Cover image for Global perspectives in information security : legal, social, and international issues
Title:
Global perspectives in information security : legal, social, and international issues
Publication Information:
New Jersey, NJ : Wiley, 2008
Physical Description:
xviii, 878 p. : ill. ; 24 cm.
ISBN:
9780470372111
Added Author:

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010191557 KF390.5.C6 G54 2009 Open Access Book Book
Searching...
Searching...
30000010196498 KF390.5.C6 G54 2009 Open Access Book Book
Searching...

On Order

Summary

Summary

Global Perspectives in Information Security, compiled by renowned expert and professor Hossein Bidgoli, offers an expansive view of current issues in information security. Written by leading academics and practitioners from around the world, this thorough resource explores and examines a wide range of issues and perspectives in this rapidly expanding field. Perfect for students, researchers, and practitioners alike, Professor Bidgoli's book offers definitive coverage of established and cutting-edge theory and application in information security.


Author Notes

Hossein Bidgoli , PhD, is professor of management information systems at California State University. Dr. Bidgoli helped set up the first PC lab in the United States and served as its first director. He is the author of 43 textbooks, 27 manuals, and more than five dozen technical articles and papers on various aspects of computer applications, information systems and network security, e-commerce, and decision support systems published and presented throughout the world. Dr. Bidgoli also serves as the editor-in-chief of The Internet Encyclopedia, The Handbook of Information Security, The Handbook of Computer Networks, and the Encyclopedia of Information Systems . The Encyclopedia of Information Systems was the recipient of one of Library Journal's Best Reference Sources for 2002, and The Internet Encyclopedia was the recipient of one of the PSP Awards (Professional and Scholarly Publishing), 2004, awarded by the Association of American Publishers. Dr. Bidgoli was selected as the 2001-2002 Professor of the Year at California State University, Bakersfield.


Table of Contents

Dennis M. PowersKenneth Einar HimmaSusan W. BrennerCharles JaegerMathieu Deflem and J. Eagle ShuttWilliam A. ZuckerCharles JaegerPaul A. Taylor and Jan Ll. HarrisG.E. EvansJ. Philip Craiger and Jeff SwaugerRay Everett-ChurchRichard A. SpinelloJonathan WallaceDrummond Reed and Jerry KindallJaime J. DavilaNormand M. MartelWilliam C. BarkerKarin GeiselhartJulia Alpert GladstoneRoderic BroadhurstPhil VenablesRandall K. NicholsNancy J. KingHossein Bidgoli
Prefacep. xv
Part 1 Legal Issues and Considerationsp. 1
Chapter 1 Cyberlaw: The Major Areas, Development, and Information Security Aspectsp. 3
Chapter 2 Legal, Social, and Ethical Issues of the Internetp. 53
Chapter 3 Cybercrime and the U.S. Criminal Justice Systemp. 95
Chapter 4 Cyberterrorism and Information Securityp. 127
Chapter 5 Law Enforcement and Computer Security Threats and Measuresp. 181
Chapter 6 Corporate Spying: The Legal Aspectsp. 205
Chapter 7 Spam and the Legal Counterattacksp. 243
Chapter 8 Hacktivismp. 295
Chapter 9 Online Contractsp. 319
Chapter 10 Law Enforcement and Digital Evidencep. 357
Part 2 Social Issues and Considerationsp. 405
Chapter 11 Privacy Law and the Internetp. 407
Chapter 12 Internet Censorshipp. 437
Chapter 13 Anonymity and Identity on the Internetp. 457
Chapter 14 Digital Identityp. 481
Chapter 15 Digital Dividep. 513
Chapter 16 Medical Records Securityp. 535
Part 3 International Issues and Policy Considerationsp. 561
Chapter 17 E-Government Security Issues and Measuresp. 563
Chapter 18 International Security Issues of E-Governmentp. 591
Chapter 19 Global Aspects of Cyberlawp. 627
Chapter 20 Combating the Cybercrime Threat: Developments in Global Law Enforcementp. 667
Chapter 21 Information Leakage: Detection and Countermeasuresp. 695
Chapter 22 Wireless Information Warfarep. 723
Chapter 23 E-Mail and Internet Use Policiesp. 789
Chapter 24 Guidelines for a Comprehensive Security Systemp. 831
Indexp. 851