Handbook of Research on Emerging Developments in Data Privacy

Editor/Author Gupta, Manish
Publication Year: 2015
Publisher: IGI Global

Single-User Purchase Price: $325.00
Unlimited-User Purchase Price: $487.50
ISBN: 978-1-4666-7381-6
Category: Technology & Engineering - Technology
Image Count: 72
Book Status: Available
Table of Contents

The Handbook of Research on Emerging Developments in Data Privacy brings together new ideas on how to deal with potential leaks of valuable customer information.

Share this

Table of Contents

  • Preface
  • LEGAL ASPECTS
  • IDENTITY PROTECTION
  • TRUST AND SECURITY
  • DETECTION TECHNIQUES
  • REFERENCES
  • Section 1: Legal Aspects
  • Chapter 1: Cloud State Surveillance
  • ABSTRACT
  • 1. INTRODUCTION
  • 2. CLOUD COMPUTING: ONCE UPON A TIME
  • 3. LEGAL RISKS
  • 4. CONCLUSION
  • REFERENCES
  • Chapter 2: Data Protection in EU Law after Lisbon
  • ABSTRACT
  • 1. INTRODUCTION
  • 2. THE EU DATA PROTECTION REGIME AFTER THE LISBON TREATY
  • 3. CONCLUSION
  • REFERENCES
  • KEY TERMS AND DEFINITIONS
  • APPENDIX: TABLE OF CASES
  • Chapter 3: File-Sharing of Copyrighted Works, P2P, and the Cloud
  • ABSTRACT
  • INTRODUCTION
  • PRIVACY AND THE RIGHT TO INFORMATIONAL SELF-DETERMINATION
  • DIGITAL COPYRIGHT ENFORCEMENT SURVEILLANCE MECHANISMS
  • THE GRADUATED RESPONSE: AN ENFORCEMENT MECHANISM
  • CONCLUSION: REVISITING AND EXTENDING LEVIES
  • REFERENCES
  • KEY TERMS AND DEFINITIONS
  • Chapter 4: Dataveillance in the Workplace
  • ABSTRACT
  • INTRODUCTION
  • A SHIFTING CONTEXT
  • PRIVACY AND SURVEILLANCE
  • THE EMPLOYER PERSPECTIVE
  • SURVEILLANCE: MANAGEMENTS MOTIVATION
  • AN ETHICAL PARADOX: ORGANISATIONAL JUSTICE, TRUST, AND RISK
  • A CODE OF ETHICS FOR WORKPLACE SURVEILLANCE
  • LEGAL PROTECTIONS: THE ROLE OF PRIVACY LEGISLATION
  • CONCLUSION
  • REFERENCES
  • KEY TERMS AND DEFINITIONS
  • Chapter 5: Social Engineering Techniques, Password Selection, and Health Care Legislation
  • ABSTRACT
  • INTRODUCTION
  • BACKGROUND
  • RESEARCH METHODOLOGY
  • DISCUSSION
  • FUTURE TRENDS
  • CONCLUSION
  • REFERENCES
  • KEY TERMS AND DEFINITIONS
  • APPENDIX: CONDENSED SURVEY
  • Section 2: Identity Protection
  • Chapter 6: Play That Funky Password!
  • ABSTRACT
  • 1. INTRODUCTION
  • 2. BACKGROUND
  • 3. ALTERNATIVE APPROACHES
  • 4. MUSICAL PASSWORDS
  • 5. LARGE SCALE ONLINE TESTING OF MUSIPASS
  • 6. RESULTS FROM ONLINE EXPERIMENT
  • 7. TESTING TASK TIME
  • 8. LAB BASED TASK TIME RESULTS
  • 9. DISCUSSION
  • 10. CONCLUSION
  • 11. FUTURE WORK
  • REFERENCES
  • ADDITIONAL READING
  • KEY TERMS AND DEFINITIONS
  • Chapter 7: Privacy, Security, and Identity Theft Protection
  • ABSTRACT
  • INTRODUCTION
  • BACKGROUND
  • REGULATORY LAWS AND COMPLIANCE
  • PRIVACY AND SECURITY
  • INCENTIVES AND DETERRENCE FOR PRIVACY PROTECTION
  • FURTHER RESEARCH DIRECTIONS
  • CONCLUSION
  • REFERENCES
  • ADDITIONAL READING
  • KEY TERMS AND DEFINITIONS
  • Chapter 8: Identity Management Systems
  • ABSTRACT
  • 1. INTRODUCTION
  • 2. BACKGROUND
  • 3. COMPONENTS OF IDM SYSTEMS
  • 4. ARCHITECTURE
  • 5. ATTRIBUTES OF A GOOD IDM SYSTEM
  • 6. MOST POPULAR SOFTWARE SOLUTIONS
  • 7. EVALUATION FACTORS FOR COMPARING VARIOUS SOLUTIONS
  • 8. CHALLENGES
  • 9. APPLICATIONS
  • 10. STANDARDS RELATED TO IDM SYSTEMS
  • 11. RISK ASSESSMENT
  • 12. CONCLUSION
  • REFERENCES
  • KEY TERMS AND DEFINITIONS
  • Chapter 9: How Private Is Your Financial Data?
  • ABSTRACT
  • INTRODUCTION
  • AUTHENTICATION: BACKGROUND
  • ROLE OF AUTHENTICATION IN ONLINE BANKING
  • INTERNET BANKING: ISSUES
  • FRAUD PREVENTION STRATEGIES
  • SYSTEMS AND SOLUTIONS TO ATTACKS IN ONLINE BANKING
  • AUTHENTICATION IN MOBILE BANKING
  • CONCLUSION
  • REFERENCES
  • KEY TERMS AND DEFINITIONS
  • Section 3: Trust and Security
  • Chapter 10: Security and Privacy Requirements Engineering
  • ABSTRACT
  • INTRODUCTION
  • SQUARE FOR PRIVACY
  • CLASSIFICATION OF RISK ASSESSMENT TECHNIQUES
  • EVALUATION CASE STUDIES
  • CONCLUSION AND FUTURE RESEARCH DIRECTIONS
  • REFERENCES
  • ADDITIONAL READING
  • KEY TERMS AND DEFINITIONS
  • Chapter 11: An Information Security Model for Implementing the New ISO 27001
  • ABSTRACT
  • INTRODUCTION
  • RESEARCH FRAMEWORK
  • HOLISTIC INFORMATION SECURITY GOVERNANCE MODEL
  • IMPLEMENTATION
  • CASE STUDIES: RESULTS AND EXPERIENCES
  • OUTLOOK
  • CONCLUSION
  • REFERENCES
  • ADDITIONAL READING
  • KEY TERMS AND DEFINITIONS
  • Chapter 12: Health IT
  • ABSTRACT
  • INTRODUCTION
  • PRIVACY IMPACT ASSESSMENT
  • PRIVACY IMPACT SUITABILITY ASSESSMENT (PISA) FRAMEWORK
  • PRIVACY SCREENING FRAMEWORK (PSF)
  • SOLUTIONS AND RECOMMENDATIONS
  • FUTURE RESEARCH DIRECTIONS
  • CONCLUSION
  • REFERENCES
  • KEY TERMS AND DEFINITIONS
  • Chapter 13: Do We Need Security Management Systems for Data Privacy?
  • ABSTRACT
  • INTRODUCTION: THINKING IN SYSTEMS
  • MEASURING SECURITY INDIRECTLY BY THE RISK
  • THE INFLUENCE OF BASEL II ON IT/INF. SECURITY
  • THEMATIC DISCUSSION
  • MANAGEMENT SYSTEMS AND THE DEMING CYCLE
  • PREVENTIVE ADJUSTMENT OF RISKS WITH MANAGEMENT SYSTEMS
  • FIELD STUDIES (2007–2010) AT 26 POWER STATIONS AND 3 SURFACE MINING OPERATIONS
  • TARGET FUNCTIONS AND MANAGEMENT SYSTEMS
  • SOLUTIONS AND RECOMMENDATIONS
  • FUTURE RESEARCH DIRECTIONS
  • CONCLUSION
  • REFERENCES
  • KEY TERMS AND DEFINITIONS
  • Chapter 14: Trust and Trust Building of Virtual Communities in the Networked Age
  • ABSTRACT
  • INTRODUCTION
  • BACKGROUND
  • TRUST
  • ISSUES AND DISCUSSION
  • FUTURE RESEARCH DIRECTIONS
  • CONCLUSION
  • REFERENCES
  • ADDITIONAL READING
  • KEY TERMS AND DEFINITIONS
  • Chapter 15: The Security, Privacy, and Ethical Implications of Social Networking Sites
  • ABSTRACT
  • BACKGROUND
  • INTRODUCTION
  • SECURITY AND PRIVACY ISSUES OF SNS
  • ETHICAL ISSUES OF CYBER BULLYING AND ANTISOCIAL BEHAVIOUR
  • CASE STUDY 1: THE JESSI SLAUGHTER INCIDENT, A USA CASE
  • CASE STUDY 2: THE IMPACT OF PUBLIC OPINION, AN AUSTRALIAN CASE
  • CONCLUSION
  • FUTURE RESEARCH DIRECTION
  • REFERENCES
  • ADDITIONAL READING
  • KEY TERMS AND DEFINITIONS
  • Section 4: Detection Techniques
  • Chapter 16: Guidance for Selecting Data Collection Mechanisms for Intrusion Detection
  • ABSTRACT
  • INTRODUCTION
  • RELATED WORK
  • DATA COLLECTION FOR INFORMATION SECURITY
  • DATA COLLECTION FOR INTRUSION DETECTION
  • DETERMINING WHAT DATA TO COLLECT
  • A TAXONOMY OF MECHANISM CHARACTERISTICS
  • A TAXONOMY OF DEPLOYMENT CONSIDERATIONS
  • OPERATIONAL CONSIDERATIONS
  • DEPLOYMENT STRATEGY
  • FUTURE CHALLENGES
  • CONCLUSION
  • ACKNOWLEDGMENT
  • REFERENCES
  • ADDITIONAL READING
  • KEY TERMS AND DEFINITIONS
  • APPENDIX: CLASSIFICATION OF MECHANISMS AND TECHNIQUES FOR DATA COLLECTION
  • Chapter 17: An Auto-Reclosing-Based Intrusion Detection Technique for Enterprise Networks
  • ABSTRACT
  • INTRODUCTION
  • BACKGROUND
  • INTRUSION DETECTION SYSTEMS
  • INTRUSION PREVENTION SYSTEMS
  • COMBINED INTRUSION DETECTION AND PREVENTION SYSEMS
  • THE INTRUSION DETECTION SYSTEM TECHNIQUE
  • DENIAL OF SERVICE ATTACKS
  • METHOD OF APPROACH
  • MODELING TECHNIQUE
  • RESULTS FROM THE SIMULATION STUDIES
  • BLOCKING ANALYSIS
  • RECOMMENDATIONS
  • SENSITIVITY ANALYSIS
  • MULTIRESOLUTION TECHNIQUES
  • FUTURE RESEARCH DIRECTIONS
  • IMPLEMENTATION OF IDS TECHNIQUE
  • CONCLUSION
  • CONTRIBUTION
  • REFERENCES
  • ADDITIONAL READING
  • KEY TERMS AND DEFINITIONS
  • Chapter 18: A Dynamic Subspace Anomaly Detection Method Using Generic Algorithm for Streaming Network Data
  • ABSTRACT
  • INTRODUCTION
  • OVERVIEW OF SPOT
  • CASE STUDY DESCRIPTION
  • EXPERIMENTAL EVALUATION
  • CONCLUSION
  • ACKNOWLEDGMENT
  • REFERENCES
  • ADDITIONAL READING
  • KEY TERMS AND DEFINITIONS
  • Chapter 19: Detecting Botnet Traffic from a Single Host
  • ABSTRACT
  • INTRODUCTION
  • DETECTION METHOD
  • DATASET
  • DATA PROCESSING
  • EXPERIMENTS AND RESULTS
  • DISCUSSION ABOUT THE EXPERIMENTS
  • CONCLUSION
  • FUTURE RESEARCH DIRECTIONS
  • ACKNOWLEDGMENT
  • REFERENCES
  • ADDITIONAL READING
  • KEY TERMS AND DEFINITIONS
  • Compilation of References
  • About the Contributors