Strategic and practical approaches for information security governance: technologies and applied solutions
"This book provides organizations with insights into practical and applied solutions, frameworks, technologies and practices on technological and organizational factors in information security" - Provided by publisher
Gespeichert in:
Weitere Verfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey PA
Information Science Reference
[2012]
|
Schriftenreihe: | Premier reference source
|
Schlagworte: | |
Online-Zugang: | DE-706 DE-1049 DE-898 DE-1050 DE-83 Volltext |
Zusammenfassung: | "This book provides organizations with insights into practical and applied solutions, frameworks, technologies and practices on technological and organizational factors in information security" - Provided by publisher |
Beschreibung: | Includes bibliographical references |
Beschreibung: | 1 Online-Ressource (xxiv, 467 Seiten) |
ISBN: | 9781466601987 9781466601994 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV044453414 | ||
003 | DE-604 | ||
005 | 20171213 | ||
007 | cr|uuu---uuuuu | ||
008 | 170818s2012 |||| o||u| ||||||eng d | ||
020 | |a 9781466601987 |9 978-1-4666-0198-7 | ||
020 | |a 9781466601994 |c print & perpetual access |9 978-1-4666-0199-4 | ||
024 | 7 | |a 10.4018/978-1-4666-0197-0 |2 doi | |
035 | |a (OCoLC)1002270497 | ||
035 | |a (DE-599)BVBBV044453414 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-1049 |a DE-898 |a DE-1050 |a DE-83 | ||
245 | 1 | 0 | |a Strategic and practical approaches for information security governance |b technologies and applied solutions |c Manish Gupta (State University of New York, Buffalo, USA), John Walp (M&T Bank Corporation, USA), Raj Sharman (State University of New York, Buffalo, USA) |
264 | 1 | |a Hershey PA |b Information Science Reference |c [2012] | |
264 | 4 | |c © 2012 | |
300 | |a 1 Online-Ressource (xxiv, 467 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Premier reference source | |
500 | |a Includes bibliographical references | ||
505 | 8 | |a 1. Investigating the concept of information security culture / Daniel Oost and Eng K. Chew -- 2. Assessing market compliance of IT security solutions: a structured approach using diffusion of innovations theory / Heiko Rossnagel and Jan Zibuschka -- 3. Identity assurance in open networks / Ivonne Thomas and Christoph Meinel -- 4. Information security governance / Janne J. Korhonen, Kari Hiekkanen and Juha Mykk anen -- 5. Enterprise information security policies, standards, and procedures: a survey of available standards and guidelines / Syed Irfan Nabi, Ghmlas Saleh Al-Ghmlas and Khaled Alghathbar -- 6. ISMS building for SMEs through the reuse of knowledge / Lu s Enrique S anchez, Antonio Santos-Olmo, Eduardo Fernandez-Medina and Mario Piattini -- 7. Information security and management in social network / Alkesh Patel and Ajit Balakrishnan -- 8. Music is the key: using our enduring memory for songs to help users log on / Marcia Gibson ... [et al.] -- 9. Information system integrated security / Milena Tvrd kov a -- 10. Surveillance communities of practice: supporting aspects of information assurance for safeguards and compliance monitoring / Peter Goldschmidt -- 11. Not every cloud brings rain: legal risks on the horizon / Sylvia Kierkegaard -- 12. Securing the extended enterprise: a method for analyzing external insider threat / Virginia N. L. Franqueira ... [et al.] -- | |
505 | 8 | |a 13. Information security management systems cybernetics / Wolfgang Boehmer -- 14. Fraud and identity theft issues / Ranaganayakulu Dhanalakshmi and Chenniappan Chellappan -- 15. Information security governance and standard based management systems / Margareth Stoll and Ruth Breu -- 16. A construct grid approach to security classification and analysis / Michael Van Hilst and Eduardo B. Fernandez -- 17. Towards an organizational culture framework for information security practices / Joo Soon Lim ... [et al.] -- 18. Establishment of enterprise secured information architecture / Shyh-Chang Liu and Tsang- Hung Wu -- 19. Information security management based on adaptive security policy using user behavior analysis / Ines Brosso and Alessandro La Neve -- 20. Detecting credit fraud in e-business system: an information security perspective on the banking sector in UK / Md Delwar Hussain Mahdi and Karim Mohammed Rezaul -- 21. Safeguarding Australia from cyber-terrorism: a SCADA risk framework / Christopher Beggs and Matthew Warren -- 22. Detecting compliance failures in unmanaged processes / Yurdaer N. Doganata -- 23. Loss of data: reflective case studies / Ian Rosewall and Matt Warren | |
520 | |a "This book provides organizations with insights into practical and applied solutions, frameworks, technologies and practices on technological and organizational factors in information security" - Provided by publisher | ||
650 | 4 | |a Computer networks / Security measures | |
650 | 4 | |a Information networks / Security measures | |
650 | 4 | |a Data protection / Security measures | |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
700 | 1 | |a Gupta, Manish |d 1978- |0 (DE-588)1056031018 |4 edt | |
700 | 1 | |a Walp, John |4 edt | |
700 | 1 | |a Sharman, Raj |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-4666-0197-0 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1-4666-0197-3 |
856 | 4 | 0 | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-0197-0 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB |a ZDB-1-IGE | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-029854271 | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-0197-0 |l DE-706 |p ZDB-98-IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-4666-0197-0 |l DE-1049 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-4666-0197-0 |l DE-898 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-4666-0197-0 |l DE-1050 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-4666-0197-0 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1808138511695478784 |
---|---|
adam_text | |
any_adam_object | |
author2 | Gupta, Manish 1978- Walp, John Sharman, Raj |
author2_role | edt edt edt |
author2_variant | m g mg j w jw r s rs |
author_GND | (DE-588)1056031018 |
author_facet | Gupta, Manish 1978- Walp, John Sharman, Raj |
building | Verbundindex |
bvnumber | BV044453414 |
collection | ZDB-98-IGB ZDB-1-IGE |
contents | 1. Investigating the concept of information security culture / Daniel Oost and Eng K. Chew -- 2. Assessing market compliance of IT security solutions: a structured approach using diffusion of innovations theory / Heiko Rossnagel and Jan Zibuschka -- 3. Identity assurance in open networks / Ivonne Thomas and Christoph Meinel -- 4. Information security governance / Janne J. Korhonen, Kari Hiekkanen and Juha Mykk anen -- 5. Enterprise information security policies, standards, and procedures: a survey of available standards and guidelines / Syed Irfan Nabi, Ghmlas Saleh Al-Ghmlas and Khaled Alghathbar -- 6. ISMS building for SMEs through the reuse of knowledge / Lu s Enrique S anchez, Antonio Santos-Olmo, Eduardo Fernandez-Medina and Mario Piattini -- 7. Information security and management in social network / Alkesh Patel and Ajit Balakrishnan -- 8. Music is the key: using our enduring memory for songs to help users log on / Marcia Gibson ... [et al.] -- 9. Information system integrated security / Milena Tvrd kov a -- 10. Surveillance communities of practice: supporting aspects of information assurance for safeguards and compliance monitoring / Peter Goldschmidt -- 11. Not every cloud brings rain: legal risks on the horizon / Sylvia Kierkegaard -- 12. Securing the extended enterprise: a method for analyzing external insider threat / Virginia N. L. Franqueira ... [et al.] -- 13. Information security management systems cybernetics / Wolfgang Boehmer -- 14. Fraud and identity theft issues / Ranaganayakulu Dhanalakshmi and Chenniappan Chellappan -- 15. Information security governance and standard based management systems / Margareth Stoll and Ruth Breu -- 16. A construct grid approach to security classification and analysis / Michael Van Hilst and Eduardo B. Fernandez -- 17. Towards an organizational culture framework for information security practices / Joo Soon Lim ... [et al.] -- 18. Establishment of enterprise secured information architecture / Shyh-Chang Liu and Tsang- Hung Wu -- 19. Information security management based on adaptive security policy using user behavior analysis / Ines Brosso and Alessandro La Neve -- 20. Detecting credit fraud in e-business system: an information security perspective on the banking sector in UK / Md Delwar Hussain Mahdi and Karim Mohammed Rezaul -- 21. Safeguarding Australia from cyber-terrorism: a SCADA risk framework / Christopher Beggs and Matthew Warren -- 22. Detecting compliance failures in unmanaged processes / Yurdaer N. Doganata -- 23. Loss of data: reflective case studies / Ian Rosewall and Matt Warren |
ctrlnum | (OCoLC)1002270497 (DE-599)BVBBV044453414 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000zc 4500</leader><controlfield tag="001">BV044453414</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20171213</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">170818s2012 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781466601987</subfield><subfield code="9">978-1-4666-0198-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781466601994</subfield><subfield code="c">print & perpetual access</subfield><subfield code="9">978-1-4666-0199-4</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-4666-0197-0</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1002270497</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044453414</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Strategic and practical approaches for information security governance</subfield><subfield code="b">technologies and applied solutions</subfield><subfield code="c">Manish Gupta (State University of New York, Buffalo, USA), John Walp (M&T Bank Corporation, USA), Raj Sharman (State University of New York, Buffalo, USA)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey PA</subfield><subfield code="b">Information Science Reference</subfield><subfield code="c">[2012]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxiv, 467 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Premier reference source</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">1. Investigating the concept of information security culture / Daniel Oost and Eng K. Chew -- 2. Assessing market compliance of IT security solutions: a structured approach using diffusion of innovations theory / Heiko Rossnagel and Jan Zibuschka -- 3. Identity assurance in open networks / Ivonne Thomas and Christoph Meinel -- 4. Information security governance / Janne J. Korhonen, Kari Hiekkanen and Juha Mykk anen -- 5. Enterprise information security policies, standards, and procedures: a survey of available standards and guidelines / Syed Irfan Nabi, Ghmlas Saleh Al-Ghmlas and Khaled Alghathbar -- 6. ISMS building for SMEs through the reuse of knowledge / Lu s Enrique S anchez, Antonio Santos-Olmo, Eduardo Fernandez-Medina and Mario Piattini -- 7. Information security and management in social network / Alkesh Patel and Ajit Balakrishnan -- 8. Music is the key: using our enduring memory for songs to help users log on / Marcia Gibson ... [et al.] -- 9. Information system integrated security / Milena Tvrd kov a -- 10. Surveillance communities of practice: supporting aspects of information assurance for safeguards and compliance monitoring / Peter Goldschmidt -- 11. Not every cloud brings rain: legal risks on the horizon / Sylvia Kierkegaard -- 12. Securing the extended enterprise: a method for analyzing external insider threat / Virginia N. L. Franqueira ... [et al.] --</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">13. Information security management systems cybernetics / Wolfgang Boehmer -- 14. Fraud and identity theft issues / Ranaganayakulu Dhanalakshmi and Chenniappan Chellappan -- 15. Information security governance and standard based management systems / Margareth Stoll and Ruth Breu -- 16. A construct grid approach to security classification and analysis / Michael Van Hilst and Eduardo B. Fernandez -- 17. Towards an organizational culture framework for information security practices / Joo Soon Lim ... [et al.] -- 18. Establishment of enterprise secured information architecture / Shyh-Chang Liu and Tsang- Hung Wu -- 19. Information security management based on adaptive security policy using user behavior analysis / Ines Brosso and Alessandro La Neve -- 20. Detecting credit fraud in e-business system: an information security perspective on the banking sector in UK / Md Delwar Hussain Mahdi and Karim Mohammed Rezaul -- 21. Safeguarding Australia from cyber-terrorism: a SCADA risk framework / Christopher Beggs and Matthew Warren -- 22. Detecting compliance failures in unmanaged processes / Yurdaer N. Doganata -- 23. Loss of data: reflective case studies / Ian Rosewall and Matt Warren</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book provides organizations with insights into practical and applied solutions, frameworks, technologies and practices on technological and organizational factors in information security" - Provided by publisher</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection / Security measures</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gupta, Manish</subfield><subfield code="d">1978-</subfield><subfield code="0">(DE-588)1056031018</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Walp, John</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sharman, Raj</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-4666-0197-0</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1-4666-0197-3</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-0197-0</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield><subfield code="a">ZDB-1-IGE</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029854271</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-0197-0</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-4666-0197-0</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-4666-0197-0</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-4666-0197-0</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-4666-0197-0</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV044453414 |
illustrated | Not Illustrated |
indexdate | 2024-08-23T01:07:39Z |
institution | BVB |
isbn | 9781466601987 9781466601994 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029854271 |
oclc_num | 1002270497 |
open_access_boolean | |
owner | DE-706 DE-1049 DE-898 DE-BY-UBR DE-1050 DE-83 |
owner_facet | DE-706 DE-1049 DE-898 DE-BY-UBR DE-1050 DE-83 |
physical | 1 Online-Ressource (xxiv, 467 Seiten) |
psigel | ZDB-98-IGB ZDB-1-IGE ZDB-98-IGB TUB_EBS_IGB |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Information Science Reference |
record_format | marc |
series2 | Premier reference source |
spelling | Strategic and practical approaches for information security governance technologies and applied solutions Manish Gupta (State University of New York, Buffalo, USA), John Walp (M&T Bank Corporation, USA), Raj Sharman (State University of New York, Buffalo, USA) Hershey PA Information Science Reference [2012] © 2012 1 Online-Ressource (xxiv, 467 Seiten) txt rdacontent c rdamedia cr rdacarrier Premier reference source Includes bibliographical references 1. Investigating the concept of information security culture / Daniel Oost and Eng K. Chew -- 2. Assessing market compliance of IT security solutions: a structured approach using diffusion of innovations theory / Heiko Rossnagel and Jan Zibuschka -- 3. Identity assurance in open networks / Ivonne Thomas and Christoph Meinel -- 4. Information security governance / Janne J. Korhonen, Kari Hiekkanen and Juha Mykk anen -- 5. Enterprise information security policies, standards, and procedures: a survey of available standards and guidelines / Syed Irfan Nabi, Ghmlas Saleh Al-Ghmlas and Khaled Alghathbar -- 6. ISMS building for SMEs through the reuse of knowledge / Lu s Enrique S anchez, Antonio Santos-Olmo, Eduardo Fernandez-Medina and Mario Piattini -- 7. Information security and management in social network / Alkesh Patel and Ajit Balakrishnan -- 8. Music is the key: using our enduring memory for songs to help users log on / Marcia Gibson ... [et al.] -- 9. Information system integrated security / Milena Tvrd kov a -- 10. Surveillance communities of practice: supporting aspects of information assurance for safeguards and compliance monitoring / Peter Goldschmidt -- 11. Not every cloud brings rain: legal risks on the horizon / Sylvia Kierkegaard -- 12. Securing the extended enterprise: a method for analyzing external insider threat / Virginia N. L. Franqueira ... [et al.] -- 13. Information security management systems cybernetics / Wolfgang Boehmer -- 14. Fraud and identity theft issues / Ranaganayakulu Dhanalakshmi and Chenniappan Chellappan -- 15. Information security governance and standard based management systems / Margareth Stoll and Ruth Breu -- 16. A construct grid approach to security classification and analysis / Michael Van Hilst and Eduardo B. Fernandez -- 17. Towards an organizational culture framework for information security practices / Joo Soon Lim ... [et al.] -- 18. Establishment of enterprise secured information architecture / Shyh-Chang Liu and Tsang- Hung Wu -- 19. Information security management based on adaptive security policy using user behavior analysis / Ines Brosso and Alessandro La Neve -- 20. Detecting credit fraud in e-business system: an information security perspective on the banking sector in UK / Md Delwar Hussain Mahdi and Karim Mohammed Rezaul -- 21. Safeguarding Australia from cyber-terrorism: a SCADA risk framework / Christopher Beggs and Matthew Warren -- 22. Detecting compliance failures in unmanaged processes / Yurdaer N. Doganata -- 23. Loss of data: reflective case studies / Ian Rosewall and Matt Warren "This book provides organizations with insights into practical and applied solutions, frameworks, technologies and practices on technological and organizational factors in information security" - Provided by publisher Computer networks / Security measures Information networks / Security measures Data protection / Security measures (DE-588)4143413-4 Aufsatzsammlung gnd-content Gupta, Manish 1978- (DE-588)1056031018 edt Walp, John edt Sharman, Raj edt Erscheint auch als Druck-Ausgabe 978-1-4666-0197-0 Erscheint auch als Druck-Ausgabe 1-4666-0197-3 http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-0197-0 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Strategic and practical approaches for information security governance technologies and applied solutions 1. Investigating the concept of information security culture / Daniel Oost and Eng K. Chew -- 2. Assessing market compliance of IT security solutions: a structured approach using diffusion of innovations theory / Heiko Rossnagel and Jan Zibuschka -- 3. Identity assurance in open networks / Ivonne Thomas and Christoph Meinel -- 4. Information security governance / Janne J. Korhonen, Kari Hiekkanen and Juha Mykk anen -- 5. Enterprise information security policies, standards, and procedures: a survey of available standards and guidelines / Syed Irfan Nabi, Ghmlas Saleh Al-Ghmlas and Khaled Alghathbar -- 6. ISMS building for SMEs through the reuse of knowledge / Lu s Enrique S anchez, Antonio Santos-Olmo, Eduardo Fernandez-Medina and Mario Piattini -- 7. Information security and management in social network / Alkesh Patel and Ajit Balakrishnan -- 8. Music is the key: using our enduring memory for songs to help users log on / Marcia Gibson ... [et al.] -- 9. Information system integrated security / Milena Tvrd kov a -- 10. Surveillance communities of practice: supporting aspects of information assurance for safeguards and compliance monitoring / Peter Goldschmidt -- 11. Not every cloud brings rain: legal risks on the horizon / Sylvia Kierkegaard -- 12. Securing the extended enterprise: a method for analyzing external insider threat / Virginia N. L. Franqueira ... [et al.] -- 13. Information security management systems cybernetics / Wolfgang Boehmer -- 14. Fraud and identity theft issues / Ranaganayakulu Dhanalakshmi and Chenniappan Chellappan -- 15. Information security governance and standard based management systems / Margareth Stoll and Ruth Breu -- 16. A construct grid approach to security classification and analysis / Michael Van Hilst and Eduardo B. Fernandez -- 17. Towards an organizational culture framework for information security practices / Joo Soon Lim ... [et al.] -- 18. Establishment of enterprise secured information architecture / Shyh-Chang Liu and Tsang- Hung Wu -- 19. Information security management based on adaptive security policy using user behavior analysis / Ines Brosso and Alessandro La Neve -- 20. Detecting credit fraud in e-business system: an information security perspective on the banking sector in UK / Md Delwar Hussain Mahdi and Karim Mohammed Rezaul -- 21. Safeguarding Australia from cyber-terrorism: a SCADA risk framework / Christopher Beggs and Matthew Warren -- 22. Detecting compliance failures in unmanaged processes / Yurdaer N. Doganata -- 23. Loss of data: reflective case studies / Ian Rosewall and Matt Warren Computer networks / Security measures Information networks / Security measures Data protection / Security measures |
subject_GND | (DE-588)4143413-4 |
title | Strategic and practical approaches for information security governance technologies and applied solutions |
title_auth | Strategic and practical approaches for information security governance technologies and applied solutions |
title_exact_search | Strategic and practical approaches for information security governance technologies and applied solutions |
title_full | Strategic and practical approaches for information security governance technologies and applied solutions Manish Gupta (State University of New York, Buffalo, USA), John Walp (M&T Bank Corporation, USA), Raj Sharman (State University of New York, Buffalo, USA) |
title_fullStr | Strategic and practical approaches for information security governance technologies and applied solutions Manish Gupta (State University of New York, Buffalo, USA), John Walp (M&T Bank Corporation, USA), Raj Sharman (State University of New York, Buffalo, USA) |
title_full_unstemmed | Strategic and practical approaches for information security governance technologies and applied solutions Manish Gupta (State University of New York, Buffalo, USA), John Walp (M&T Bank Corporation, USA), Raj Sharman (State University of New York, Buffalo, USA) |
title_short | Strategic and practical approaches for information security governance |
title_sort | strategic and practical approaches for information security governance technologies and applied solutions |
title_sub | technologies and applied solutions |
topic | Computer networks / Security measures Information networks / Security measures Data protection / Security measures |
topic_facet | Computer networks / Security measures Information networks / Security measures Data protection / Security measures Aufsatzsammlung |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-0197-0 |
work_keys_str_mv | AT guptamanish strategicandpracticalapproachesforinformationsecuritygovernancetechnologiesandappliedsolutions AT walpjohn strategicandpracticalapproachesforinformationsecuritygovernancetechnologiesandappliedsolutions AT sharmanraj strategicandpracticalapproachesforinformationsecuritygovernancetechnologiesandappliedsolutions |