You are previewing Digital Business Security Development: Management Technologies.
O'Reilly logo
Digital Business Security Development: Management Technologies

Book Description

Digital Business Security Development: Management Technologies provides comprehensive coverage of issues associated with maintaining business protection in digital environments. Containing state-of-the-art research relevant to informing business practice, this Premier Reference Source provides base level knowledge for managers who are not specialists in the field as well as advanced undergraduate and postgraduate students undertaking research and further study.

Table of Contents

  1. Copyright
  2. Editorial Advisory Board
  3. Preface
    1. INTRODUCTION
    2. THE OVERALL OBJECTIVES OF THE BOOK
    3. THE TARGET AUDIENCE
    4. BOOK CONTENT
  4. Acknowledgment
  5. 1. Overview of Digital Business Security Issues
    1. ABSTRACT
    2. INTRODUCTION
      1. Analysis of the Risks and Threats
      2. Risks to Customers
      3. Risks to the Business
      4. Information Technology Managers' Perspective on Security
    3. A PUBLIC SECTOR PERSPECTIVE ON SECURITY MANAGEMENT
      1. A Private Sector Perspective on Security Management
      2. Management of the Risks and Threats
      3. Planning for Possible Contingencies
      4. Digital Evidence
      5. Digital Evidence in the Legal Domain
      6. Digital Evidence and the Public and Private Sectors
      7. Evidence and Digital Evidence
      8. Direct Evidence and Circumstantial Evidence
      9. Hearsay Evidence
      10. Expert Evidence
    4. CONCLUSION
    5. ACKNOWLEDGMENT
    6. REFERENCES
    7. ENDNOTES
  6. 2. Digital Evidence
    1. ABSTRACT
    2. INTRODUCTION: THE INVESTIGATION DOMAIN
      1. Preserving the Evidence
      2. Locating the Evidence
      3. Selecting the evidence
        1. Motive
        2. Means
        3. Opportunity
      4. Validating the Evidence
      5. Presenting Digital Evidence in Legal Cases
      6. Admissibility of Evidence
      7. Weight of Evidence
      8. Constructing Legal Argument
      9. Difficulties Using Digital Evidence in Legal Oases
      10. How Well does Computer Security Protect Digital Evidence?
      11. Proof of Innocence
      12. Why a sound understanding of Digital Evidence is Essential
      13. Implications for Business Managers
    3. CONCLUSION
    4. ACKNOWLEDGMENT
    5. REFERENCES
  7. 3. Recent Developments in Simplified Sign-On
    1. ABSTRACT
    2. INTRODUCTION
      1. Simplified Sign-On Implementations
      2. Shibboleth
      3. Microsoft Windows Live ID
      4. Microsoft Windows Card Space
      5. Project Higgins
      6. Simplified Sign-On Issues
    3. CONCLUSION
    4. REFERENCES
  8. 4. The Effectiveness of Privacy Policy Statements
    1. ABSTRACT
    2. INTRODUCTION
    3. PRIVACY AS A TRUST FACTOR
    4. PRIVACY PROTECTION MECHANISMS
      1. Business Process Protections
      2. Technological Protections
      3. Legal Protections
    5. PRIVACY POLICY STATEMENTS
    6. RESEARCH DESIGN
      1. The Survey
      2. The Sample
        1. B2C Businesses Selected
      3. Results
    7. CONCLUSION
    8. ACKNOWLEDGMENT
    9. REFERENCES
  9. 5. An Evaluation of User Password Practice
    1. ABSTRACT
    2. INTRODUCTION
    3. PASSWORD SECURITY ISSUES
    4. A SURVEY OF EMAIL PASSWORD SECURITY
      1. Study Data
      2. Analysis
      3. Password Composition
      4. Email Access
      5. Password Reuse
    5. DISCUSSION
    6. CONCLUSION
    7. REFERENCES
  10. 6. Wireless handheld Device and LAN Security Issues: A Case Study
    1. ABSTRACT
    2. INTRODUCTION
    3. LITERATURE
    4. RESEARCH METHODOLOGY
      1. Qualitative Study
      2. Quantitative Study
    5. DATA ANALYSIS
      1. Qualitative
      2. Quantitative
      3. WLAN Security Technology Adoption Factors
    6. DISCUSSION
      1. Learning Support
      2. User Technology Awareness
      3. Readiness of Existing System
      4. Social Influence
    7. CONCLUSION
    8. ACKNOWLEDGMENT
    9. REFERENCES
  11. 7. Web 2.0 Technologies for Business Solutions: A Security Perspective
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND OF WEB 2.0 TECHNOLOGIES
    4. APPLICATIONS OF THE TECHNOLOGIES
    5. SECURITY ISSUES
      1. Hostile Use of Technology
      2. Principles in Technology Use
    6. CONCLUSION AND FUTURE RESEARCH
    7. REFERENCES
    8. ENDNOTE
  12. 8. Business Continuity Planning: A Strategic Dilemma?
    1. ABSTRACT
    2. INTRODUCTION
    3. BUSINESS CONTINUITY PLANNING
    4. VULNERABILITY & DISRUPTION
    5. AVAILABILITY, RESILIENCE, AND FLEXIBILITY
    6. MANAGEMENT COMMITMENT: THE EXPECTED VALUE PARADOX
    7. VIRTUALIZATION: A ROAD TO THE FUTURE
    8. CONCLUSION
    9. REFERENCES
    10. ENDNOTES
  13. 9. Future Trends in Digital Security
    1. ABSTRACT
    2. INTRODUCTION
      1. So What is Digital Security?
      2. What has Evolved?
    3. TRENDS
    4. WEB 2.0 TECHNOLOGIES
    5. MOBILE COMPUTING VERSUS CLOUD COMPUTING
    6. SOCIAL NETWORKING
    7. SECURITY IN THE WORKPLACE
      1. Information Security Policy and Standards
    8. COPYRIGHT AND INTELLECTUAL PROPERTY
      1. What Threats will These Trends Produce?
    9. CONTROLLING THREATS
      1. Education
      2. Awareness
      3. Vigilance
      4. Top-Down Support
    10. CONCLUSION
    11. REFERENCES
  14. Compilation of References
  15. About the Contributors