Title |
Strategic and practical approaches for information security governance : technologies and applied solutions / Manish Gupta, John Walp, Raj Sharman, editors. |
OCLC |
00058283 |
ISBN |
9781466601987 (ebook) |
|
9781466601970 (hardcover) |
|
9781466601994 (print & perpetual access) |
ISBN/ISSN |
10.4018/978-1-4666-0197-0 doi |
Publisher |
Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), [2012] |
|
©2012 |
Description |
electronic texts (420 pages) : digital files |
LC Subject heading/s |
Computer networks -- Security measures.
|
|
Information networks -- Security measures.
|
|
Data protection -- Security measures.
|
Bibliography |
Includes bibliographical references. |
Contents |
1. Investigating the concept of information security culture / Daniel Oost and Eng K. Chew -- 2. Assessing market compliance of IT security solutions: a structured approach using diffusion of innovations theory / Heiko Rossnagel and Jan Zibuschka -- 3. Identity assurance in open networks / Ivonne Thomas and Christoph Meinel -- 4. Information security governance / Janne J. Korhonen, Kari Hiekkanen and Juha Mykkänen -- 5. Enterprise information security policies, standards, and procedures: a survey of available standards and guidelines / Syed Irfan Nabi, Ghmlas Saleh Al-Ghmlas and Khaled Alghathbar -- 6. ISMS building for SMEs through the reuse of knowledge / Lus Enrique Sánchez, Antonio Santos-Olmo, Eduardo Fernandez-Medina and Mario Piattini -- 7. Information security and management in social network / Alkesh Patel and Ajit Balakrishnan -- 8. Music is the key: using our enduring memory for songs to help users log on / Marcia Gibson ... [et al.] -- 9. Information system integrated security / Milena Tvrdková -- 10. Surveillance communities of practice: supporting aspects of information assurance for safeguards and compliance monitoring / Peter Goldschmidt -- 11. Not every cloud brings rain: legal risks on the horizon / Sylvia Kierkegaard -- 12. Securing the extended enterprise: a method for analyzing external insider threat / Virginia N. L. Franqueira ... [et al.] -- |
|
13. Information security management systems cybernetics / Wolfgang Boehmer -- 14. Fraud and identity theft issues / Ranaganayakulu Dhanalakshmi and Chenniappan Chellappan -- 15. Information security governance and standard based management systems / Margareth Stoll and Ruth Breu -- 16. A construct grid approach to security classification and analysis / Michael Van Hilst and Eduardo B. Fernandez -- 17. Towards an organizational culture framework for information security practices / Joo Soon Lim ... [et al.] -- 18. Establishment of enterprise secured information architecture / Shyh-Chang Liu and Tsang- Hung Wu -- 19. Information security management based on adaptive security policy using user behavior analysis / Ines Brosso and Alessandro La Neve -- 20. Detecting credit fraud in e-business system: an information security perspective on the banking sector in UK / Md Delwar Hussain Mahdi and Karim Mohammed Rezaul -- 21. Safeguarding Australia from cyber-terrorism: a SCADA risk framework / Christopher Beggs and Matthew Warren -- 22. Detecting compliance failures in unmanaged processes / Yurdaer N. Doganata -- 23. Loss of data: reflective case studies / Ian Rosewall and Matt Warren. |
Restrictions |
Restricted to subscribers or individual electronic text purchasers. |
|
Unlimited user license access. |
Abstract |
"This book provides organizations with insights into practical and applied solutions, frameworks, technologies and practices on technological and organizational factors in information security"--Provided by publisher. |
Additional physical form available note |
Also available in print. |
System details note |
Mode of access: World Wide Web. |
Source of Description |
Description based on title screen (IGI Global, viewed January 23, 2012). |
|