You are previewing Handbook of Research on Emerging Developments in Data Privacy.
O'Reilly logo
Handbook of Research on Emerging Developments in Data Privacy

Book Description

Data collection allows today’s businesses to cater to each customer’s individual needs and provides a necessary edge in a competitive market. However, any breach in confidentiality can cause serious consequences for both the consumer and the company. The Handbook of Research on Emerging Developments in Data Privacy brings together new ideas on how to deal with potential leaks of valuable customer information. Highlighting the legal aspects of identity protection, trust and security, and detection techniques, this comprehensive work is a valuable resource for any business, legal, or technology professional looking to improve information security within their organization.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Book Series
    1. Mission
    2. Coverage
  5. Preface
    1. LEGAL ASPECTS
    2. IDENTITY PROTECTION
    3. TRUST AND SECURITY
    4. DETECTION TECHNIQUES
    5. REFERENCES
  6. Section 1: Legal Aspects
    1. Chapter 1: Cloud State Surveillance
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. CLOUD COMPUTING: ONCE UPON A TIME
      4. 3. LEGAL RISKS
      5. 4. CONCLUSION
      6. REFERENCES
      7. ENDNOTE
    2. Chapter 2: Data Protection in EU Law after Lisbon
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. THE EU DATA PROTECTION REGIME AFTER THE LISBON TREATY
      4. 3. CONCLUSION
      5. REFERENCES
      6. KEY TERMS AND DEFINITIONS
      7. APPENDIX: TABLE OF CASES
    3. Chapter 3: File-Sharing of Copyrighted Works, P2P, and the Cloud
      1. ABSTRACT
      2. INTRODUCTION
      3. PRIVACY AND THE RIGHT TO INFORMATIONAL SELF-DETERMINATION
      4. DIGITAL COPYRIGHT ENFORCEMENT SURVEILLANCE MECHANISMS
      5. THE GRADUATED RESPONSE: AN ENFORCEMENT MECHANISM
      6. CONCLUSION: REVISITING AND EXTENDING LEVIES
      7. REFERENCES
      8. KEY TERMS AND DEFINITIONS
    4. Chapter 4: Dataveillance in the Workplace
      1. ABSTRACT
      2. INTRODUCTION
      3. A SHIFTING CONTEXT
      4. PRIVACY AND SURVEILLANCE
      5. THE EMPLOYER PERSPECTIVE
      6. SURVEILLANCE: MANAGEMENTS MOTIVATION
      7. AN ETHICAL PARADOX: ORGANISATIONAL JUSTICE, TRUST, AND RISK
      8. A CODE OF ETHICS FOR WORKPLACE SURVEILLANCE
      9. LEGAL PROTECTIONS: THE ROLE OF PRIVACY LEGISLATION
      10. CONCLUSION
      11. REFERENCES
      12. KEY TERMS AND DEFINITIONS
    5. Chapter 5: Social Engineering Techniques, Password Selection, and Health Care Legislation
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. RESEARCH METHODOLOGY
      5. DISCUSSION
      6. FUTURE TRENDS
      7. CONCLUSION
      8. REFERENCES
      9. KEY TERMS AND DEFINITIONS
      10. APPENDIX: CONDENSED SURVEY
  7. Section 2: Identity Protection
    1. Chapter 6: Play That Funky Password!
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. BACKGROUND
      4. 3. ALTERNATIVE APPROACHES
      5. 4. MUSICAL PASSWORDS
      6. 5. LARGE SCALE ONLINE TESTING OF MUSIPASS
      7. 6. RESULTS FROM ONLINE EXPERIMENT
      8. 7. TESTING TASK TIME
      9. 8. LAB BASED TASK TIME RESULTS
      10. 9. DISCUSSION
      11. 10. CONCLUSION
      12. 11. FUTURE WORK
      13. REFERENCES
      14. ADDITIONAL READING
      15. KEY TERMS AND DEFINITIONS
    2. Chapter 7: Privacy, Security, and Identity Theft Protection
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. REGULATORY LAWS AND COMPLIANCE
      5. PRIVACY AND SECURITY
      6. INCENTIVES AND DETERRENCE FOR PRIVACY PROTECTION
      7. FURTHER RESEARCH DIRECTIONS
      8. CONCLUSION
      9. REFERENCES
      10. ADDITIONAL READING
      11. KEY TERMS AND DEFINITIONS
    3. Chapter 8: Identity Management Systems
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. BACKGROUND
      4. 3. COMPONENTS OF IDM SYSTEMS
      5. 4. ARCHITECTURE
      6. 5. ATTRIBUTES OF A GOOD IDM SYSTEM
      7. 6. MOST POPULAR SOFTWARE SOLUTIONS
      8. 7. EVALUATION FACTORS FOR COMPARING VARIOUS SOLUTIONS
      9. 8. CHALLENGES
      10. 9. APPLICATIONS
      11. 10. STANDARDS RELATED TO IDM SYSTEMS
      12. 11. RISK ASSESSMENT
      13. 12. CONCLUSION
      14. REFERENCES
      15. KEY TERMS AND DEFINITIONS
    4. Chapter 9: How Private Is Your Financial Data?
      1. ABSTRACT
      2. INTRODUCTION
      3. AUTHENTICATION: BACKGROUND
      4. ROLE OF AUTHENTICATION IN ONLINE BANKING
      5. INTERNET BANKING: ISSUES
      6. FRAUD PREVENTION STRATEGIES
      7. SYSTEMS AND SOLUTIONS TO ATTACKS IN ONLINE BANKING
      8. AUTHENTICATION IN MOBILE BANKING
      9. CONCLUSION
      10. REFERENCES
      11. KEY TERMS AND DEFINITIONS
  8. Section 3: Trust and Security
    1. Chapter 10: Security and Privacy Requirements Engineering
      1. ABSTRACT
      2. INTRODUCTION
      3. SQUARE FOR PRIVACY
      4. CLASSIFICATION OF RISK ASSESSMENT TECHNIQUES
      5. EVALUATION CASE STUDIES
      6. CONCLUSION AND FUTURE RESEARCH DIRECTIONS
      7. REFERENCES
      8. ADDITIONAL READING
      9. KEY TERMS AND DEFINITIONS
      10. ENDNOTE
    2. Chapter 11: An Information Security Model for Implementing the New ISO 27001
      1. ABSTRACT
      2. INTRODUCTION
      3. RESEARCH FRAMEWORK
      4. HOLISTIC INFORMATION SECURITY GOVERNANCE MODEL
      5. IMPLEMENTATION
      6. CASE STUDIES: RESULTS AND EXPERIENCES
      7. OUTLOOK
      8. CONCLUSION
      9. REFERENCES
      10. ADDITIONAL READING
      11. KEY TERMS AND DEFINITIONS
    3. Chapter 12: Health IT
      1. ABSTRACT
      2. INTRODUCTION
      3. PRIVACY IMPACT ASSESSMENT
      4. PRIVACY IMPACT SUITABILITY ASSESSMENT (PISA) FRAMEWORK
      5. PRIVACY SCREENING FRAMEWORK (PSF)
      6. SOLUTIONS AND RECOMMENDATIONS
      7. FUTURE RESEARCH DIRECTIONS
      8. CONCLUSION
      9. REFERENCES
      10. KEY TERMS AND DEFINITIONS
    4. Chapter 13: Do We Need Security Management Systems for Data Privacy?
      1. ABSTRACT
      2. INTRODUCTION: THINKING IN SYSTEMS
      3. MEASURING SECURITY INDIRECTLY BY THE RISK
      4. THE INFLUENCE OF BASEL II ON IT/INF. SECURITY
      5. THEMATIC DISCUSSION
      6. MANAGEMENT SYSTEMS AND THE DEMING CYCLE
      7. PREVENTIVE ADJUSTMENT OF RISKS WITH MANAGEMENT SYSTEMS
      8. FIELD STUDIES (2007–2010) AT 26 POWER STATIONS AND 3 SURFACE MINING OPERATIONS
      9. TARGET FUNCTIONS AND MANAGEMENT SYSTEMS
      10. SOLUTIONS AND RECOMMENDATIONS
      11. FUTURE RESEARCH DIRECTIONS
      12. CONCLUSION
      13. REFERENCES
      14. KEY TERMS AND DEFINITIONS
      15. ENDNOTES
    5. Chapter 14: Trust and Trust Building of Virtual Communities in the Networked Age
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. TRUST
      5. ISSUES AND DISCUSSION
      6. FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION
      8. REFERENCES
      9. ADDITIONAL READING
      10. KEY TERMS AND DEFINITIONS
    6. Chapter 15: The Security, Privacy, and Ethical Implications of Social Networking Sites
      1. ABSTRACT
      2. BACKGROUND
      3. INTRODUCTION
      4. SECURITY AND PRIVACY ISSUES OF SNS
      5. ETHICAL ISSUES OF CYBER BULLYING AND ANTISOCIAL BEHAVIOUR
      6. CASE STUDY 1: THE JESSI SLAUGHTER INCIDENT, A USA CASE
      7. CASE STUDY 2: THE IMPACT OF PUBLIC OPINION, AN AUSTRALIAN CASE
      8. CONCLUSION
      9. FUTURE RESEARCH DIRECTION
      10. REFERENCES
      11. ADDITIONAL READING
      12. KEY TERMS AND DEFINITIONS
  9. Section 4: Detection Techniques
    1. Chapter 16: Guidance for Selecting Data Collection Mechanisms for Intrusion Detection
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORK
      4. DATA COLLECTION FOR INFORMATION SECURITY
      5. DATA COLLECTION FOR INTRUSION DETECTION
      6. DETERMINING WHAT DATA TO COLLECT
      7. A TAXONOMY OF MECHANISM CHARACTERISTICS
      8. A TAXONOMY OF DEPLOYMENT CONSIDERATIONS
      9. OPERATIONAL CONSIDERATIONS
      10. DEPLOYMENT STRATEGY
      11. FUTURE CHALLENGES
      12. CONCLUSION
      13. ACKNOWLEDGMENT
      14. REFERENCES
      15. ADDITIONAL READING
      16. KEY TERMS AND DEFINITIONS
      17. APPENDIX: CLASSIFICATION OF MECHANISMS AND TECHNIQUES FOR DATA COLLECTION
    2. Chapter 17: An Auto-Reclosing-Based Intrusion Detection Technique for Enterprise Networks
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. INTRUSION DETECTION SYSTEMS
      5. INTRUSION PREVENTION SYSTEMS
      6. COMBINED INTRUSION DETECTION AND PREVENTION SYSEMS
      7. THE INTRUSION DETECTION SYSTEM TECHNIQUE
      8. DENIAL OF SERVICE ATTACKS
      9. METHOD OF APPROACH
      10. MODELING TECHNIQUE
      11. RESULTS FROM THE SIMULATION STUDIES
      12. BLOCKING ANALYSIS
      13. RECOMMENDATIONS
      14. SENSITIVITY ANALYSIS
      15. MULTIRESOLUTION TECHNIQUES
      16. FUTURE RESEARCH DIRECTIONS
      17. IMPLEMENTATION OF IDS TECHNIQUE
      18. CONCLUSION
      19. CONTRIBUTION
      20. REFERENCES
      21. ADDITIONAL READING
      22. KEY TERMS AND DEFINITIONS
    3. Chapter 18: A Dynamic Subspace Anomaly Detection Method Using Generic Algorithm for Streaming Network Data
      1. ABSTRACT
      2. INTRODUCTION
      3. OVERVIEW OF SPOT
      4. CASE STUDY DESCRIPTION
      5. EXPERIMENTAL EVALUATION
      6. CONCLUSION
      7. ACKNOWLEDGMENT
      8. REFERENCES
      9. ADDITIONAL READING
      10. KEY TERMS AND DEFINITIONS
    4. Chapter 19: Detecting Botnet Traffic from a Single Host
      1. ABSTRACT
      2. INTRODUCTION
      3. DETECTION METHOD
      4. DATASET
      5. DATA PROCESSING
      6. EXPERIMENTS AND RESULTS
      7. DISCUSSION ABOUT THE EXPERIMENTS
      8. CONCLUSION
      9. FUTURE RESEARCH DIRECTIONS
      10. ACKNOWLEDGMENT
      11. REFERENCES
      12. ADDITIONAL READING
      13. KEY TERMS AND DEFINITIONS
      14. ENDNOTES
  10. Compilation of References
  11. About the Contributors