You are previewing Analyzing Security, Trust, and Crime in the Digital World.
O'Reilly logo
Analyzing Security, Trust, and Crime in the Digital World

Book Description

In the digital era, information is the most valuable resource, and protecting one’s assets is a constant struggle for both individuals and organizations. Analyzing Security, Trust, and Crime in the Digital World explores techniques and technologies used to secure data and prevent intrusion in virtual environments. Within these pages, computer scientists, programmers, engineers, and practitioners will find meaningful research on intrusion detection and authentication techniques in order to further defend their own systems and protect the information therein.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Book Series
  5. Dedication
  6. Preface
    1. OUR DIGITAL NETWORKED WORLD: ISSUES, CHALLENGES, AND OPPORTUNITIES
    2. LAYOUT OF THE BOOK
    3. REFERENCES
  7. Chapter 1: A General Framework of Algorithm-Based Fault Tolerance Technique for Computing Systems
    1. ABSTRACT
    2. INTRODUCTION
    3. CHARACTERISTICS OF ABFT
    4. ERROR CONTROL CODING
    5. ARCHITECTURE OF ABFT
    6. CLASS OF CONVOLUTIONALAL CODE: BINARY BURST-CORRECTING CONVOLUTIONALAL
    7. DECODING
    8. ERROR CORRECTION SYSTEM
    9. RESULTS
    10. ERROR CORRECTION AND MEAN SQUARE ERROR (MSE) PERFORMANCE
    11. SIMULATIONS AND EXPERIMENT RESULTS
    12. CONCLUSION
    13. ACKNOWLEDGMENT
    14. REFERENCES
  8. Chapter 2: Methods on Determining the Investment in IT Security
    1. ABSTRACT
    2. INTRODUCTION
    3. TYPES OF SECURITY BREACHES
    4. COST OF EXPOSURE TO A SECURITY BREACH
    5. RISK
    6. INVESTMENT IN IT SECURITY
    7. ANNUAL LOSS EXPECTANCY
    8. NET PRESENT VALUE AND INTERNAL RATE OF RETURN
    9. BALANCED SCORECARD APPROACH
    10. CHOOSING THE MODEL TO USE
    11. CONCLUSION
    12. REFERENCES
    13. ENDNOTES
  9. Chapter 3: Critical Path Stability Region
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. LINEAR PROGRAM FORMULATION WITH A NEW SOLUTION TECHNIQUE
    4. 3. AN ILLUSTRATIVE NUMERICAL EXAMPLE
    5. 4. DATA PERTURBATION ANALYSIS
    6. 5. CONCLUSION
    7. ACKNOWLEDGMENT
    8. REFERENCES
  10. Chapter 4: Authenticity in Online Knowledge Sharing
    1. ABSTRACT
    2. INTRODUCTION
    3. CASE DISCRIPTION
    4. THE ROLE OF AUTHENTICITY IN KNOWLEDGE SHARING
    5. CASE DESCRIPTION
    6. GOTOMEETING™ FACILITATING LEARNING ACTIVITES ACROSS BOUNDARIES
    7. DISCUSSION AND CONCLUSION
    8. REFERENCES
  11. Chapter 5: Information Privacy Concerns and Workplace Surveillance
    1. ABSTRACT
    2. INTRODUCTION
    3. INFORMATION PRIVACY
    4. SURVEILLANCE: AN EMPLOYEE PERSPECTIVE
    5. SURVEILLANCE: A MANAGEMENT PERSPECTIVE
    6. ORGANIZATIONAL JUSTICE AND WORKPLACE SURVEILLANCE
    7. WORKPLACE SURVEILLANCE ETHICS
    8. THE ROLE OF PRIVACY LEGISLATION
    9. FUTURE RESEARCH DIRECTIONS
    10. CONCLUSION
    11. ACKNOWLEDGMENT
    12. REFERENCES
  12. Chapter 6: Wearable Computing
    1. ABSTRACT
    2. INTRODUCTION
    3. TOWARDS ALIGNING THE USE OF WEARABLE COMPUTERS WITH SECURITY AND LEGAL ASPECTS
    4. METHODOLOGY
    5. SECURITY CHALLENGES FOR WEARABLE COMPUTING
    6. NOVEL IDEAS ON SECURITY
    7. SELECTED LEGAL ASPECTS ON SECURITY FOR WEARABLE COMPUTING
    8. ANALYSIS
    9. CONCLUSION
    10. FUTURE WORK
    11. ACKNOWLEDGMENT
    12. REFERENCES
    13. ENDNOTES
    14. APPENDIX
  13. Chapter 7: Control Mechanism of Identity Theft and Its Integrative Impact on Consumers' Purchase Intention in E-Commerce
    1. ABSTRACT
    2. BACKGROUND
    3. IDENTITY THEFT AND DIFFERENT SOURCES
    4. MEASURING TOOLS TO PREVENT/CONTROL IDENTITY THEFT
    5. IDENTITY THEFT SOURCE-CONTROLLING TOOLS RELATIONS
    6. RESEARCH METHODOLOGY
    7. CONCLUSION AND FUTURE RESEARCH DIRECTION
    8. REFERENCES
    9. APPENDIX
  14. Chapter 8: The Influence of Trust in the UTAUT Model
    1. ABSTRACT
    2. ADOPTION PROCESS FOR VoIP: THE UTAUT MODEL
    3. METHODOLOGY AND SAMPLE
    4. RESULTS
    5. DISCUSSION
    6. REFERENCES
    7. APPENDIX
  15. Chapter 9: Technology-Related Risks in Virtual and Traditional Information Systems Projects
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. METHODOLOGY
    5. HYPOTHESES
    6. SURVEY POPULATION AND DEMOGRAPHICS
    7. RESULTS AND DISCUSSION
    8. LIMITATIONS AND FUTURE WORK
    9. CONCLUSION
    10. REFERENCES
  16. Chapter 10: A Likelihood Ratio-Based Forensic Text Comparison in SMS Messages
    1. ABSTRACT
    2. 1. PREAMBLE
    3. 2. GENERAL INTRODUCTION
    4. 3. FORENSIC AUTHORSHIP ANALYSIS
    5. 4. LIKELIHOOD-RATIO APPROACH
    6. 5. RELATED STUDIES
    7. 6. LOGISTIC REGRESSION FUSION
    8. 7. FUSED RESULTS AND DISCUSSIONS
    9. 8. CONCLUSION
    10. 9. ACKNOWLEDGMENT
    11. REFERENCES
    12. ENDNOTES
  17. Related References
  18. Compilation of References
  19. About the Contributors