book compiles research on topics such as technical, regulatory, organizational, managerial, cultural, ethical, and human aspects of information security and privacy, offering methodologies, research frameworks, theory development and validation, case studies, simulations, technological architectures, infrastructure issues in design, and implementation of secure and privacy preserving initiatives" - Provided by publisher</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Privacy, Right of</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Nemati, Hamid R.</subfield><subfield code="d">1958-</subfield><subfield code="0">(DE-588)140041923</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-61692-000-5</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1-61692-000-9</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-61692-370-9</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61692-000-5</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield><subfield code="a">ZDB-1-IGE</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029692065</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61692-000-5</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-61692-000-5</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-61692-000-5</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-61692-000-5</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-61692-000-5</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV044287888 |
illustrated | Not Illustrated |
indexdate | 2024-08-23T01:06:30Z |
institution | BVB |
isbn | 9781616920012 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029692065 |
oclc_num | 992514668 |
open_access_boolean | |
owner | DE-706 DE-1049 DE-898 DE-BY-UBR DE-1050 DE-83 |
owner_facet | DE-706 DE-1049 DE-898 DE-BY-UBR DE-1050 DE-83 |
physical | 1 Online-Ressource (xxxvii, 428 Seiten) |
psigel | ZDB-98-IGB ZDB-1-IGE ZDB-98-IGB TUB_EBS_IGB |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Information Science Reference |
record_format | marc |
series2 | Premier reference source |
spelling | Pervasive information security and privacy developments trends and advancements Hamid Nemati (University of North Carolina, Greensboro, USA) Hershey ; New York Information Science Reference [2011] © 2011 1 Online-Ressource (xxxvii, 428 Seiten) txt rdacontent c rdamedia cr rdacarrier Premier reference source Includes bibliographical references 1. Examining an individual's perceived need for privacy and security / Taner Pirim, Tabitha James, Katherine Boswell, Brian Reithel, Reza Barkhi -- 2. Forty years of federal legislation in the area of data protection and information security / John Cassini, B. Medlin, Adriana Romaniello -- 3. The impact of privacy legislation on patient care / Jeff Barnett -- 4. A privacy protection model for patient data with multiple sensitive attributes / Tamas Gal, Zhiyuan Chen, Aryya Gangopadhyay -- 5. Protecting patient information in outsourced telehealth services / Patricia Logan, Debra Noles -- 6. Obtaining patient's information from hospital employees through social engineering techniques / B. Medlin, Joseph Cazier -- 7. Effects of individual trust in broadcast media and the Internet on privacy-risking uses of e-health / E. Wilson, David Dobrzykowski, Joseph Cazier -- 8. Safeguarding the privacy of electronic medical records / Jingquan Li, Michael Shaw -- 9. Using statistical texture analysis for medical image tamper proofing / Samia Boucherkha, Mohamed Benmohamed -- 10. Privacy inference disclosure control with access-unrestricted data anonymity / Zude Li -- 11. Designing efficient security services infrastructure for virtualization oriented architectures / Dr. Naqvi -- 12. Architectural support for enhancing critical secrets protection in chip-multiprocessors / Lu Peng, Li Yang, Balachandran Ramadass -- 13. Memory based anti-forensic tools and techniques / Hamid Jahankhani, Elidon Beqiri -- 14. Life cycle pattern study of malicious codes / June Wei, Randall Reid, Hongmei Zhang -- 15. Trust-based usage control in collaborative environment / Li Yang, Chang Phuong, Andy Novobilski, Raimund Ege -- 16. Will it be disclosure or fabrication of personal information? / Xun Li, Radhika Santhanam -- 17. Computer security practices and perceptions of the next generation of corporate computer users / S. Kruck, Faye Teer -- 18. Design and implementation of a framework for assured information sharing across organizational boundaries / Bhavani Thuraisingham, Yashaswini Kumar, Latifur Khan -- 19. A secure and trustful e-ordering architecture (TOES) for small and medium size enterprises (SMEs) / Spyridon Papastergiou, Despina Polemi -- 20. SEACON / Surya Yadav -- 21. Spam classification based on e-mail path analysis / Palla Srikanth, Dantu Ram, Cangussu Jo ao -- 22. A Decentralized security framework for Web-based social networks / Barbara Carminati, Elena Ferrari, Andrea Perego "This book compiles research on topics such as technical, regulatory, organizational, managerial, cultural, ethical, and human aspects of information security and privacy, offering methodologies, research frameworks, theory development and validation, case studies, simulations, technological architectures, infrastructure issues in design, and implementation of secure and privacy preserving initiatives" - Provided by publisher Information technology / Security measures Data protection Computer security Privacy, Right of Datenschutz (DE-588)4011134-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf (DE-588)4143413-4 Aufsatzsammlung gnd-content Datenschutz (DE-588)4011134-9 s Computersicherheit (DE-588)4274324-2 s DE-604 Nemati, Hamid R. 1958- (DE-588)140041923 edt Erscheint auch als Druck-Ausgabe 978-1-61692-000-5 Erscheint auch als Druck-Ausgabe 1-61692-000-9 Erscheint auch als Druck-Ausgabe 978-1-61692-370-9 http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61692-000-5 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Pervasive information security and privacy developments trends and advancements 1. Examining an individual's perceived need for privacy and security / Taner Pirim, Tabitha James, Katherine Boswell, Brian Reithel, Reza Barkhi -- 2. Forty years of federal legislation in the area of data protection and information security / John Cassini, B. Medlin, Adriana Romaniello -- 3. The impact of privacy legislation on patient care / Jeff Barnett -- 4. A privacy protection model for patient data with multiple sensitive attributes / Tamas Gal, Zhiyuan Chen, Aryya Gangopadhyay -- 5. Protecting patient information in outsourced telehealth services / Patricia Logan, Debra Noles -- 6. Obtaining patient's information from hospital employees through social engineering techniques / B. Medlin, Joseph Cazier -- 7. Effects of individual trust in broadcast media and the Internet on privacy-risking uses of e-health / E. Wilson, David Dobrzykowski, Joseph Cazier -- 8. Safeguarding the privacy of electronic medical records / Jingquan Li, Michael Shaw -- 9. Using statistical texture analysis for medical image tamper proofing / Samia Boucherkha, Mohamed Benmohamed -- 10. Privacy inference disclosure control with access-unrestricted data anonymity / Zude Li -- 11. Designing efficient security services infrastructure for virtualization oriented architectures / Dr. Naqvi -- 12. Architectural support for enhancing critical secrets protection in chip-multiprocessors / Lu Peng, Li Yang, Balachandran Ramadass -- 13. Memory based anti-forensic tools and techniques / Hamid Jahankhani, Elidon Beqiri -- 14. Life cycle pattern study of malicious codes / June Wei, Randall Reid, Hongmei Zhang -- 15. Trust-based usage control in collaborative environment / Li Yang, Chang Phuong, Andy Novobilski, Raimund Ege -- 16. Will it be disclosure or fabrication of personal information? / Xun Li, Radhika Santhanam -- 17. Computer security practices and perceptions of the next generation of corporate computer users / S. Kruck, Faye Teer -- 18. Design and implementation of a framework for assured information sharing across organizational boundaries / Bhavani Thuraisingham, Yashaswini Kumar, Latifur Khan -- 19. A secure and trustful e-ordering architecture (TOES) for small and medium size enterprises (SMEs) / Spyridon Papastergiou, Despina Polemi -- 20. SEACON / Surya Yadav -- 21. Spam classification based on e-mail path analysis / Palla Srikanth, Dantu Ram, Cangussu Jo ao -- 22. A Decentralized security framework for Web-based social networks / Barbara Carminati, Elena Ferrari, Andrea Perego Information technology / Security measures Data protection Computer security Privacy, Right of Datenschutz (DE-588)4011134-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4011134-9 (DE-588)4274324-2 (DE-588)4143413-4 |
title | Pervasive information security and privacy developments trends and advancements |
title_auth | Pervasive information security and privacy developments trends and advancements |
title_exact_search | Pervasive information security and privacy developments trends and advancements |
title_full | Pervasive information security and privacy developments trends and advancements Hamid Nemati (University of North Carolina, Greensboro, USA) |
title_fullStr | Pervasive information security and privacy developments trends and advancements Hamid Nemati (University of North Carolina, Greensboro, USA) |
title_full_unstemmed | Pervasive information security and privacy developments trends and advancements Hamid Nemati (University of North Carolina, Greensboro, USA) |
title_short | Pervasive information security and privacy developments |
title_sort | pervasive information security and privacy developments trends and advancements |
title_sub | trends and advancements |
topic | Information technology / Security measures Data protection Computer security Privacy, Right of Datenschutz (DE-588)4011134-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Information technology / Security measures Data protection Computer security Privacy, Right of Datenschutz Computersicherheit Aufsatzsammlung |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61692-000-5 |
work_keys_str_mv | AT nematihamidr pervasiveinformationsecurityandprivacydevelopmentstrendsandadvancements |