Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues (Advances in Information Security and Privacy) [1 ed.]
1605662100, 9781605662107
Table of contents : Title ......Page 2 Associate Editors......Page 6 Table of Contents......Page 8 Detailed Table of Contents......Page 12 Preface......Page 23 A Rule-Based and Game-Theoretic Approach to On-Line Credit Card Fraud Detection......Page 38 Email Worm Detection Using Data Mining......Page 57 Information Systems Security: Cases of Network Administrator Threats......Page 72 Rootkits and What We Know: Assessing U.S. and Korean Knowledge and Perceptions......Page 84 Privacy-Preserving Data Mining and the Need for Confluence of Research and Practice......Page 97 A Dimensionality Reduction-Based Transformation to Support Business Collaboration......Page 116 Privacy-Preserving Transactions Protocol using Mobile Agents with Mutual Authentication......Page 140 Dynamic Control Mechanisms for User Privacy Enhancement......Page 152 A Projection of the Future Effects of Quantum Computation on Information Privacy......Page 175 On the Design of an Authentication System Based on Keystroke Dynamics Using a Predefined Input Text......Page 186 Defeating Active Phishing Attacks for Web-Based Transactions......Page 198 A Content-Based Watermarking Scheme for Image Authentication Using Discrete Wavelet Transform Inter-Coefficient Relations......Page 210 Privacy and Security in the Age of Electronic Customer Relationship Management......Page 226 The Impact of Privacy Risk Harm (RH) and Risk Likelihood (RL) on IT Acceptance: An Examination of a Student Information System......Page 248 Ignorance is Bliss: The Effect of Increased Knowledge on Privacy Concerns and Internet Shopping Site Personalization Preferences......Page 262 Trustworthy Web Services: An Experience-Based Model for Trustworthiness Evaluation......Page 282 Administering the Semantic Web: Confidentiality, Privacy and Trust Management......Page 299 An Ontology of Information Security......Page 315 Information Security Effectiveness: Conceptualization and Validation of a Theory......Page 340 A Simulation Model of IS Security......Page 364 Compilation of References......Page 377 About the Contributors......Page 403 Index......Page 413