did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9781605660363

Social and Human Elements of Information Security: Emerging Trends and Countermeasures

by ;
  • ISBN13:

    9781605660363

  • ISBN10:

    1605660361

  • Format: Hardcover
  • Copyright: 2008-09-30
  • Publisher: Igi Global
  • Purchase Benefits
List Price: $195.00

Summary

"Social and Human Elements of Information Security: Emerging Trends and Countermeasures provides insightful, high-quality research into the social and human aspects of information security. A comprehensive source of the latest trends, issues, and findings in the field, this book fills the missing gap in existing literature by bringing together the most recent work from researchers in the fast and evolving field of information security."--BOOK JACKET.

Table of Contents

Human and Psychological Aspects
Human and Social Aspects of Password Authenticationp. 1
Why Humans are the Weakest Linkp. 15
Impact of the Human Element on Information Securityp. 27
The Weakest Link: A Psychological Perspective on Why Users Make Poor Security Decisionsp. 43
Trusting Computers Through Trusting Humans: Software Verification in a Safety-Critical Information Societyp. 61
Social and Cultural Aspects
Information Security Culture as a Social System: Some Notes of Information Availability and Sharingp. 77
Social Aspects of Information Security: An International Perspectivep. 98
Social and Human Elements of Information Security: A Case Studyp. 116
Effects of Digital Convergence on Social Engineering Attack Channelsp. 133
A Social Ontology for Integrating Security and Software Engineeringp. 148
Usability Issues
Security Configuration for Non-Experts: A Case Study in Wireless Network Configurationp. 179
Security Usability Challenges for End-Usersp. 196
CAPTCHAs: Differentiating between Human and Botsp. 220
Privacy Concerns when Modeling Users in Collaborative Filtering Recommender Systemsp. 247
Organizational Aspects
An Adaptive Threat-Vulnerability Model and the Economics of Protectionp. 262
Bridging the Gap between Employee Surveillance and Privacy Protectionp. 283
Aligning IT Teams' Risk Management to Business Requirementsp. 301
Security Requirements Elicitation: An Agenda for Acquisition of Human Factorsp. 316
Do Information Security Policies Reduce the Incidence of Security Breaches: An Exploratory Analysisp. 326
Compilation of Referencesp. 343
Indexp. 381
Table of Contents provided by Blackwell. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program