Analyzing security, trust, and crime in the digital world /

"This book explores techniques and technologies used to secure data and prevent intrusion in virtual environments, providing meaningful research on intrusion detection and authentication techniques in order to further defend their systems and protect the information therein"--Provided by p...

Full description

Saved in:
Bibliographic Details
Corporate Authors: IGI Global
Group Author: Nemati, Hamid R., 1958- (Editor)
Published: IGI Global,
Publisher Address: Hershey, Pa. :
Publication Dates: [2014]
Literature type: eBook
Language: English
Subjects:
Online Access: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-4856-2
Summary: "This book explores techniques and technologies used to secure data and prevent intrusion in virtual environments, providing meaningful research on intrusion detection and authentication techniques in order to further defend their systems and protect the information therein"--Provided by publisher.
Carrier Form: PDFs (281 pages)
Bibliography: Includes bibliographical references.
ISBN: 9781466648579
Access: Restricted to subscribers or individual electronic text purchasers.
Index Number: HF5548
CLC: TP309
Contents: A general framework of algorithm-based fault tolerance technique for computing systems / Hodjatollah Hamidi Methods on determining the investment in IT security / Amanda Eisenga, Walter Rodriguez, Travis L. Jones Critical path stability region: a single-time estimate approach / Hossein Arsham, Veena Adlakha Authenticity in online knowledge sharing: experiences from networks of competence meetings / Inge Hermanrud Information privacy concerns and workplace surveillance: a case of differing perspectives / Regina Connolly Wearable computing: security challenges, BYOD, privacy, and legal aspects / John Lindstr om, Claas Hanken Control mechanism of identity theft and its integrative impact on consumers' purchase intention in e-commerce / Mahmud A. Shareef, Vinod Kumar, Uma Kumar The influence of trust in the UTAUT model / Eduardo Esteva-Armida, Alberto Rubio-Sanchez Technology-related risks in virtual and traditional information systems projects / April H. Reed A likelihood ratio-based forensic text comparison in SMS messages: a fused system with lexical features and N-grams / Shunichi Ishihara.