You are previewing IT Policy and Ethics.
O'Reilly logo
IT Policy and Ethics

Book Description

IT policies are set in place to streamline the preparation and development of information communication technologies in a particular setting. IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications is a comprehensive collection of research on the features of modern organizations in order to advance the understanding of IT standards. This is an essential reference source for researchers, scholars, policymakers, and IT managers as well as organizations interested in carrying out research in IT policies.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Editorial Advisory Board and List of Reviewers
    1. Editor-in-Chief
    2. Associate Editors
    3. Editorial Advisory Board
  5. Preface
  6. Section 1: Fundamental Concepts and Theories
    1. Chapter 1: Introduction to Continuous Authentication
      1. ABSTRACT
      2. INTRODUCTION
      3. CONCEPTUAL FRAMEWORK FOR CONTINUOUS AUTHENTICATION
      4. CA DATA SOURCES
      5. APPLICATIONS OF CONTINUOUS AUTHENTICATION
      6. CONCLUSION
    2. Chapter 2: Password Sharing and How to Reduce It
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. PASSWORD SHARING
      5. DISCUSSION AND RECOMMENDATIONS
      6. CONCLUSION
    3. Chapter 3: Convergence of Fixed and Mobile Networks
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. OVERVIEW AND ARCHITECTURE OF FIXED-MOBILE CONVERGENCE
      5. MOBILITY SUPPORT, NOMADISM, SESSION CONTINUITY, HANDOVER
      6. ROAMING
      7. AAA AND SECURITY
      8. CAPWAP
      9. PANA
      10. POLICY CONTROL AND CHARGING
      11. USER DATA MANAGEMENT
      12. 3GPP LONG-TERM EVOLUTION
      13. FUTURE DIRECTIONS AND CONCLUSION
      14. APPENDIX
    4. Chapter 4: Trust Management and User’s Trust Perception in e-Business
      1. ABSTRACT
      2. INTRODUCTION
      3. TRUST MANAGEMENT
      4. USER’S PERCEPTION OF TRUST
      5. FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
    5. Chapter 5: Study and Non-Study Related Technologies use of Flemish Students in Higher Education
      1. ABSTRACT
      2. INTRODUCTION
      3. THEORETICAL BACKGROUND
      4. METHODOLOGY
      5. RESULTS
      6. FUTURE RESEARCH DIRECTIONS AND CONCLUSION
    6. Chapter 6: Stepwise E-Participation
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. FORMER PARTICIPATORY PRACTICES IN THE IDEAL-EU REGIONS
      5. WORKFLOW CONCEPTION
      6. THE IDEAL-EU WORKFLOW AND TECHNICAL ARCHITECTURE
      7. DESCRIPTION OF THE TECHNICAL ARCHITECTURE
      8. IMPLEMENTATION
      9. AGENDA SETTING AND PRIOR ANALYSIS
      10. GETTING SUPPORT AND TOPIC REFINEMENT
      11. DISCUSSION AND DELIBERATION
      12. ORCHESTRATION AND EVALUATION
      13. EVALUATION
      14. LEGITIMACY
      15. SOCIAL VALUE
      16. EFFICIENCY
      17. PRODUCTIVITY
      18. CONCLUSION AND FUTURE WORK
    7. Chapter 7: Public Key Infrastructure
      1. ABSTRACT
      2. INTRODUCTION: WHY ARE WE HERE?
      3. THE THREE-FOLD MISSION OF ENCRYPTION
      4. MAIN-FOCUS: PUBLIC KEY INFRASTRUCTURE
      5. A BRIEF HISTORY
      6. A PEEK INSIDE
      7. HASHES AND DIGITAL SIGNATURES
      8. A QUESTION OF TRUST
      9. VULNERABILITIES AND WEAKNESSES
      10. MANAGEMENT CHALLENGES
      11. EMERGING TECHNOLOGIES
      12. CONCLUSION
    8. Chapter 8: Access Control in Federated Clouds
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. FUTURE RESEARCH DIRECTIONS
      5. CONCLUSION
    9. Chapter 9: Learning, Unlearning, and Relearning
      1. ABSTRACT
      2. INTRODUCTION
      3. CHARACTERISTICS OF LIFELONG LEARNERS
      4. STRATEGIES FOR USING WEB 2.0 TECHNOLOGIES FOR LIFELONG LEARNING
      5. RECOMMENDATIONS FOR USING WEB 2.0 TECHNOLOGIES TO SUPPORT LIFELONG LEARNING SKILL AND DISPOSITION DEVELOPMENT
      6. FUTURE DIRECTIONS AND CONCLUSION
    10. Chapter 10: The Evolution of KM Practices
      1. ABSTRACT
      2. INTRODUCTION
      3. THE NISSAN KEIRETSU: AN HISTORICAL RETROSPECT
      4. FROM NISSAN TO THE RENAULT-NISSAN ALLIANCE
      5. THE EVOLUTION OF THE STRATEGIC ALLIANCE: TOWARDS NEW KM PRACTICES?
      6. MAIN LESSONS AND FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION
    11. Chapter 11: Semantic Policies for Modeling Regulatory Process Compliance
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. APPROACH: POLICY AND RULE ONTOLOGY FOR COMPLIANCE
      5. A SEMANTIC FRAMEWORK OF POLICIES AND RULES
      6. RELATED WORK AND FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION
    12. Chapter 12: Near Field Authentication
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORK
      4. NF-COA TECHNOLOGY
      5. THE NEAR-FIELD CERTIFICATE OF AUTHENTICITY
      6. THE NF-COA READER
      7. PERFORMANCE EVALUATION
      8. COA VERIFICATION
      9. WITHSTANDING POTENTIAL ATTACKS
      10. APPLICATIONS
      11. CONCLUSION
    13. Chapter 13: Continuous Authentication in Computers
      1. ABSTRACT
      2. INTRODUCTION
      3. CHARACTERISTICS OF A GOOD CONTINUOUS AUTHENTICATION SYSTEM
      4. BACKGROUND
      5. STEPS INVOLVED IN DESIGNING A CONTINUOUS AUTHENTICATION SYSTEM
      6. CONCLUSION AND FUTURE WORK
    14. Chapter 14: Grid Data Handling
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. DATA STORAGE
      5. DATA MOVEMENT AND RETRIEVAL
      6. REPLICATION
      7. FUTURE RESEARCH DIRECTIONS
      8. CONCLUSION
    15. Chapter 15: Mass Media Strategies
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. UNDERSTANDING HYBRID APPROACHES
      4. 3. MARKET ANALYSIS BY MASS MEDIA
      5. 4. CASES OF STUDY
      6. 5. CROWFUNDING AS A DIFFERENT WAY TO OBTAIN FUNDS TO A PROJECT
      7. 6. APPLIED CROWDFUNDING A REAL PROJECT
      8. 7. EXPERIMENTS TO SUPPORT AN INDIE POP BAND
      9. 8. EXPERIMENTS RELATED WITH A WRESTLING CIRCUIT
      10. 9. CONCLUSION AND FUTURE RESEARCH
  7. Section 2: Tools and Technologies
    1. Chapter 16: Reversible Information Hiding and Its Application to Image Authentication
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. THE LOCATION MAP-FREE PEE-RIH
      5. FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
    2. Chapter 17: Applied Cryptography in Electronic Commerce
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. AUTHENTICATION ON THE WEB
      5. IDENTITY MANAGEMENT
      6. DIGITAL RIGHTS MANAGEMENT
      7. iTUNES
      8. FUTURE TRENDS AND THREATS IN ELECTRONIC COMMERCE
      9. CONCLUSION
    3. Chapter 18: Multimodal Biometric Hand-Off for Robust Unobtrusive Continuous Biometric Authentication
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. SYSTEM ARCHITECTURE
      5. SYSTEM EVALUATION
      6. RESULTS
      7. CONCLUSION
    4. Chapter 19: Continuous User Authentication Based on Keystroke Dynamics through Neural Network Committee Machines
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. ARTIFICIAL NEURAL NETWORKS (ANN)
      5. COMMITTEE MACHINES
      6. PROPOSED STRUCTURE AND METHODOLOGY
      7. EXPERIMENTS AND RESULTS
      8. FUTURE RESEARCH DIRECTIONS
      9. CONCLUSION
    5. Chapter 20: Identity-Based Cryptography
      1. ABSTRACT
      2. INTRODUCTION: CONTEXT AND GOALS
      3. BACKGROUND
      4. IDENTITY-BASED CRYTOGRAPHY (IBC)
      5. EXISTING SOLUTIONS FOR IBC SECURITY VULNERABILITIES
      6. IBC APPLICATIONS AND FUTURE TRENDS
      7. CONCLUSION
    6. Chapter 21: Denial of Service Resilience of Authentication Systems
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. DoS ATTACK DETECTION IN AUTHENTICATION SYSTEMS
      5. CASE STUDY: THE SSO-SENSE RISK ASSESSMENT MODULE
      6. THRESHOLD PUZZLES AND ADAPTIVE THRESHOLD PUZZLES
      7. CASE STUDY: THE SSL HANDSHAKE PROTOCOL WITH ADAPTIVE EFFORT DISTRIBUTION
      8. FUTURE RESEARCH DIRECTIONS
      9. CONCLUSION
    7. Chapter 22: Applied Cryptography in Wireless Sensor Networks
      1. ABSTRACT
      2. INTRODUCTION
      3. KEY MANAGEMENT
      4. SECURITY PROTOCOLS FOR SENSOR NETWORKS (SPINS)
      5. LOCALIZED ENCRYPTION AUTHENTICATION PROTOCOL (LEAP)
      6. LINK LAYER SECURITY PROTOCOL: TINYSEC
      7. PATH KEY ESTABLISHMENT
      8. AUTHENTICATION, INTEGRITY, CONFIDENTIALITY AND DATA FRESHNESS
      9. PUBLIC KEY CRYPTOGRAPHY FOR WIRELESS SENSOR NETWORKS
      10. ECC IMPLEMENTATION FOR WIRELESS SENSOR NETWORKS
      11. IDENTITY BASED ENCRYPTION
      12. FUTURE RESEARCH DIRECTIONS
      13. CONCLUSION
    8. Chapter 23: A Hybrid Port-Knocking Technique for Host Authentication
      1. ABSTRACT
      2. INTRODUCTION
      3. PREVIOUS WORK
      4. THE HYBRID PORT-KNOCKING (HPK) TECHNIQUE
      5. IMPLEMENTING THE HPK TECHNIQUE
      6. PERFORMANCE MEASURES
      7. TESTING PLATFORM AND TOOLS
      8. SIMULATION RESULTS AND DISCUSSIONS
      9. CONCLUSION
    9. Chapter 24: mVITAL
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. IEEE-11073 ARCHITECTURE
      5. mVITAL SYSTEM DESIGN
      6. DEVICE MONITORING LIFE CYCLE
      7. SYSTEM RESPONSE TIME MEASUREMENTS
      8. CONCLUSION
    10. Chapter 25: IEEE802.21 Assisted Fast Re-Authentication Scheme over GSABA
      1. ABSTRACT
      2. INTRODUCTION
      3. PROBLEM STATEMENT
      4. ARCHITECTURAL OVERVIEW
      5. AN OVERVIEW OF THE IEEE802.21 ASSISED EAP BASED RE-AUTHENTICATION MECHANISM OVER GSABA
      6. PERFORMANCE EVALUATION
      7. FUTURE RESEARCH DIRECTIONS
      8. CONCLUSION
      9. APPENDIX: ACRONYMS USED
    11. Chapter 26: Elliptic Curve Cryptography on WISPs
      1. ABSTRACT
      2. INTRODUCTION
      3. ELLIPTIC CURVE CRYPTOGRAPHY
      4. WIRELESS IDENTIFICATION AND SENSING PLATFORMS
      5. ECC ON WISPS
      6. RESULTS
      7. COMPARISON WITH RELATED WORK
      8. SECURITY CONSIDERATIONS
      9. FUTURE RESEARCH DIRECTIONS
      10. CONCLUSION
    12. Chapter 27: Point-of-Sale Technologies at Retail Stores
      1. ABSTRACT
      2. INTRODUCTION
      3. CONCEPTUAL FRAMEWORK
      4. BACKGROUND, ISSUES, AND PROBLEMS
      5. IMPLICATIONS FOR RETAILERS: SOLUTIONS AND RECOMMENDATIONS
      6. FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION AND SUMMARY
    13. Chapter 28: A Keystroke Biometric System for Long-Text Input
      1. ABSTRACT
      2. INTRODUCTION
      3. KEYSTROKE BIOMETRIC SYSTEM
      4. RECEIVER OPERATING CHARACTERISTIC (ROC) CURVE DERIVATION
      5. EXPERIMENTAL DESIGN AND DATA COLLECTION
      6. EXPERIMENTAL RESULTS
      7. CONCLUSION AND FUTURE WORK
      8. APPENDIX
    14. Chapter 29: An Electronic Contract Signing Protocol Using Fingerprint Biometrics
      1. ABSTRACT
      2. INTRODUCTION
      3. FAIR ELECTRONIC EXCHANGE
      4. MICALI’S ELECTRONIC CONTRACT SIGNING PROTOCOL
      5. BAO’S ELECTRONIC CONTRACT SIGNING PROTOCOL
      6. OUR SYSTEM
      7. IMPLEMENTATION OF CRYPTOGRAPHY
      8. ANALYSIS
      9. CONCLUSION
    15. Chapter 30: Brain-Like System for Audiovisual Person Authentication Based on Time-to-First Spike Coding
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. SPIKE-BASED AUDIOVISUAL SYSTEM FOR PERSON AUTHENTICATION
      5. FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
  8. Section 3: Frameworks and Methodologies
    1. Chapter 31: Using a Social Learning Community to Actively Engage Students’ Participation in a Virtual Classroom
      1. EXECUTIVE SUMMARY
      2. ORGANIZATION BACKGROUND
      3. SETTING THE STAGE
      4. CASE DESCRIPTION
      5. SOLUTIONS AND RECOMMENDATIONS
    2. Chapter 32: MAC and PHY-Layer Network Coding for Applications in Wireless Communications Networks
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. MAC-NC
      5. PLNC
      6. LOWER LAYERS NC ADAPTATION FOR WIRELESS ERASURE CHANNELS
      7. FUTURE RESEARCH DIRECTIONS
      8. CONCLUSION
    3. Chapter 33: Key Management
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. KEY AGREEMENT
      4. 3. KEY MANAGEMENT IN GROUP ORIENTED ENVIRONMENTS
      5. 4. KEY MANAGEMENT IN MOBILE AD HOC NETWORKS AND WIRELESS SENSOR NETWORKS
      6. 5. PUBLIC KEY INFRASTRUCTURE
      7. 6. SECRET SHARING
      8. 7. KEY ESCROW SYSTEMS
      9. 8. PASSWORD BASED KEY MANAGEMENT
      10. 9. KEY MANAGEMENT IN PGP SYSTEMS
      11. 10. KEY MANAGEMENT IN MOBILE TELECOMMUNICATION SYSTEMS
      12. 11. THE LIMITATIONS OF KEY MANAGEMENT
      13. 12. CONCLUSION
    4. Chapter 34: Creating Ongoing Online Support Communities through Social Networks to Promote Professional Learning
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. TRANSFORMING AN ONLINE COURSE THROUGH SOCIAL MEDIA
      5. SURVEY: USING SOCIAL MEDIA FOR PROFESSIONAL DEVELOPMENT AND INFORMAL LEARNING
      6. FUTURE DIRECTIONS
      7. CONCLUSION
    5. Chapter 35: Security Management in Heterogeneous Distributed Sensor Networks
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORKS
      4. BACKGROUND AND MOTIVATION
      5. NETWORK ASSUMPTIONS
      6. BUILDING BLOCKS OF OUR SECURITY MANAGEMENT SCHEME
      7. SECURE GROUP ASSOCIATION MANAGEMENT IN HDSN
      8. PERFORMANCE ANALYSIS AND DISCUSSION
      9. FURTHER DISCUSSION
      10. FUTURE RESEARCH DIRECTIONS
      11. CONCLUSION
    6. Chapter 36: A Method of Analysing the Use of Social Networking Sites in Business
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. UNDERSTANDING SOCIAL NETWORKS AND SOCIAL NETWORKING TECHNOLOGIES
      5. EARL’S STAGES OF GROWTH MODEL
      6. THE EVOLUTION OF SOCIAL ENTERPRISE
      7. FUTURE RESEARCH DIRECTIONS
      8. CONCLUSION
    7. Chapter 37: Policy Management in Cloud
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. POLICY MANAGEMENT IN CLOUD
      5. FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
    8. Chapter 38: Modeling Access Control in Healthcare Organizations
      1. ABSTRACT
      2. INTRODUCTION
      3. OVERVIEW OF ACCESS CONTROL
      4. MODELING ACCESS CONTROL
      5. FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
    9. Chapter 39: An Access Control Model for Dynamic VR Applications
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. VR-PR APPROACH
      5. VR-PR APPLIED TO A BEH-VR SCENE
      6. FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION
    10. Chapter 40: Building a Cloud-Based Mobile Application Testbed
      1. ABSTRACT
      2. INTRODUCTION
      3. MOTIVATING MALWARE EXAMPLE
      4. OVERVIEW OF CURRENT LARGE-SCALE TESTING TECHNOLOGIES
      5. THE ATAACK CLOUD’S MOBILE APPLICATION TESTING ARCHITECTURE
      6. CONCLUSION
    11. Chapter 41: Developing Proactive Security Dimensions for SOA
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. THE AUTHENTICATON AND SECURITY SERVICE (NSS)
      5. THE AUTHORIZATION SERVICE (AS)
      6. THE PRIVACY SERVICE (PS)
      7. QUALITY OF SECURITY SERVICE (QoSS)
      8. CASE STUDY AND IMPLEMENTATION
      9. FUTURE RESEARCH DIRECTIONS
      10. CONCLUSION
    12. Chapter 42: National Interoperability Frameworks
      1. ABSTRACT
      2. INTRODUCTION
      3. BEST PRACTICES FROM NATIONAL INTEROPERABILITY FRAMEWORKS
      4. THE WAY FORWARD FOR NATIONAL INTEROPERABILITY FRAMEWORKS
      5. CONCLUSION
    13. Chapter 43: Medium Access Control Protocols for Wireless Sensor Networks
      1. ABSTRACT
      2. INTRODUCTION
      3. MAC BASICS FOR WSNs
      4. CLASSIFICATION OF MAC PROTOCOLS
      5. FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
  9. Section 4: Cases and Applications
    1. Chapter 44: The Integration of Social Networking in Creating Collaborative Partnerships in Education
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. SOCIAL NETWORKING: A DEFINITION
      5. WEB 2.0 SOCIAL NETWORKING TOOLS EXPLORED
      6. FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION
    2. Chapter 45: Audio Visual System for Large Scale People Authentication and Recognition over Internet Protocol (IP)
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. FRONT-END PROCESSING FOR AUDIO VISUAL RECOGNITION
      5. TRAINING ARCHITECTURE FOR LARGE-SCALE PEOPLE RECOGNITION
      6. INTEGRATION OF PROPOSED AUDIO VISUAL SYSTEM AND COMMUNICATION OVER INTERNET PROTOCOL
      7. SIMULATION RESULTS AND DISCUSSION
      8. CONCLUSION
    3. Chapter 46: Music is the Key
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. EXISTING ALTERNATIVES
      5. MUSICAL PASSWORDS
      6. RESULTS
      7. CONCLUSION
      8. FUTURE WORK
    4. Chapter 47: Investigating the Performance of the TSS Scheme in Noisy MANETs
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. WIRELESS NETWORK ENVIRONMENTS
      5. CONCEPT OF SHAMIR’S SECRET SHARING SCHEME
      6. THE TSS SCHEME
      7. SYSTEM, ADVERSARY, AND INTRUSION MODELS
      8. PRACTICAL IMPLEMENTATION OF THE TSS SCHEME
      9. THE MANET SIMULATOR (MANSim)
      10. RESULTS AND DISCUSSIONS
      11. CONCLUSION
    5. Chapter 48: Secure Exchange of Electronic Health Records
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. PROTECTING PATIENT’S PRIVACY AND CONFIDENTIALITY
      5. CONCLUSION
      6. FUTURE RESEARCH DIRECTIONS
    6. Chapter 49: RBAC with Generic Rights, Delegation, Revocation, and Constraints
      1. ABSTRACT
      2. INTRODUCTION
      3. RBAC
      4. OUR SOLUTION: R+DRC
      5. DEFINITIONS AND ALGORITHMS
      6. PROPERTIES
      7. IMPLEMENTATION
      8. RELATED WORK
      9. DISCUSSION
    7. Chapter 50: E-Simulations for Educating the Professions in Blended Learning Environments
      1. ABSTRACT
      2. INTRODUCTION
      3. THE CHANGING CONTEXTS OF HIGHER EDUCATION AND TRAINING
      4. THEORETICAL UNDERPINNINGS IN TEACHING AND LEARNING
      5. DEFINING E-SIMULATIONS
      6. SITUATING E-SIMULATIONS IN E-LEARNING AND BLENDED LEARNING
      7. A TYPOLOGY FOR DESIGNING E-SIMULATIONS
      8. FUTURE OF E-SIMULATIONS
      9. CONCLUSION
    8. Chapter 51: Crowdfunding to Improve Environmental Projects’ Logistics
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. CROWDFUNDING AS A DIFFERENT WAY TO OBTAIN FUNDS TO ENVIRONMENTAL PROJECTS
      4. 3. APPLIED CROWDFUNDING TO AN ENVIRONMENTAL REAL PROJECT
      5. 4. CURRENT STUDY
      6. 5. EXPERIMENTS
      7. 6. CONCLUSION
      8. 7. DISCUSSIONS AND FUTURE RESEARCH
    9. Chapter 52: Youth and Online Social Networking
      1. ABSTRACT
      2. INTRODUCTION
      3. YOUTH AND ONLINE SOCIAL NETWORKING IN A DANISH CONTEXT
      4. THEORETICAL FRAMEWORKS: MEDIATED DISCOURSE ANALYSIS, NEXUS ANALYSIS AND GEOGRAPHIES OF DISCOURSE
      5. A MEDIA CONTENT SURVEY OF DANISH PRINT MEDIA’S COVERAGE OF YOUTH AND ONLINE SOCIAL NETWORKING
      6. THE ONLINE QUESTIONNAIRE
      7. ANALYSIS: GOOD AND BAD EXPERIENCES
      8. FROM LOCAL EXPERIENCES TO PUBLIC DISCOURSES
      9. CONCLUDING REMARKS
    10. Chapter 53: Online Political Participation in the 2008 U.S. Presidential Election
      1. ABSTRACT
      2. INTRODUCTION
      3. THEORETICAL, CONCEPTUAL, AND EMPIRICAL CONSIDERATIONS
      4. DATA, MEASUREMENTS, AND METHODS
      5. ANALYSIS: PATTERNS AND PREDICTORS OF THE DEMOGRAPHIC DIVIDE
      6. DISCUSSION
      7. CONCLUSION
    11. Chapter 54: The Role of Social Networking in Civilizational Development
      1. ABSTRACT
      2. INTRODUCTION
      3. THE FOUNDATION OF INFO-COMMUNICATION (INFOCO SYSTEMS) FOR CIVILIZATIONAL DEVELOPMENT
      4. THE ROLE OF SOCIAL NETWORKING IN THE 21ST CENTURY
      5. SOLUTIONS AND RECOMMENDATIONS FOR BETTER COMMUNICATION AND REASONING IN ELECTRONIC CIVILIZATION
      6. FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION
    12. Chapter 55: Technological Approaches to Maintaining Academic Integrity in Management Education
      1. ABSTRACT
      2. INTRODUCTION
      3. THE ETHICAL ENVIRONMENT
      4. ENABLING ACADEMIC INTEGRITY: WHAT CAN BE DONE?
      5. THE TECHNOLOGY CONNECTION
      6. CONCLUSION
    13. Chapter 56: Improving the Effectiveness of Advertising in Internet Social Networking
      1. ABSTRACT
      2. INTRODUCTION: THE IMPORTANCE OF SOCIAL NETWORKS FROM THE VIEWPOINT OF MARKETING
      3. BACKGROUND: ADVERTISING IN SOCIAL NETWORKS
      4. SOLUTIONS AND RECOMMENDATIONS
  10. Section 5: Issues and Challenges
    1. Chapter 57: Security Policy Issues in Internet Banking in Malaysia
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. INTERNET BANKING
      5. INTERNET BANKING SECURITY ISSUES
      6. MALAYSIAN INTERNET BANKING SECURITY POLICY IMPLEMENTATION
      7. MALAYSIA INTERNET BANKING SECURITY ISSUES
      8. INTERNET BANKING SECURITY MECHANISM FRAMEWORK
      9. E-BANKING SECURITY POLICY ISSUES RESEARCH
      10. STEPS IN MANAGING CONSUMERS’ SECURITY PERCEPTIONS AND BEHAVIOR
      11. FUTURE TRENDS
      12. CONCLUSION
      13. APPENDIX 1
      14. APPENDIX 2
    2. Chapter 58: Caught in the Web
      1. ABSTRACT
      2. INTRODUCTION
      3. THE CONCEPT OF PRIVACY
      4. THE CONCEPT OF CONFIDENTIALITY
      5. PHYSICAL, INFORMATIONAL, AND DECISIONAL PRIVACY
      6. PUBLIC CONCERNS
      7. MISUSES OF PATIENT HEALTH DATA
      8. FAIR INFORMATION PRACTICES
      9. EVOLUTION OF A NATIONAL HEALTH INFORMATION NETWORK
      10. PROTECTING MEDICAL PRIVACY AND CONFIDENTIALITY
      11. CONCLUSION
    3. Chapter 59: Gender Differences in Social Networking Presence Effects on Web-Based Impression Formation
      1. INTRODUCTION
      2. THEORETICAL DEVELOPMENT
      3. EXPERIMENTAL METHODOLOGY
      4. ANALYSIS AND DISCUSSION
      5. CONCLUSION
      6. APPENDIX A: SEARCH RESULTS FOR JANE DOE 1
      7. APPENDIX B: SEARCH RESULTS FOR JANE DOE 2
    4. Chapter 60: Sociocognitive Inquiry
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. PERSONAL CONSTRUCT PSYCHOLOGY
      5. CONCEPTUAL GRIDS
      6. WEBGRID IN ACTION
      7. PAYBACKS TO INDIVIDUALS AND THE COMMUNITY
      8. FUTURE RESEARCH DIRECTIONS
      9. CONCLUSION
    5. Chapter 61: End-Users’ Acceptance of Biometrics Authentication to Secure E-Commerce within the Context of Saudi Culture
      1. ABSTRACT
      2. INTRODUCTION
      3. THEORETICAL BACKGROUND
      4. RESEARCH MODEL
      5. RESEARCH DESIGN AND DATA COLLECTING
      6. DATA ANALYSIS
      7. DISCUSSION OF FINDINGS
      8. LIMITATIONS AND DIRECTIONS FOR FUTURE RESEARCH
      9. CONCLUSION AND MANAGERIAL IMPLICATIONS
    6. Chapter 62: Certification and Security Issues in Biomedical Grid Portals
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. SECURITY REQUIREMENTS FOR BIOMEDICAL GRID PORTALS
      5. BASIC GRID SECURITY MECHANISMS
      6. THE GRISSOM PORTAL IN BRIEF
      7. SECURITY ASPECTS OF THE GRISSOM PORTAL
      8. SUMMARY AND CONCLUSION
      9. FUTURE WORK DIRECTIONS
      10. APPENDIX A
      11. APPENDIX B
    7. Chapter 63: Web Services Composition Problem
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORKS
      4. CONDITIONAL COMMUNICATING AUTOMATA (CCA)
      5. COMPLEXITY RESULTS
      6. CONCLUSION
      7. APPENDIX
    8. Chapter 64: Policy and Issues in Deploying Automated Plagiarism Detection Systems in Academic Communities
      1. ABSTRACT
      2. INTRODUCTION
      3. POLICY AND ISSUES
      4. CASE STUDY: VERIGUIDE IN CUHK
      5. FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
    9. Chapter 65: The Paradox of the Interactive Web in the U.S. Public Sector
      1. ABSTRACT
      2. INTRODUCTION
      3. INTRODUCING THE INTERACTIVE WEB
      4. KEY CONCEPTS UNDERLYING THE INTERACTIVE WEB
      5. EXAMPLES OF INTERACTIVE WEB APPLICATIONS IN THE PUBLIC SECTOR
      6. DRIVERS AND CHALLENGES IN THE EMERGENCE OF THE INTERACTIVE WEB IN THE PUBLIC SECTOR
      7. CONCLUSION: THE INTERACTIVE WEB PARADOX
    10. Chapter 66: A Game Theoretical Approach to Design
      1. ABSTRACT
      2. INTRODUCTION
      3. SUMMARY
    11. Chapter 67: Cognitive Cooperation in Wireless Networks
      1. ABSTRACT
      2. 1 INTRODUCTION
      3. 2 CHALLENGES OF MULTIRATE WLAN-BASED COMPOSITE NETWORK
      4. 3 COGNITIVE COOPERATION
      5. 4 LOAD ADAPTATION STRATEGY FRAMEWORK
      6. 5 SIMULATION MODELS AND PRELIMINARIES
      7. 6 PERFORMANCE EVALUATION
      8. 7 CONCLUSION
    12. Chapter 68: Security and Trust in a Global Research Infrastructure
      1. ABSTRACT
      2. INTRODUCTION
      3. PARTICIPANTS AND SECURITY GOALS
      4. IDENTITY PROVIDERS
      5. FROM ONE TO MANY: THE INFRASTRUCTURE
      6. RESOURCES
      7. SECURITY REQUIREMENTS
      8. PROTECTING RESOURCES: SECURITY GOALS
      9. SCALABILITY OF THE INFRASTRUCTURE
      10. THE ROLE OF PARTICIPANTS IN ESTABLISHING TRUST
      11. ISSUES AND CONTROVERSIES, DISCUSSION
      12. PRACTICAL ADVICE
      13. FURTHER EXAMPLES
      14. FUTURE DIRECTIONS
    13. Chapter 69: Social Networking and Identity
      1. ABSTRACT
      2. INTRODUCTION
      3. DEFINITIONS OF KEY CONCEPTS
      4. THEORIES ON SOCIAL NETWORKS AND IDENTITY
      5. THEORETICAL PERSPECTIVES ON THE CREATION OF SELF IN SOCIAL NETWORKS IN CYBERSPACE
      6. CONCEPTUAL FRAMEWORK: EVOLUTIONARY PRESENTATION OF TECHNOSELF THROUGH THEATRICAL METAPHORS
      7. SOCIAL NETWORKING AND IDENTITY: THE TECHNOSELF
      8. CONCLUSION
    14. Chapter 70: Digital Convergence and Horizontal Integration Strategies
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. POTENTIAL CROSS-INDUSTRY HORIZONTAL INTEGRATION STRATEGIES
      5. POTENTIAL DIGITAL PRODUCT INTERMEDIARY STRATEGIES
      6. POTENTIAL DIGITAL PRODUCT MASS CUSTOMIZATION STRATEGIES
      7. POTENTIAL TACTICAL INTERACTIVITY AND SOCIAL NETWORKING STRATEGIES
      8. STRATEGIES FOR DIGITAL PRODUCT LIFECYCLE STAGES
      9. FUTURE RESEARCH DIRECTIONS
      10. CONCLUSION
  11. Section 6: Emerging Trends
    1. Chapter 71: Stepping over the Edge
      1. ABSTRACT
      2. INTRODUCTION
      3. THE EVOLUTION OF TECHNOLOGIES
      4. WEB 2.0 TECHNOLOGIES: FUNCTIONALITY AND IMPACT ON PRACTICE
      5. WEB 2.0 TECHNOLOGIES IN EDUCATION
      6. THE CHARACTERISTICS OF THE NEW TECHNOLOGIES AND IMPACT ON PRACTICE
      7. IMPLICATIONS
      8. MAKING SENSE OF THE COMPLEXITY
      9. CONCLUSION AND IMPLICATIONS FOR THE FUTURE
    2. Chapter 72: Web 2.0 for eParticipation
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. EVALUATING WEB 2.0 TOOLS FOR E-PARTICIPATION IN GOVERNMENT
      5. SYNTHESIS AND ANALYSIS
      6. SOLUTIONS AND RECOMMENDATIONS
      7. SUGGESTIONS FOR FUTURE RESEARCH
      8. CONCLUSION
    3. Chapter 73: Privacy-Aware Organisation-Based Access Control Model (PrivOrBAC)
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. MODELLING MOTIVATION
      4. 3. OrBAC
      5. 4. THE PRIVACY-AWARE ORBAC MODEL (PRIVORBAC)
      6. 5. USE CASE
      7. 6. RELATED WORKS
      8. 7. CONCLUSION
    4. Chapter 74: Internet Security Using Biometrics
      1. ABSTRACT
      2. INTRODUCTION
      3. INTERNET SECURITY
      4. AUTHENTICATION METHODS
      5. BIOMETRICS
      6. FUNCTIONALITIES OF BIOMETRIC SYSTEM
      7. BIOMETRICS IN NETWORKS
      8. ATTACKS ON A BIOMETRIC SYSTEM
      9. STATISTICAL MEASURES OF BIOMETRICS
      10. WHY MULTIMODAL BIOMETRICS?
      11. DISCUSSION AND FUTURE WORK
      12. CONCLUSION
    5. Chapter 75: A Social Relational Network-Based Architecture for Maintaining the Media Integrity and Optimizing the Quality of Experience
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. THE PROPOSED ARCHITECTURE
      5. FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
    6. Chapter 76: Towards Continuous Authentication Based on Gait Using Wearable Motion Recording Sensors
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND / STATE OF THE ART
      4. EVALUATION OF A BIOMETRIC SYSTEM
      5. CONCLUSION AND FUTURE WORK
    7. Chapter 77: Using a Design Research Approach to Investigate the Knowledge-Building Implications of Online Social Networking and Other Web 2.0 Technologies in Higher Education Contexts
      1. ABSTRACT
      2. INTRODUCTION
      3. CHALLENGE #1
      4. CHALLENGE #2
      5. CHALLENGE #3
      6. DISCUSSION AND LESSON LEARNED: THE EXEMPLARY IMPLICATIONS OF A DESIGN RESEARCH PARADIGM FOR (AND BEYOND) EDUCATIONAL CONTEXTS
      7. SUMMARY
    8. Chapter 78: Energy-Efficient MAC Protocols in Distributed Sensor Networks
      1. ABSTRACT
      2. INTRODUCTION
      3. MAC PROTOCOL DESIGN FOR DISTRIBUTED SENSOR NETWORKS
      4. REPRESENTATIVE WORK
      5. CCP-MAC
      6. FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION
    9. Chapter 79: RSU Deployment for Content Dissemination and Downloading in Intelligent Transportation Systems
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. RSU DEPLOYMENT FOR CONTENT DISSEMINATION AND DOWNLOADING
      5. MOBILITY SCENARIOS
      6. PERFORMANCE ANALYSIS OF THE HEURISTICS UNDER IDEAL NETWORK SETTINGS
      7. PERFORMANCE ANALYSIS OF THE HEURISTICS IN REALISTIC ENVIRONMENTS
      8. CONCLUSION AND FUTURE RESEARCH DIRECTIONS
    10. Chapter 80: Cloud Environment Controls Assessment Framework
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. CLOUD COMPUTING CONCERNS
      5. SECURING THE CLOUD ENVIRONMENT
      6. SOLUTIONS AND RECOMMENDATIONS
      7. FUTURE RESEARCH DIRECTIONS
      8. CONCLUSION
    11. Chapter 81: Applying Continuous Authentication to Protect Electronic Transactions
      1. ABSTRACT
      2. INTRODUCTION
      3. TRUST IN ELECTRONIC COMMUNICATIONS SYSTEMS
      4. BRIEF REVISION ABOUT CONVENTIONAL AUTHENTICATION MODELS
      5. CONTINUOUS AUTHENTICATION (CA) CONCEPTS
      6. BIOMETRICS
      7. OTHER FORMS OF CONTINUOUS AUTHENTICATION
      8. CONCLUSION
    12. Chapter 82: Securing the External Interfaces of a Federated Infrastructure Cloud
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. INSTALLATION AND DEPLOYMENT GUIDE
      5. THE DO’S AND DON’TS OF HOW TO BEST DEPLOY OUR SOLUTION
      6. LESSONS LEARNED: MAIN SHORTCOMINGS AND FUTURE DIRECTIONS
      7. CONCLUSION