Advances in Information Security, Privacy, and Ethics (AISPE): 145 Volumes

Advances in Information Security, Privacy, and Ethics (AISPE): 145 Volumes

Series Editor(s): Manish Gupta (State University of New York, USA)
ISSN: 1948-9730|EISSN: 1948-9749
Select a Format:
Institutions: Print
$21,430.00
List Price: $34,815.00

Description

As digital technologies become more pervasive in everyday life and the Internet is utilized in ever increasing ways by both private and public entities, concern over digital threats becomes more prevalent.

The Advances in Information Security, Privacy, & Ethics (AISPE) Book Series provides cutting-edge research on the protection and misuse of information and technology across various industries and settings. Comprised of scholarly research on topics such as identity management, cryptography, system security, authentication, and data protection, this book series is ideal for reference by IT professionals, academicians, and upper-level students.

Topics Covered

  • Access Control
  • CIA Triad of Information Security
  • Computer ethics
  • Cookies
  • Cyberethics
  • Data Storage of Minors
  • Device Fingerprinting
  • Electronic Mail Security
  • Global Privacy Concerns
  • Information Security Standards
  • Internet Governance
  • IT Risk
  • Network Security Services
  • Privacy Issues of Social Networking
  • Privacy-Enhancing Technologies
  • Risk Management
  • Security Classifications
  • Security Information Management
  • Technoethics
  • Telecommunications Regulations
  • Tracking Cookies

Titles in Series

Cases on Security, Safety, and Risk Management
Aleksandra Zając (AUS American Institute of Applied Sciences in Switzerland, Switzerland), Giuseppe Catenazzo (AUS American Institute of Applied Sciences in Switzerland, Switzerland & ICN Business School, France), Emmanuel Fragnière (University of Applied Sciences of Western Switzerland, Switzerland & University of Bath, UK)
Copyright © 2024. 330 pages.
In the landscape of security, safety, and risk management, businesses grapple with challenges that extend beyond traditional financial considerations. The identifica...
5G and Fiber Optics Security Technologies for Smart Grid Cyber Defense
G. Prabhakar (Thiagarajar College of Engineering, India), N. Ayyanar (Thiagarajar College of Engineering, India), S. Rajaram (Thiagarajar College of Engineering, India)
Copyright © 2024. 320 pages.
In the digital age, smart grids stand as the backbone of modern energy systems, facilitating efficient energy distribution and management. However, this sophisticati...
Multidisciplinary Approach to Cyber Physical Systems and IoT Security
Ajitkumar Pundge (Woxsen University, India), Beauty Pandey (Woxsen University, India), Daya Shankar Tiwari (Woxsen University, India)
Copyright © 2024. 300 pages.
In the rapidly evolving landscape of technology, Cyber-Physical Systems (CPS) and the Internet of Things (IoT) have become integral parts of modern infrastructure. H...
Blockchain Applications for Smart Contract Technologies
Abdelkader Mohamed Sghaier Derbali (Taibah University, Saudi Arabia)
Copyright © 2024. 310 pages.
Blockchain technology has garnered much attention in recent years from both academic and business spheres. At its core, this technology enables the implementation of...
Enhancing Security in Public Spaces Through Generative Adversarial Networks (GANs)
Sivaram Ponnusamy (Sandip University, Nashik, India), Jilali Antari (Ibn Zohr Agadir University, Morocco), Pawan R. Bhaladhare (Sandip University, India), Amol D. Potgantwar (Sandip University, India), Swaminathan Kalyanaraman (Anna University, Trichy, India)
Copyright © 2024. 350 pages.
As the demand for data security intensifies, the vulnerabilities become glaring, exposing sensitive information to potential threats. In this tumultuous landscape, G...
Emerging Technologies for Securing the Cloud and IoT
Amina Ahmed Nacer (University of Lorraine, France), Mohammed Riyadh Abdmeziem (Ecole Nationale Supérieure d’Informatique, Algeria)
Copyright © 2024. 361 pages.
In an age defined by the transformative ascent of cloud computing and the Internet of Things (IoT), our technological landscape has undergone a revolutionary evoluti...
Machine Learning and Cryptographic Solutions for Data Protection and Network Security
J. Anitha Ruth (SRM Institute of Science and Technology, India), Vijayalakshmi G. V. Mahesh (BMS Institute of Technology and Management, India), P. Visalakshi (SRM Institute of Science and Technology, India), R. Uma (Sri Sai Ram Engineering College, India), A. Meenakshi (SRM Institute of Science and Technology, India)
Copyright © 2024. 420 pages.
In the relentless battle against escalating cyber threats, data security faces a critical challenge – the need for innovative solutions to fortify encryption and dec...
Investigating and Combating Gender-Related Victimization
Gabriela Mesquita Borges (University of Lusíada, Portugal), Ana Guerreiro (University of Maia, Portugal & School of Criminology, Faculty of Law, University of Porto, Portugal), Miriam Pina (School of Criminology, Faculty of Law, University of Porto, Portugal & Faculté de Droit, des Sciences Criminelles et d’administration Publique, Université de Lausanne, Switzerland)
Copyright © 2024. 279 pages.
In the field of victimology, the landscape of victimization is constantly evolving, presenting new challenges and demands. The traditional approaches to understandin...
Emerging Perspectives in Systems Security Engineering, Data Science, and Artificial Intelligence
Maurice Dawson (Illinois Institute of Technology, USA)
Copyright © 2024. 315 pages.
The global society has continued down a path of more connected devices, resulting in an explosion of data and endless possibilities, such as the rise of artificial i...
Navigating Cyber Threats and Cybersecurity in the Logistics Industry
Noor Zaman Jhanjhi (School of Computing Science, Taylor’s University, Malaysia), Imdad Ali Shah (School of Computing Science, Taylor’s University, Malaysia)
Copyright © 2024. 448 pages.
Supply chains are experiencing a seismic shift towards customer-centricity and sustainability and the challenges that are bound to arise will require innovative solu...
Analyzing and Mitigating Security Risks in Cloud Computing
Pawan Kumar Goel (Raj Kumar Goel Institute of Technology, India), Hari Mohan Pandey (Bournemouth University, UK), Amit Singhal (Raj Kumar Goel Institute of Technology, India), Sanyam Agarwal (ACE Group of Colleges, India)
Copyright © 2024. 270 pages.
In the dynamic field of modern business, where cloud computing has become the primary focus of operations, a pressing issue arises – the persistent concerns of secur...
Cybersecurity Issues and Challenges in the Drone Industry
Imdad Ali Shah (School of Computing Science, Taylor's University, Malaysia), Noor Zaman Jhanjhi (School of Computing Science, Taylor's University, Malaysia)
Copyright © 2024. 573 pages.
Cybersecurity Issues and Challenges in the Drone Industry is a comprehensive exploration of the critical cybersecurity problems faced by the rapidly expanding drone...
Global Perspectives on the Applications of Computer Vision in Cybersecurity
Franklin Tchakounte (University of Ngaoundere, Cameroon), Marcellin Atemkeng (University of Rhodes, South Africa)
Copyright © 2024. 300 pages.
As cybersecurity threats continue to grow in scale and complexity, it is crucial to explore new and innovative solutions to combat them. The application of computer...
Emerging Technologies and Security in Cloud Computing
D. Lakshmi (VIT Bhopal University, India), Amit Kumar Tyagi (National Institute of Fashion Technology, New Delhi, India)
Copyright © 2024. 539 pages.
In today's digital age, the exponential growth of cloud computing services has brought significant opportunities for businesses and individuals alike. However, t...
Improving Security, Privacy, and Trust in Cloud Computing
Pawan Kumar Goel (Raj Kumar Goel Institute of Technology, India), Hari Mohan Pandey (Bournemouth University, UK), Amit Singhal (Raj Kumar Goel Institute of Technology, India), Sanyam Agarwal (ACE Group of Colleges, India)
Copyright © 2024. 299 pages.
Cloud computing adoption has revolutionized how businesses and individuals harness the power of technology. The cloud's scalability, accessibility, and cost-effi...
Risk Detection and Cyber Security for the Success of Contemporary Computing
Raghvendra Kumar (GIET University, India), Prasant Kumar Pattnaik (KIIT Univeristy, India)
Copyright © 2023. 480 pages.
With the rapid evolution of technology, identifying new risks is a constantly moving target. The metaverse is a virtual space that is interconnected with cloud compu...
Privacy Preservation and Secured Data Storage in Cloud Computing
Lakshmi D. (VIT Bhopal University, India), Amit Kumar Tyagi (National Institute of Fashion Technology, New Delhi, India)
Copyright © 2023. 516 pages.
As cloud services become increasingly popular, safeguarding sensitive data has become paramount. Privacy Preservation and Secured Data Storage in Cloud Computing is...
Contemporary Challenges for Cyber Security and Data Privacy
Nuno Mateus-Coelho (Lusófona University, Portugal), Maria Manuela Cruz-Cunha (Polytechnic Institute of Cávado and Ave, Portugal)
Copyright © 2023. 308 pages.
In an era defined by the pervasive integration of digital systems across industries, the paramount concern is the safeguarding of sensitive information in the face o...
Malware Analysis and Intrusion Detection in Cyber-Physical Systems
S.L. Shiva Darshan (Department of Information and Communication Technology, Manipal Institute of Technology, India), M.V. Manoj Kumar (Department of Information Science and Engineering, Nitte Meenakshi Institute of Technology, India), B.S. Prashanth (Department of Information Science and Engineering, Nitte Meenakshi Institute of Technology, India), Y. Vishnu Srinivasa Murthy (Department of Computational Intelligence, Vellore Institute of Technology, India)
Copyright © 2023. 415 pages.
Many static and behavior-based malware detection methods have been developed to address malware and other cyber threats. Even though these cybersecurity systems offe...
Handbook of Research on Data Science and Cybersecurity Innovations in Industry 4.0 Technologies
Thangavel Murugan (United Arab Emirates University, Al Ain, UAE), Nirmala E. (VIT Bhopal University, India)
Copyright © 2023. 620 pages.
Disruptive innovations are now propelling Industry 4.0 (I4.0) and presenting new opportunities for value generation in all major industry segments. I4.0 technologies...
Perspectives on Ethical Hacking and Penetration Testing
Keshav Kaushik (University of Petroleum and Energy Studies, India), Akashdeep Bhardwaj (University of Petroleum and Energy Studies, India)
Copyright © 2023. 445 pages.
Cybersecurity has emerged to address the need for connectivity and seamless integration with other devices and vulnerability assessment to find loopholes. However, t...
AI Tools for Protecting and Preventing Sophisticated Cyber Attacks
Eduard Babulak (National Science Foundation, USA)
Copyright © 2023. 233 pages.
The ubiquity and pervasive access to internet resources 24/7 by anyone from anywhere is enabling access to endless professional, educational, technical, business, in...
Cyber Trafficking, Threat Behavior, and Malicious Activity Monitoring for Healthcare Organizations
Dinesh C. Dobhal (Graphic Era University (Deemed), India), Sachin Sharma (Graphic Era University (Deemed), India), Kamlesh C. Purohit (Graphic Era University (Deemed), India), Lata Nautiyal (University of Bristol, UK), Karan Singh (Jawaharlal Nehru University, India)
Copyright © 2023. 206 pages.
In comparison to Industry 4.0, Industry 5.0 is seen as the next industrial revolution, with the goal of leveraging the creativity of human experts in combination wit...
Effective Cybersecurity Operations for Enterprise-Wide Systems
Festus Fatai Adedoyin (Bournemouth University, UK), Bryan Christiansen (CYGERA, LLC, USA)
Copyright © 2023. 328 pages.
Cybersecurity, or information technology security (I/T security), is the protection of computer systems and networks from information disclosure; theft of or damage...
Protecting User Privacy in Web Search Utilization
Rafi Ullah Khan (The University of Agriculture, Peshawar, Pakistan)
Copyright © 2023. 336 pages.
Online user privacy is a delicate issue that has been unfortunately overlooked by technology corporations and especially the public since the birth of the internet....
Information Security and Privacy in Smart Devices: Tools, Methods, and Applications
Carlos Rabadão (Computer Science and Communication Research Centre, Polytechnic of Leiria, Portugal), Leonel Santos (Computer Science and Communication Research Centre, Polytechnic of Leiria, Portugal), Rogério Luís de Carvalho Costa (Computer Science and Communication Research Centre, Polytechnic of Leiria, Portugal)
Copyright © 2023. 328 pages.
In recent years, smart devices have become commonplace in our daily lives. On the internet of things (IoT), these devices powered new intelligent services. Their app...
Applications of Encryption and Watermarking for Information Security
Boussif Mohamed (University of Tunis El Manar, Tunisia)
Copyright © 2023. 245 pages.
In recent years, media digitalization has been booming. It has, however, led to a phenomenon of private data hacking, which was stimulated by the expansion of the da...
Handbook of Research on Cybersecurity Risk in Contemporary Business Systems
Festus Fatai Adedoyin (Bournemouth University, UK), Bryan Christiansen (Southern New Hampshire University, USA)
Copyright © 2023. 446 pages.
The field of cybersecurity is becoming increasingly important due to the continuously expanding reliance on computer systems, the internet, wireless network standard...
Fraud Prevention, Confidentiality, and Data Security for Modern Businesses
Arshi Naim (King Kalid University, Saudi Arabia), Praveen Kumar Malik (Lovely Professional University, India), Firasat Ali Zaidi (Tawuniya Insurance, Saudi Arabia)
Copyright © 2023. 347 pages.
The modern business world faces many new challenges in preserving its confidentiality and data from online attackers. Further, it also faces a struggle with preventi...
Handbook of Research on Cybersecurity Issues and Challenges for Business and FinTech Applications
Saqib Saeed (Department of Computer Information Systems, College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University, Dammam, Saudi Arabia), Abdullah M. Almuhaideb (Department of Networks and Communications, College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University, Dammam, Saudi Arabia), Neeraj Kumar (Thapar Institute of Engineering and Technology, India), Noor Zaman (Taylor's University, Malaysia), Yousaf Bin Zikria (Yeungnam University, South Korea)
Copyright © 2023. 552 pages.
Digital transformation in organizations optimizes the business processes but also brings additional challenges in the form of security threats and vulnerabilities. C...
Cybersecurity Issues, Challenges, and Solutions in the Business World
Suhasini Verma (Manipal University Jaipur, India), Vidhisha Vyas (IILM University, Gurugram, India), Keshav Kaushik (University of Petroleum and Energy Studies, India)
Copyright © 2023. 288 pages.
Cybersecurity threats have become ubiquitous and continue to topple every facet of the digital realm as they are a problem for anyone with a gadget or hardware devic...
Handbook of Research on Technical, Privacy, and Security Challenges in a Modern World
Amit Kumar Tyagi (National Institute of Fashion Technology, New Delhi, India)
Copyright © 2022. 474 pages.
More individuals than ever are utilizing internet technologies to work from home, teach and learn, shop, interact with peers, review medical records, and more. While...
Applications of Machine Learning and Deep Learning for Privacy and Cybersecurity
Victor Lobo (NOVA Information Management School (NOVA-IMS), NOVA University Lisbon, Portugal & Portuguese Naval Academy, Portugal), Anacleto Correia (CINAV, Portuguese Naval Academy, Portugal)
Copyright © 2022. 271 pages.
The growth of innovative cyber threats, many based on metamorphosing techniques, has led to security breaches and the exposure of critical information in sites that...
Cross-Industry Applications of Cyber Security Frameworks
Sukanta Kumar Baral (Indira Gandhi National Tribal University, India), Richa Goel (Amity University, Noida, India), Md Mashiur Rahman (Bank Asia Ltd., Bangladesh), Jahangir Sultan (Bentley University, USA), Sarkar Jahan (Royal Bank of Canada, Canada)
Copyright © 2022. 244 pages.
Data is the most important commodity, which is why data protection has become a global priority. Data breaches and security flaws can jeopardize the global economy....
Methods, Implementation, and Application of Cyber Security Intelligence and Analytics
Jena Om Prakash (Ravenshaw University, India), H.L. Gururaj (Vidyavardhaka College of Engineering, India), M.R. Pooja (Vidyavardhaka College of Engineering, India), S.P. Pavan Kumar (Vidyavardhaka College of Engineering, India)
Copyright © 2022. 269 pages.
Cyber security is a key focus in the modern world as more private information is stored and saved online. In order to ensure vital information is protected from vari...
Information Security Practices for the Internet of Things, 5G, and Next-Generation Wireless Networks
Biswa Mohan Sahoo (Manipal University, Jaipur, India), Suman Avdhesh Yadav (Amity University, India)
Copyright © 2022. 313 pages.
Information security practices are the backbone of smart factories, which dynamically coordinate and optimize production processes based on data produced and collect...
Global Perspectives on Information Security Regulations: Compliance, Controls, and Assurance
Guillermo A. Francia III (University of West Florida, USA), Jeffrey S. Zanzig (Jacksonville State University, USA)
Copyright © 2022. 309 pages.
Recent decades have seen a proliferation of cybersecurity guidance in the form of government regulations and standards with which organizations must comply. As socie...
Handbook of Research on Cyber Law, Data Protection, and Privacy
Nisha Dhanraj Dewani (Maharaja Agrasen Institute of Management Studies, Guru Gobind Singh Indraprastha University, India), Zubair Ahmed Khan (University School of Law and Legal Studies, Guru Gobind Singh Indraprastha University, India), Aarushi Agarwal (Maharaja Agrasen Institute of Management Studies, India), Mamta Sharma (Gautam Buddha University, India), Shaharyar Asaf Khan (Manav Rachna University, India)
Copyright © 2022. 390 pages.
The advancement of information and communication technology has led to a multi-dimensional impact in the areas of law, regulation, and governance. Many countries hav...
Cybersecurity Crisis Management and Lessons Learned From the COVID-19 Pandemic
Ryma Abassi (Sup'Com, University of Carthage, Tunisia), Aida Ben Chehida Douss (Sup'Com, University of Carthage, Tunisia)
Copyright © 2022. 276 pages.
The COVID-19 pandemic has forced organizations and individuals to embrace new practices such as social distancing and remote working. During these unprecedented time...
Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security
Maurice Dawson (Illinois Institute of Technology, USA), Oteng Tabona (Botswana International University of Science and Technology, Botswana), Thabiso Maupong (Botswana International University of Science and Technology, Botswana)
Copyright © 2022. 282 pages.
Developing nations have seen many technological advances in the last decade. Although beneficial and progressive, they can lead to unsafe mobile devices, system netw...
Advances in Malware and Data-Driven Network Security
Brij B. Gupta (National Institute of Technology, Kurukshetra, India)
Copyright © 2022. 304 pages.
Every day approximately three-hundred thousand to four-hundred thousand new malware are registered, many of them being adware and variants of previously known malwar...
Modern Day Surveillance Ecosystem and Impacts on Privacy
Ananda Mitra (Wake Forest University, USA)
Copyright © 2022. 242 pages.
The notion of surveillance has become increasingly more crucial in public conversation as new tools of observation are obtained by many different players. The tradit...
NATO and the Future of European and Asian Security
Carsten Sander Christensen (Billund Municipaly's Museums, Denmark), Vakhtang Maisaia (Caucasus International University, Georgia)
Copyright © 2021. 331 pages.
The key role in the security policy of the North Atlantic Treaty Organization (NATO) is to prevent new types of asymmetric challenges and deal with the new architect...
Ethical Hacking Techniques and Countermeasures for Cybercrime Prevention
Nabie Y. Conteh (Southern University at New Orleans, USA)
Copyright © 2021. 168 pages.
As personal data continues to be shared and used in all aspects of society, the protection of this information has become paramount. While cybersecurity should prote...
Handbook of Research on Advancing Cybersecurity for Digital Transformation
Kamaljeet Sandhu (University of New England, Australia)
Copyright © 2021. 460 pages.
Cybersecurity has been gaining serious attention and recently has become an important topic of concern for organizations, government institutions, and largely for pe...
Enabling Blockchain Technology for Secure Networking and Communications
Adel Ben Mnaouer (Canadian University Dubai, UAE), Lamia Chaari Fourati (University of Sfax, Tunisia)
Copyright © 2021. 339 pages.
In recent years, the surge of blockchain technology has been rising due to is proven reliability in ensuring secure and effective transactions, even between untruste...
Multidisciplinary Approach to Modern Digital Steganography
Sabyasachi Pramanik (Haldia Institute of Technology, India), Mangesh Manikrao Ghonge (Sandip Foundation’s Institute of Technology and Research Centre, India), Renjith V. Ravi (MEA Engineering College, India), Korhan Cengiz (Trakya University, Turkey)
Copyright © 2021. 380 pages.
Steganography is the art of secret writing. The purpose of steganography is to hide the presence of a message from the intruder by using state-of-the-art methods, al...
Strategic Approaches to Digital Platform Security Assurance
Yuri Bobbert (ON2IT BV, The Netherlands & Antwerp Management School, University of Antwerp, Belgium), Maria Chtepen (BNP Paribas Group, Belgium), Tapan Kumar (Cognizant, The Netherlands), Yves Vanderbeken (DXC, Belgium), Dennis Verslegers (Orange Cyberdefense, Belgium)
Copyright © 2021. 394 pages.
Nowadays it is impossible to imagine a business without technology as most industries are becoming "smarter" and more tech-driven, ranging from small individual tech...
Privacy and Security Challenges in Location Aware Computing
P. Shanthi Saravanan (J.J. College of Engineering and Technology, Tiruchirappalli, India), S. R. Balasundaram (National Institute of Technology, Tiruchirappalli, India)
Copyright © 2021. 298 pages.
Location-aware computing is a technology that uses the location (provides granular geographical information) of people and objects to derive contextual information....
Revolutionary Applications of Blockchain-Enabled Privacy and Access Control
Surjit Singh (Thapar Institute of Engineering and Technology, India), Anca Delia Jurcut (University College Dublin, Ireland)
Copyright © 2021. 297 pages.
The security of an organizational information system with the invention of next-generation technologies is a prime focus these days. The industries and institutions...
Multidisciplinary Approaches to Ethics in the Digital Era
Meliha Nurdan Taskiran (Istanbul Medipol University, Turkey), Fatih Pinarbaşi (Istanbul Medipol University, Turkey)
Copyright © 2021. 369 pages.
The digital era has redefined our understanding of ethics as a multi-disciplinary phenomenon. The newness of the internet means it is still highly unregulated, which...
Handbook of Research on Digital Transformation and Challenges to Data Security and Privacy
Pedro Fernandes Anunciação (Polytechnic Institute of Setúbal, Portugal), Cláudio Roberto Magalhães Pessoa (Escola de Engenharia de Minas Gerais, Brazil), George Leal Jamil (Informações em Rede Consultoria e Treinamento, Brazil)
Copyright © 2021. 529 pages.
Heavily dominated by the sector of information and communication technologies, economic organizations pursue digital transformation as a differentiating factor and s...
Limitations and Future Applications of Quantum Cryptography
Neeraj Kumar (Babasaheb Bhimrao Ambedkar University, Lucknow, India), Alka Agrawal (Babasaheb Bhimrao Ambedkar University, Lucknow, India), Brijesh K. Chaurasia (Indian Institute of Information Technology, India), Raees Ahmad Khan (Indian Institute of Information Technology, India)
Copyright © 2021. 305 pages.
The concept of quantum computing is based on two fundamental principles of quantum mechanics: superposition and entanglement. Instead of using bits, qubits are used...
Advancements in Security and Privacy Initiatives for Multimedia Images
Ashwani Kumar (Vardhaman College of Engineering, India), Seelam Sai Satyanarayana Reddy (Vardhaman College of Engineering, India)
Copyright © 2021. 278 pages.
The use of digital images in today’s modernized market is rapidly increasing throughout organizations due to the prevalence of social media and digital content. Comp...
Blockchain Applications in IoT Security
Harshita Patel (Vellore Institute of Technology, India), Ghanshyam Singh Thakur (Maulana Azad National Institute of Technology, India)
Copyright © 2021. 275 pages.
Like many other scientific innovations, scientists are looking to protect the internet of things (IoT) from unfortunate losses, theft, or misuse. As one of the curre...
Real-Time and Retrospective Analyses of Cyber Security
David Anthony Bird (British Computer Society, UK)
Copyright © 2021. 267 pages.
Society is continually transforming into a digitally powered reality due to the increased dependence of computing technologies. The landscape of cyber threats is con...
Transdisciplinary Perspectives on Risk Management and Cyber Intelligence
Luisa Dall'Acqua (University of Bologna, Italy & LS TCO, Italy), Irene Maria Gironacci (Swinburne University of Technology, Australia)
Copyright © 2021. 273 pages.
The emergence of artificial intelligence has created a vast amount of advancements within various professional sectors and has transformed the way organizations cond...
Handbook of Research on Cyber Crime and Information Privacy
Maria Manuela Cruz-Cunha (Polytechnic Institute of Cávado and Ave, Portugal), Nuno Mateus-Coelho (Lusófona University, Portugal)
Copyright © 2021. 753 pages.
In recent years, industries have transitioned into the digital realm, as companies and organizations are adopting certain forms of technology to assist in informatio...
Large-Scale Data Streaming, Processing, and Blockchain Security
Hemraj Saini (Jaypee University of Information Technology, India), Geetanjali Rathee (Jaypee University of Information Technology, India), Dinesh Kumar Saini (Sohar University, Oman)
Copyright © 2021. 285 pages.
Data has cemented itself as a building block of daily life. However, surrounding oneself with great quantities of information heightens risks to one’s personal priva...
Privacy Concerns Surrounding Personal Information Sharing on Health and Fitness Mobile Apps
Devjani Sen (Algonquin College, Canada), Rukhsana Ahmed (University at Albany, SUNY, USA)
Copyright © 2021. 335 pages.
Health and fitness apps collect various personal information including name, email address, age, height, weight, and in some cases, detailed health information. When...
Establishing Cyber Security Programs Through the Community Cyber Security Maturity Model (CCSMM)
Gregory B. White (CIAS, The University of Texas at San Antonio, USA), Natalie Sjelin (CIAS, The University of Texas at San Antonio, USA)
Copyright © 2021. 221 pages.
As society continues to heavily rely on software and databases, the risks for cyberattacks have increased rapidly. As the dependence on computers has become graduall...
Sensor Network Methodologies for Smart Applications
Salahddine Krit (Ibn Zohr University, Morocco), Valentina Emilia Bălaș (Aurel Vlaicu University of Arad, Romania), Mohamed Elhoseny (University of Sharjah, UAE), Rachid Benlamri (Lakehead University, Canada), Marius M. Bălaș (Aurel Vlaicu University of Arad, Romania)
Copyright © 2020. 279 pages.
Technologies in today’s society are rapidly developing at a pace that is challenging to stay up to date with. As an increasing number of global regions are implement...
Social, Legal, and Ethical Implications of IoT, Cloud, and Edge Computing Technologies
Gianluca Cornetta (Universidad CEU San Pablo, Spain), Abdellah Touhafi (Vrije Universiteit Brussel, Belgium), Gabriel-Miro Muntean (Dublin City University, Ireland)
Copyright © 2020. 333 pages.
The adoption of cloud and IoT technologies in both the industrial and academic communities has enabled the discovery of numerous applications and ignited countless n...
Applied Approach to Privacy and Security for the Internet of Things
Parag Chatterjee (National Technological University, Argentina & University of the Republic, Uruguay), Emmanuel Benoist (Bern University of Applied Sciences, Switzerland), Asoke Nath (St. Xavier's College, Kolkata, India)
Copyright © 2020. 295 pages.
From transportation to healthcare, IoT has been heavily implemented into practically every professional industry, making these systems highly susceptible to security...
Legal Regulations, Implications, and Issues Surrounding Digital Data
Margaret Jackson (RMIT University, Australia), Marita Shelly (RMIT University, Australia)
Copyright © 2020. 240 pages.
Every year, there are advances in the way that we deal with information as individuals, governments, and organizations. We live and work predominantly online resulti...
Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks
K. Martin Sagayam (Karunya Institute of Technology and Sciences, India), Bharat Bhushan (HMR Institute of Technology and Management, New Delhi, India), A. Diana Andrushia (Karunya Institute of Technology and Sciences, India), Victor Hugo C. de Albuquerque (Department of Teleinformatics Engineering (DETI), Federal University of Ceará, Brazil)
Copyright © 2020. 405 pages.
Wireless sensor networks have gained significant attention industrially and academically due to their wide range of uses in various fields. Because of their vast amo...
Personal Data Protection and Legal Developments in the European Union
Maria Tzanou (Keele University, UK)
Copyright © 2020. 375 pages.
In the age of technological advancement, including the emergence of artificial intelligence, big data, and the internet of things, the need for privacy and protectio...
Cyber Security and Safety of Nuclear Power Plant Instrumentation and Control Systems
Michael A. Yastrebenetsky (State Scientific and Technical Centre for Nuclear and Radiation Safety, Ukraine), Vyacheslav S. Kharchenko (National Aerospace University KhAI, Ukraine)
Copyright © 2020. 501 pages.
Safety and security are crucial to the operations of nuclear power plants, but cyber threats to these facilities are increasing significantly. Instrumentation and co...
Internet Censorship and Regulation Systems in Democracies: Emerging Research and Opportunities
Nikolaos Koumartzis (Aristotle University of Thessaloniki, Greece), Andreas Veglis (Aristotle University of Thessaloniki, Greece)
Copyright © 2020. 272 pages.
As the internet has been regulated from its conception, many widespread beliefs regarding internet freedom are actually misconceptions. Additionally, there are alrea...
Safety and Security Issues in Technical Infrastructures
David Rehak (VSB – Technical University of Ostrava, Czech Republic), Ales Bernatik (VSB – Technical University of Ostrava, Czech Republic), Zdenek Dvorak (University of Zilina, Slovakia), Martin Hromada (Tomas Bata University in Zlin, Czech Republic)
Copyright © 2020. 499 pages.
In the modern age of urbanization, the mass population is becoming progressively reliant on technical infrastructures. These industrial buildings provide integral se...
Modern Theories and Practices for Cyber Ethics and Security Compliance
Winfred Yaokumah (University of Ghana, Ghana), Muttukrishnan Rajarajan (City University of London, UK), Jamal-Deen Abdulai (University of Ghana, Ghana), Isaac Wiafe (University of Ghana, Ghana), Ferdinand Apietu Katsriku (University of Ghana, Ghana)
Copyright © 2020. 302 pages.
In today’s globalized world, businesses and governments rely heavily on technology for storing and protecting essential information and data. Despite the benefits th...
Handbook of Research on Multimedia Cyber Security
Brij B. Gupta (National Institute of Technology, Kurukshetra, India), Deepak Gupta (LoginRadius Inc., Canada)
Copyright © 2020. 372 pages.
Because it makes the distribution and transmission of digital information much easier and more cost effective, multimedia has emerged as a top resource in the modern...
Cyber Security of Industrial Control Systems in the Future Internet Environment
Mirjana D. Stojanović (University of Belgrade, Serbia), Slavica V. Boštjančič Rakas (University of Belgrade, Serbia)
Copyright © 2020. 374 pages.
In today’s modernized market, many fields are utilizing internet technologies in their everyday methods of operation. The industrial sector is no different as these...
Handbook of Research on Intrusion Detection Systems
Brij B. Gupta (National Institute of Technology, Kurukshetra, India), Srivathsan Srinivasagopalan (AT&T, USA)
Copyright © 2020. 407 pages.
Businesses in today’s world are adopting technology-enabled operating models that aim to improve growth, revenue, and identify emerging markets. However, most of the...
Quantum Cryptography and the Future of Cyber Security
Nirbhay Kumar Chaubey (Gujarat Technological University, India), Bhavesh B. Prajapati (Education Department, Government of Gujarat, India)
Copyright © 2020. 343 pages.
The shortcomings of modern cryptography and its weaknesses against computers that are becoming more powerful necessitate serious consideration of more robust securit...
Impact of Digital Transformation on Security Policies and Standards
Sam Goundar (British University Vietnam, Vietnam), S. Bharath Bhushan (School of SCSE, VIT Bhopal University, India), Vaishali Ravindra Thakare (Atria Institute of Technology, India)
Copyright © 2020. 215 pages.
Digital transformation is a revolutionary technology that will play a vital role in major industries, including global governments. These administrations are taking...
Handbook of Research on Intelligent Data Processing and Information Security Systems
Stepan Mykolayovych Bilan (State University of Infrastructure and Technology, Ukraine), Saleem Issa Al-Zoubi (Irbid National University, Jordan)
Copyright © 2020. 434 pages.
Intelligent technologies have emerged as imperative tools in computer science and information security. However, advanced computing practices have preceded new metho...
Security and Privacy Issues in Sensor Networks and IoT
Priyanka Ahlawat (National Institute of Technology, Kurukshetra, India), Mayank Dave (National Institute of Technology, Kurukshetra, India)
Copyright © 2020. 323 pages.
As technology continues to expand and develop, the internet of things (IoT) is playing a progressive role in the infrastructure of electronics. The increasing amount...
Modern Principles, Practices, and Algorithms for Cloud Security
Brij B. Gupta (National Institute of Technology, Kurukshetra, India)
Copyright © 2020. 344 pages.
In today’s modern age of information, new technologies are quickly emerging and being deployed into the field of information technology. Cloud computing is a tool th...
Security, Privacy, and Forensics Issues in Big Data
Ramesh C. Joshi (Graphic Era University, Dehradun, India), Brij B. Gupta (National Institute of Technology, Kurukshetra, India)
Copyright © 2020. 456 pages.
With the proliferation of devices connected to the internet and connected to each other, the volume of data collected, stored, and processed is increasing every day,...
Handbook of Research on Machine and Deep Learning Applications for Cyber Security
Padmavathi Ganapathi (Avinashilingam Institute for Home Science and Higher Education for Women, India), D. Shanmugapriya (Avinashilingam Institute for Home Science and Higher Education for Women, India)
Copyright © 2020. 482 pages.
As the advancement of technology continues, cyber security continues to play a significant role in today’s world. With society becoming more dependent on the interne...
Advanced Digital Image Steganography Using LSB, PVD, and EMD: Emerging Research and Opportunities
Gandharba Swain (Koneru Lakshmaiah Education Foundation, India)
Copyright © 2019. 201 pages.
In the last few decades, the use of the Internet has grown tremendously, and the use of online communications has grown even more. The lack of security in private me...
Developments in Information Security and Cybernetic Wars
Muhammad Sarfraz (Kuwait University, Kuwait)
Copyright © 2019. 351 pages.
As internet technologies continue to advance, new types and methods of data and security breaches threaten national security. These potential breaches allow for info...
Cybersecurity Education for Awareness and Compliance
Ismini Vasileiou (University of Plymouth, UK), Steven Furnell (University of Plymouth, UK)
Copyright © 2019. 306 pages.
Understanding cybersecurity principles and practices is vital to all users of IT systems and services, and is particularly relevant in an organizational setting wher...
Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities
T. Gunasekhar (Koneru Lakshmaiah Education Foundation, India), K. Thirupathi Rao (Koneru Lakshmaiah Education Foundation, India), P. Sai Kiran (Koneru Lakshmaiah Education Foundation, India), V. Krishna Reddy (Koneru Lakshmaiah Education Foundation, India), B. Thirumala Rao (Koneru Lakshmaiah Education Foundation, India)
Copyright © 2019. 113 pages.
Businesses constantly face online hacking threats or security breaches in their online mainframe that expose sensitive information to the wrong audience. Companies l...
Network Security and Its Impact on Business Strategy
Ionica Oncioiu (European Academy of the Regions, Belgium)
Copyright © 2019. 289 pages.
Information and communication systems are an essential component of our society, forcing us to become dependent on these infrastructures. At the same time, these sys...
Exploring Security in Software Architecture and Design
Michael Felderer (University of Innsbruck, Austria), Riccardo Scandariato (Chalmers University of Technology, Sweden & University of Gothenburg, Sweden)
Copyright © 2019. 349 pages.
Cyber-attacks continue to rise as more individuals rely on storing personal information on networks. Even though these networks are continuously checked and secured,...
Cryptographic Security Solutions for the Internet of Things
Mohammad Tariq Banday (University of Kashmir, India)
Copyright © 2019. 367 pages.
The Internet of Things is a technological revolution that represents the future of computing and communications. Even though efforts have been made to standardize In...
Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics
Mehdi Khosrow-Pour, D.B.A. (Information Resources Management Association, USA)
Copyright © 2019. 417 pages.
Cyber-attacks are rapidly becoming one of the most prevalent issues globally, and as they continue to escalate, it is imperative to explore new approaches and techno...
Handbook of Research on Information and Cyber Security in the Fourth Industrial Revolution
Ziska Fields (University of Johannesburg, South Africa)
Copyright © 2018. 647 pages.
The prominence and growing dependency on information communication technologies in nearly every aspect of life has opened the door to threats in cyberspace. Criminal...
Security and Privacy in Smart Sensor Networks
Yassine Maleh (University Hassan I, Morocco), Abdellah Ezzati (University Hassan I, Morocco), Mustapha Belaissaoui (University Hassan I, Morocco)
Copyright © 2018. 441 pages.
Security and privacy protection within computer networks can be a challenge. By examining the current problems and challenges this domain is facing, more efficient s...
The Changing Scope of Technoethics in Contemporary Society
Rocci Luppicini (University of Ottawa, Canada)
Copyright © 2018. 403 pages.
In the modern era each new innovation poses its own special ethical dilemma. How can human society adapt to these new forms of expression, commerce, government, citi...
Handbook of Research on Information Security in Biomedical Signal Processing
Chittaranjan Pradhan (KIIT University, India), Himansu Das (KIIT University, India), Bighnaraj Naik (Veer Surendra Sai University of Technology (VSSUT), India), Nilanjan Dey (Department of Information Technology, Techno India College of Technology, Kolkata, India)
Copyright © 2018. 414 pages.
Recent advancements and innovations in medical image and data processing have led to a need for robust and secure mechanisms to transfer images and signals over the...
Cyber Harassment and Policy Reform in the Digital Age: Emerging Research and Opportunities
Ramona S. McNeal (University of Northern Iowa, USA), Susan M. Kunkle (Kent State University, USA), Mary Schmeida (Kent State University, USA)
Copyright © 2018. 170 pages.
As the digital world assumes an ever-increasing role in the daily life of the public, opportunities to engage in crimes increase as well. The consequences of cyber a...
Handbook of Research on Network Forensics and Analysis Techniques
Gulshan Shrivastava (National Institute of Technology Patna, India), Prabhat Kumar (National Institute of Technology Patna, India), B. B. Gupta (National Institute of Technology Kurukshetra, India), Suman Bala (Orange Labs, France), Nilanjan Dey (Department of Information Technology, Techno India College of Technology, Kolkata, India)
Copyright © 2018. 509 pages.
With the rapid advancement in technology, myriad new threats have emerged in online environments. The broad spectrum of these digital risks requires new and innovati...
Security and Privacy Management, Techniques, and Protocols
Yassine Maleh (University Hassan I, Morocco)
Copyright © 2018. 426 pages.
The security of information and communication technology is a high priority for any organization. By examining the current problems and challenges this domain is fac...
Multidisciplinary Perspectives on Human Capital and Information Technology Professionals
Vandana Ahuja (Jaypee Institute of Information Technology, India), Shubhangini Rathore (IBS Gurgaon, India)
Copyright © 2018. 400 pages.
In this technological age, the information technology (IT) industry is an important facet of society and business. The IT industry is able to become more efficient a...
Security, Privacy, and Anonymization in Social Networks: Emerging Research and Opportunities
B. K. Tripathy (VIT University, India), Kiran Baktha (VIT University, India)
Copyright © 2018. 176 pages.
Technology has become profoundly integrated into modern society; however, this increases the risk of vulnerabilities, such as hacking and other system errors, along...
Critical Research on Scalability and Security Issues in Virtual Cloud Environments
Shadi Aljawarneh (Jordan University of Science and Technology, Jordan), Manisha Malhotra (Chandigarh University, India)
Copyright © 2018. 341 pages.
Individual users and business organizations are shifting their data storage and utilizing cloud computing because of its easy availability and reduced costs. Althoug...
The Morality of Weapons Design and Development: Emerging Research and Opportunities
John Forge (University of Sydney, Australia)
Copyright © 2018. 216 pages.
Countries around the globe are continuously investing money into weapon development and manufacturing. While weapon design has been a relevant topic, from the Middle...
Algorithmic Strategies for Solving Complex Problems in Cryptography
Kannan Balasubramanian (Mepco Schlenk Engineering College, India), M. Rajakani (Mepco Schlenk Engineering College, India)
Copyright © 2018. 302 pages.
Cryptography is a field that is constantly advancing, due to exponential growth in new technologies within the past few decades. Applying strategic algorithms to cry...
Information Technology Risk Management and Compliance in Modern Organizations
Manish Gupta (State University of New York, Buffalo, USA), Raj Sharman (State University of New York, Buffalo, USA), John Walp (M&T Bank Corporation, USA), Pavankumar Mulgund (State University of New York, Buffalo, USA)
Copyright © 2018. 360 pages.
This title is an IGI Global Core Reference for 2019 as it is one of the best-selling reference books within the Computer Science and IT subject area since 2017, prov...
Detecting and Mitigating Robotic Cyber Security Risks
Raghavendra Kumar (LNCT Group of College, India), Prasant Kumar Pattnaik (KIIT University (Deemed), India), Priyanka Pandey (LNCT Group of College, India)
Copyright © 2017. 384 pages.
Risk detection and cyber security play a vital role in the use and success of contemporary computing. By utilizing the latest technological advances, more effective...
Advanced Image-Based Spam Detection and Filtering Techniques
Sunita Vikrant Dhavale (Defense Institute of Advanced Technology (DIAT), Pune, India)
Copyright © 2017. 213 pages.
Security technologies have advanced at an accelerated pace in the past few decades. These advancements in cyber security have benefitted many organizations and compa...
Privacy and Security Policies in Big Data
Sharvari Tamane (MGM’s Jawaharlal Nehru Engineering College, India), Vijender Kumar Solanki (Institute of Technology and Science Ghaziabad, India), Nilanjan Dey (Department of Information Technology, Techno India College of Technology, Kolkata, India)
Copyright © 2017. 305 pages.
In recent years, technological advances have led to significant developments within a variety of business applications. In particular, data-driven research provides...
Securing Government Information and Data in Developing Countries
Saleem Zoughbi (UN APCICT, UN ESCAP, South Korea)
Copyright © 2017. 307 pages.
The ongoing growth of information and communication technology is a high priority for any developing country. These advances help progress with different sectors of...
Security Breaches and Threat Prevention in the Internet of Things
N. Jeyanthi (VIT University, India), R. Thandeeswaran (VIT University, India)
Copyright © 2017. 276 pages.
As the applications of the Internet of Things continue to progress, so do the security concerns for this technology. The study of threat prevention in the Internet o...
Decentralized Computing Using Blockchain Technologies and Smart Contracts: Emerging Research and Opportunities
S. Asharaf (Indian Institute of Information Technology and Management, Kerala, India), S. Adarsh (Indian Institute of Information Technology and Management, Kerala, India)
Copyright © 2017. 128 pages.
Recent innovations have created significant developments in data storage and management. These new technologies now allow for greater security in databases and other...
Cybersecurity Breaches and Issues Surrounding Online Threat Protection
Michelle Moore (George Mason University, USA)
Copyright © 2017. 408 pages.
Technology has become deeply integrated into modern society and various activities throughout everyday life. However, this increases the risk of vulnerabilities, suc...
Security Solutions and Applied Cryptography in Smart Grid Communications
Mohamed Amine Ferrag (Guelma University, Algeria), Ahmed Ahmim (University of Larbi Tebessi, Algeria)
Copyright © 2017. 464 pages.
Electrical energy usage is increasing every year due to population growth and new forms of consumption. As such, it is increasingly imperative to research methods of...
Threat Mitigation and Detection of Cyber Warfare and Terrorism Activities
Maximiliano E. Korstanje (University of Palermo, Argentina)
Copyright © 2017. 315 pages.
Technology provides numerous opportunities for positive developments in modern society; however, these venues inevitably increase vulnerability to threats in online...
Online Banking Security Measures and Data Protection
Shadi A. Aljawarneh (Jordan University of Science and Technology, Jordan)
Copyright © 2017. 312 pages.
Technological innovations in the banking sector have provided numerous benefits to customers and banks alike; however, the use of e-banking increases vulnerability t...
Developing Next-Generation Countermeasures for Homeland Security Threat Prevention
Maurice Dawson (Illinois Institute of Technology, USA), Dakshina Ranjan Kisku (National Institute of Technology, India), Phalguni Gupta (National Institute of Technical Teachers' Training & Research, India), Jamuna Kanta Sing (Jadavpur University, India), Weifeng Li (Tsinghua University, China)
Copyright © 2017. 428 pages.
In the modern world, natural disasters are becoming more commonplace, unmanned systems are becoming the norm, and terrorism and espionage are increasingly taking pla...
Security Solutions for Hyperconnectivity and the Internet of Things
Maurice Dawson (Illinois Institute of Technology, USA), Mohamed Eltayeb (Colorado Technical University, USA), Marwan Omar (Saint Leo University, USA)
Copyright © 2017. 347 pages.
The Internet of Things describes a world in which smart technologies enable objects with a network to communicate with each other and interface with humans effortles...
Managing Security Issues and the Hidden Dangers of Wearable Technologies
Andrew Marrington (Zayed University, UAE), Don Kerr (University of the Sunshine Coast, Australia), John Gammack (Zayed University, UAE)
Copyright © 2017. 345 pages.
Advances in mobile computing have provided numerous innovations that make people’s daily lives easier and more convenient. However, as technology becomes more ubiqui...
Security Management in Mobile Cloud Computing
Kashif Munir (University of Hafr Al-Batin, Saudi Arabia)
Copyright © 2017. 248 pages.
Mobile Cloud Computing (MCC) has experienced explosive growth and is expected to continue to rise in popularity as new services and applications become available. As...
Cryptographic Solutions for Secure Online Banking and Commerce
Kannan Balasubramanian (Mepco Schlenk Engineering College, India), K. Mala (Mepco Schlenk Engineering College, India), M. Rajakani (Mepco Schlenk Engineering College, India)
Copyright © 2016. 375 pages.
Technological advancements have led to many beneficial developments in the electronic world, especially in relation to online commerce. Unfortunately, these advancem...
Innovative Solutions for Access Control Management
Ahmad Kamran Malik (COMSATS Institute of Information Technology, Pakistan), Adeel Anjum (COMSATS Institute of Information Technology, Pakistan), Basit Raza (COMSATS Institute of Information Technology, Pakistan)
Copyright © 2016. 330 pages.
Technological innovation and evolution continues to improve personal and professional lifestyles, as well as general organizational and business practices; however,...
Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security
Brij Gupta (Asia University, Taichung City, Taiwan), Dharma P. Agrawal (University of Cincinnati, USA), Shingo Yamaguchi (Yamaguchi University, Japan)
Copyright © 2016. 589 pages.
Internet usage has become a facet of everyday life, especially as more technological advances have made it easier to connect to the web from virtually anywhere in th...
Network Security Attacks and Countermeasures
Dileep Kumar G. (Adama Science and Technology University, Ethiopia), Manoj Kumar Singh (Adama Science and Technology University, Ethiopia), M.K. Jayanthi (King Khalid University, Saudi Arabia)
Copyright © 2016. 357 pages.
Our world is increasingly driven by sophisticated networks of advanced computing technology, and the basic operation of everyday society is becoming increasingly vul...
Next Generation Wireless Network Security and Privacy
Kamaljit I. Lakhtaria (Gujarat University, India)
Copyright © 2015. 372 pages.
As information resources migrate to the Cloud and to local and global networks, protecting sensitive data becomes ever more important. In the modern, globally-interc...
Improving Information Security Practices through Computational Intelligence
Wasan Awad (Ahlia University, Bahrain), El Sayed M. El-Alfy (King Fahd University of Petroleum and Minerals, Saudi Arabia), Yousif Al-Bastaki (University of Bahrain, Bahrain)
Copyright © 2016. 327 pages.
The recent explosion in complex global networking architectures has spurred a concomitant rise in the need for robust information security. Further, as computing pow...
Handbook of Research on Security Considerations in Cloud Computing
Kashif Munir (King Fahd University of Petroleum & Minerals, Saudi Arabia), Mubarak S. Al-Mutairi (King Fahd University of Petroleum & Minerals, Saudi Arabia), Lawan A. Mohammed (King Fahd University of Petroleum & Minerals, Saudi Arabia)
Copyright © 2015. 408 pages.
Cloud computing has quickly become the next big step in security development for companies and institutions all over the world. With the technology changing so rapid...
Handbook of Research on Emerging Developments in Data Privacy
Manish Gupta (State University of New York at Buffalo, USA)
Copyright © 2015. 507 pages.
Data collection allows today’s businesses to cater to each customer’s individual needs and provides a necessary edge in a competitive market. However, any breach in...
Handbook of Research on Securing Cloud-Based Databases with Biometric Applications
Ganesh Chandra Deka (Ministry of Labour and Employment, India), Sambit Bakshi (National Institute of Technology Rourkela, India)
Copyright © 2015. 530 pages.
Cloud technologies have revolutionized the way we store information and perform various computing tasks. With the rise of this new technology, the ability to secure...
Handbook of Research on Threat Detection and Countermeasures in Network Security
Alaa Hussein Al-Hamami (Amman Arab University, Jordan), Ghossoon M. Waleed al-Saadoon (Applied Sciences University, Bahrain)
Copyright © 2015. 426 pages.
Cyber attacks are rapidly becoming one of the most prevalent issues in the world. As cyber crime continues to escalate, it is imperative to explore new approaches an...
Information Security in Diverse Computing Environments
Anne Kayem (Department of Computer Science, University of Cape Town, South Africa), Christoph Meinel (Hasso-Plattner-Institute for IT Systems Engineering, University of Potsdam, Potsdam, Germany)
Copyright © 2014. 354 pages.
Information security systems have become more popular due to the prevalence of criminal activity over benign attacks. Because computer systems are constantly changin...
Network Topology in Command and Control: Organization, Operation, and Evolution
T. J. Grant (R-BAR, The Netherlands), R. H. P. Janssen (Netherlands Defence Academy, The Netherlands), H. Monsuur (Netherlands Defence Academy, The Netherlands)
Copyright © 2014. 320 pages.
Over the past decade, the Command and Control (C2) field has been making a transformation from top-down, directive command to Network Centric Operations (NCO), peer-...
Cases on Research and Knowledge Discovery: Homeland Security Centers of Excellence
Cecelia Wright Brown (University of Baltimore, USA), Kevin A. Peters (Morgan State University, USA), Kofi Adofo Nyarko (Morgan State University, USA)
Copyright © 2014. 357 pages.
To ensure its protection from enemies both foreign and domestic, a government must invest resources and personnel toward the goal of homeland security. It is through...
Multidisciplinary Perspectives in Cryptology and Information Security
Sattar B. Sadkhan Al Maliky (University of Babylon, Iraq), Nidaa A. Abbas (University of Babylon, Iraq)
Copyright © 2014. 443 pages.
With the prevalence of digital information, IT professionals have encountered new challenges regarding data security. In an effort to address these challenges and of...
Analyzing Security, Trust, and Crime in the Digital World
Hamid R. Nemati (The University of North Carolina at Greensboro, USA)
Copyright © 2014. 281 pages.
In the digital era, information is the most valuable resource, and protecting one’s assets is a constant struggle for both individuals and organizations. Analyzing S...
Research Developments in Biometrics and Video Processing Techniques
Rajeev Srivastava (Indian Institute of Technology (BHU), India), S.K. Singh (Indian Institute of Technology (BHU), India), K.K. Shukla (Indian Institute of Technology (BHU), India)
Copyright © 2014. 279 pages.
The advancement of security technologies has allowed information systems to store more crucial and sensitive data. With these advancements, organizations turn to phy...
Advances in Secure Computing, Internet Services, and Applications
B.K. Tripathy (VIT University, India), D. P. Acharjya (VIT University, India)
Copyright © 2014. 405 pages.
Technological advancements have extracted a vast amount of useful knowledge and information for applications and services. These developments have evoked intelligent...
Trust Management in Mobile Environments: Autonomic and Usable Models
Zheng Yan (Xidian University, China and Aalto University, Finland)
Copyright © 2014. 288 pages.
In a digital context, trust is a multifaceted concept, including trust in application usability, trust in information security, and trust in fellow users. Mobile tec...
Network Security Technologies: Design and Applications
Abdelmalek Amine (Tahar Moulay University, Algeria), Otmane Ait Mohamed (Concordia University, USA), Boualem Benatallah (University of New South Wales, Australia)
Copyright © 2014. 330 pages.
Recent advances in technologies have created a need for solving security problems in a systematic way. With this in mind, network security technologies have been pro...
Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications
Danda B. Rawat (Georgia Southern University, USA), Bhed B. Bista (Iwate Prefectural University, Japan), Gongjun Yan (University of Southern Indiana, USA)
Copyright © 2014. 577 pages.
While security is of vital importance to ensure the integrity of communications in wireless and mobile networks, most businesses which rely on these networks expect...
Architectures and Protocols for Secure Information Technology Infrastructures
Antonio Ruiz-Martinez (University of Murcia, Spain), Rafael Marin-Lopez (University of Murcia, Spain), Fernando Pereniguez-Garcia (University of Murcia, Spain)
Copyright © 2014. 427 pages.
With the constant stream of emails, social networks, and online bank accounts, technology has become a pervasive part of our everyday lives, making the security of t...
Theory and Practice of Cryptography Solutions for Secure Information Systems
Atilla Elçi (Hasan Kalyoncu University, Turkey), Josef Pieprzyk (Macquarie University, Australia), Alexander G. Chefranov (Eastern Mediterranean University, North Cyprus), Mehmet A. Orgun (Macquarie University, Australia), Huaxiong Wang (Nanyang Technological University, Singapore), Rajan Shankaran (Macquarie University, Australia)
Copyright © 2013. 351 pages.
Information Systems (IS) are a nearly omnipresent aspect of the modern world, playing crucial roles in the fields of science and engineering, business and law, art a...
IT Security Governance Innovations: Theory and Research
Daniel Mellado (Spanish Tax Agency, Spain), Luis Enrique Sánchez (University of Castilla-La Mancha, Spain), Eduardo Fernández-Medina (University of Castilla – La Mancha, Spain), Mario G. Piattini (University of Castilla - La Mancha, Spain)
Copyright © 2013. 373 pages.
Information technology in the workplace is vital to the management of workflow in the company; therefore, IT security is no longer considered a technical issue but a...
Threats, Countermeasures, and Advances in Applied Information Security
Manish Gupta (State University of New York at Buffalo, USA), John Walp (M&T Bank Corporation, USA), Raj Sharman (State University of New York, USA)
Copyright © 2012. 319 pages.
Organizations are increasingly relying on electronic information to conduct business, which has caused the amount of personal information to grow exponentially. Thre...
Investigating Cyber Law and Cyber Ethics: Issues, Impacts and Practices
Alfreda Dudley (Towson University, USA), James Braman (Towson University, USA), Giovanni Vincenti (Towson University, USA)
Copyright © 2012. 343 pages.
Ethical values in computing are essential for understanding and maintaining the relationship between computing professionals and researchers and the users of their a...
Information Assurance and Security Ethics in Complex Systems: Interdisciplinary Perspectives
Melissa Jane Dark (Purdue University, USA)
Copyright © 2011. 306 pages.
The problems encountered in ensuring that modern computing systems are used appropriately cannot be solved with technology alone, nor can they be addressed independe...
Chaos Synchronization and Cryptography for Secure Communications: Applications for Encryption
Santo Banerjee (Politecnico di Torino, Italy)
Copyright © 2011. 596 pages.
Over the past few decades, there has been numerous research studies conducted involving the synchronization of dynamical systems with several theoretical studies and...
Technoethics and the Evolving Knowledge Society: Ethical Issues in Technological Design, Research, Development, and Innovation
Rocci Luppicini (University of Ottawa, Canada)
Copyright © 2010. 323 pages.
Recently, there has been a major push to rediscover the ethical dimension of technology across the sciences, social sciences, and humanities. Technoethics and the Ev...
Collaborative Computer Security and Trust Management
Jean-Marc Seigneur (Université de Genève, Switzerland), Adam Slagell (National Center for Supercomputing Applications, USA)
Copyright © 2010. 317 pages.
As the Internet grows and connects the world in new ways, computer security must become global and collaborative to understand and react to harmful security threats....

Editor(s) Biography

Manish Gupta is Manager of Information Risk Assurance at BlueCross BlueShield of Western New York and Adjunct Assistant Professor at State University of New York at Buffalo. He has more than 15 years of leadership experience in cybersecurity and IT risk management. Prior to his current role, he was VP of cybersercurity at one of the 15 largest banks in the US. Over the years, he has established, led and governed programs for corporate security awareness, threat and vulnerability management, regulatory and compliance, risk management and governance, security architecture and cybersecurity capabilities. He has authored or coauthored more than 70 research articles that are published in journals, books and conference proceedings. His research has won best paper awards and has been published in MISQ, DSS, ACM Transactions, JOEUC amongst others. He has edited or co-edited 7 books in the area of information assurance, cybersecurity and risk management. He holds several professional designations including CISSP, CISM, CISA, CRISC, CFE and PMP. He teaches graduate level courses in IT Auditing and IT Risk Management at SUNY Buffalo. He received PhD (Management/MIS) and MBA from State University of New York at Buffalo in 2011 and 2003, respectively and a bachelors degree in Mechanical Engineering from IET Lucknow, India in 1998.

Editorial Advisory Board

Editor-in-Chief
Manish Gupta, State University of New York, United States

Editorial Advisory Board
Dan J. Kim, University of North Texas, United States
Insu Park, Dakota State University, United States
Jay Shan, University of Cincinnati, United States
Jingguo Wang, The University of Texas at Arlington, United States
John Walp, DIGITS LLC, United States
Joshua Brunner, BlueCross BlueShield of WNY, United States
Kichan Nam, American University of Sharjah, United Arab Emirates
Manish Agrawal, University of South Florida, United States
Navpreet Jatana, HealthNow New York Inc., United States
Rohit Valecha, University of Texas, San Antonio, United States
Rui Chen, Ball State University, United States
Shambhu Upadhyaya, State University of New York at Buffalo, United States
Srikanth Parmeswaran, State University of New York at Buffalo, United States
Sumita Mishra, Rochester Institute of Technology, United States
Yuan Li, University of Illinois at Springfield, United States