You are previewing Security and Privacy Assurance in Advancing Technologies.
O'Reilly logo
Security and Privacy Assurance in Advancing Technologies

Book Description

Recent advances in computing and communication networks allow us to utilize information technology in ways previously unimaginable. In order for us to take full advantage of the possibilities offered by these new technologies, organizations, governmental agencies, and individuals must find ways to address the associated security and privacy implications of their actions and behaviors. Security and Privacy Assurance in Advancing Technologies: New Developments provides a comprehensive collection of knowledge from experts within the field of information security and privacy. This book explores the changing roles of information technology and how this change will impact information security and privacy. The evolving nature of information security and privacy brings additional challenges and opportunities for all of us to carry into the future.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Dedication
  5. Preface
  6. Chapter 1: Re-Evaluation of On-Line Hot Topic Discovery Model
    1. Abstract
    2. Introduction
    3. Second Stage
    4. Topic Index
    5. Conclusion
  7. Chapter 2: Understanding User Behavior towards Passwords through Acceptance and Use Modelling
    1. Abstract
    2. Introduction
    3. Background
    4. Modeling Security Behavior
    5. Research Questions
    6. Methods
    7. Data Analysis
    8. Results and Discussion
    9. Conclusion
    10. Appendix
  8. Chapter 3: Privacy Loss An Expanded Model of Legal and Illegal Data Exchange1
    1. ABSTRACT
    2. INTRODUCTION
    3. AN EXPANDED MODEL OF INFORMATION PRIVACY
    4. PROOF OF CONSTRUCTS FROM THE LITERATURE AND CURRENT MEDIA
    5. SAFEGUARDING PRIVACY
    6. SUMMARY
  9. Chapter 4: Do Privacy Statements Really Work?
    1. Abstract
    2. Introduction
    3. Background
    4. Methodology
    5. Measures
    6. Results
    7. The Effect of Fair Information Practices Content
    8. Between Group Differences Based on Fip Contents
    9. FIP score
    10. Discussion
    11. Further Research
    12. Conclusion
  10. Chapter 5: Large Key Sizes and the Security of Password-Based Cryptography
    1. Abstract
    2. INTRODUCTION
    3. PASSWORD-BASED SECURITY
    4. KEYS AND BLOCK CIPHERS
    5. WEAKNESSES IN KEY GENERATION
    6. BETTER PRACTICES
    7. APPENDIX: A GLOSSARY OF TECHNICAL TERMS
  11. Chapter 6: Information Systems Security Assurance Management at Municipal Software Solutions, Inc.
    1. Abstract
    2. INTRODUCTION
    3. MUNICIPAL SOFTWARE SYSTEMS, INC.2
  12. Chapter 7: Chronicle of a Journey
    1. Abstract
    2. INTRODUCTION
    3. Email Communication Concepts: Benefits, Risks and Obstacles
    4. Email Bounce Back
    5. The CrystalWare, Inc. Introduction
    6. The CrystalWare, Inc. Business Approach
    7. Email Bounce Back Project: An Overview
    8. Conclusion
  13. Chapter 8: Protected Health Information (PHI) in a Small Business
    1. ABSTRACT
    2. ORGANIZATION BACKGROUND
    3. Setting the Stage
    4. Case Description
    5. Current Challenges
    6. Appendix
  14. Chapter 9: Addressing Current PCI Compliance Challenges
    1. ABSTRACT
    2. INTRODUCTION
    3. HOW DOES THE CREDIT CARD INDUSTRY OPERATE?
    4. OVERVIEW OF THE PCI DATA SECURITY STANDARD VERSION 1.2
    5. PROGRESS ON PCI COMPLIANCE
    6. CHALLENGES HAMPERING PCI COMPLIANCE
    7. POSSIBLE SOLUTIONS
    8. REFINEMENT OF PCI RULES TO MEET CHANGING NEEDS
    9. SHIFTING THE DATA STORAGE BURDEN TO THE CREDIT CARD COMPANIES
    10. A STAKEHOLDER APPROACH
    11. SUGGESTING THE WAY FORWARD
    12. RECOMMENDATIONS
    13. CONCLUSION
  15. Chapter 10: Relationships between Information Security Concerns and National Cultural Dimensions
    1. Abstract
    2. INTRODUCTION
    3. BACKGROUND OF THE STUDY
    4. PROPOSITIONS FORMULATION
    5. DATA SOURCES AND RESEARCH METHODOLOGY
    6. DATA ANALYSIS AND RESULTS
    7. DISCUSSIONS
    8. CONCLUSION
  16. Chapter 11: Information Security by Words Alone
    1. Abstract
    2. INTRODUCTION
    3. ADDRESSING THE PROBLEM
    4. ANALYZING SECURITY POLICIES
    5. DISCUSSION
    6. CONCLUSION
  17. Chapter 12: The Social Network Structure of a Computer Hacker Community
    1. ABSTRACT
    2. INTRODUCTION
    3. SOCIAL ORGANIZATION OF HACKERS
    4. RESEARCH MODEL AND RESEARCH QUESTIONS
    5. NETWORK DATA ANALYSIS AND RESULTS
    6. CONCLUSION AND FUTURE DIRECTIONS
  18. Chapter 13: Security and Privacy Issues in Secure E-Mail Standards and Services
    1. ABSTRACT
    2. CIPHERS AND STANDARDS
    3. Security Standards
    4. OPENPGP AND S/MIME
    5. Security Issues in PGP and OpenPGP
    6. Security Issues in S/MIME
    7. Cipher Selection
    8. Sequence of Operations
    9. SUMMARY
  19. Chapter 14: Advances in Security and Privacy in Wireless Sensor Networks
    1. ABSTRACT
    2. INTRODUCTION
    3. SYMMETRIC-KEY BASED PROTOCOLS FOR WIRELESS SENSOR NETWORKS
    4. PUBLIC-KEY BASED PROTOCOLS IN WIRELESS SENSOR NETWORKS
    5. SECURITY IN WIRELESS SENSOR NETWORKS
    6. ATTACKS AND COUNTERMEASURES
    7. OPEN ISSUES AND FUTURE RESEARCH DIRECTIONS
    8. CONCLUSION
  20. Chapter 15: Multimedia Information Security and Privacy
    1. ABSTRACT
    2. Introduction to Encryption
    3. Image Encryption
    4. Joint Compression-Encryption Methodologies
    5. Video Encryption
    6. Introduction to Image/Video Information Hiding
    7. Low Bitrate Information Hiding
    8. High Bitrate Information Hiding
    9. Medical Imaging Information Security and Privacy
    10. Summary
  21. Chapter 16: Cloak and Dagger
    1. Abstract
    2. Introduction
  22. Chapter 17: A Resilient Fair Electronic Contract Signing Protocol
    1. Abstract
    2. Introduction
    3. Fair Electronic Exchange
    4. Micali’s Electronic Contract Signing Protocol
    5. Bao’s Electronic Contract Signing Protocol
    6. Our Fair Contract Signing Implementation
    7. Conclusion
  23. Chapter 18: Secure and Private Service Discovery in Pervasive Computing Environments
    1. Abstract
    2. Introduction
    3. Background
    4. PrudentExposure Service Discovery
    5. Progressive and Probabilistic Exposure
    6. Future Research Directions
    7. Conclusion
  24. Chapter 19: Preserving Privacy in Mining Quantitative Associations Rules
    1. Abstract
    2. Introduction
    3. Conclusion
  25. Chapter 20: A New SOA Security Model to Protect Against Web Competitive Intelligence Attacks by Software Agents
    1. ABSTRACT
    2. INTRODUCTION
    3. COMPETITOR ANALYSIS METHODS
    4. SOA IN WEB
    5. SECYRITY GAPS
    6. SOFTWARE AGENT METHODOLOGY
    7. PROTECTION MODEL
    8. CONCLUSION
  26. Chapter 21: PAKE on the Web
    1. Abstract
    2. INTRODUCTION
    3. THE PROBLEM
    4. RELATED WORK
    5. THE INTEGRATION DESIGN
    6. Server-Side Integration
    7. PROTOTYPE IMPLEMENTATION
    8. CONCLUSION
    9. APPENDIX
  27. Chapter 22: Three Models to Measure Information Security Compliance
    1. Abstract
    2. 1. Introduction
    3. 2. Basics Principles
    4. 3. Information Securty Set Theory MODEL (ISST)
    5. 4. THREE MODELS FOR LOCAL COMPLIANCE MEASURES
    6. 5. Discussion
    7. Definition of Compliance Fuzzy Measure
    8. 6. Conclusion
    9. APPENDIX 1
  28. Chapter 23: Do You Know Where Your Data Is?
    1. Abstract
    2. Introduction
    3. Current State of Online Privacy
    4. Hypotheses of the Study
    5. Methodology
    6. Results and Analysis
    7. Summary and Future Work
    8. Appendix A
  29. Compilation of References
  30. About the Contributors
  31. Index