Cyber Crime: Concepts, Methodologies, Tools and Applications, Volume 1

  • 16h 17m
  • Information Resources Management Association (IRMA)
  • IGI Global
  • 2012

Threatening the safety of individuals, computers, and entire networks, cyber crime attacks vary in severity and type. Studying this continually evolving discipline involves not only understanding different types of attacks, which range from identity theft to cyberwarfare, but also identifying methods for their prevention.

Cyber Crime: Concepts, Methodologies, Tools and Applications is a three-volume reference that explores all aspects of computer-based crime and threats, offering solutions and best practices from experts in software development, information security, and law. As cyber crime continues to change and new types of threats emerge, research focuses on developing a critical understanding of different types of attacks and how they can best be managed and eliminated.

In this Book

  • Internet Crime: How Vulnerable are You? Do Gender, Social Influence and Education Play a Role in Vulnerability?
  • Introduction to Basic Concepts and Considerations of Wireless Networking Security
  • Cyber Identity Theft
  • Identity Theft Through the Web
  • How Safe is Your Identity? Security Threats, Data Mining, and Digital Fingerprints/Footprints
  • Antecedents of Online Privacy Protection Behavior: Towards an Integrative Model
  • Protection of Privacy on the Web
  • Online Privacy, Vulnerabilities, and Threats: A Manager's Perspective
  • Intrusion in the Sphere of Personal Communications
  • Data Mining and Privacy
  • Data Mining and Privacy Protection
  • Deciphering the Hacker Underground: First Quantitative Insights
  • Globalization and Data Privacy: An Exploratory Study
  • A Simulation Model of IS Security
  • Security, Trust, and Privacy on Mobile Devices and Multimedia Applications
  • A Multistage Framework to Defend Against Phishing Attacks
  • A Framework for Privacy Assurance and Ubiquitous Knowledge Discovery in Health 2.0 Data Mashups
  • A Policy-Based Security Framework for Privacy-Enhancing Data Access and Usage Control in Grids
  • Surveillance in Public Spaces as a Means of Protecting Security: Questions of Legitimacy and Policy
  • An SOA-Based Architecture to Share Medical Data with Privacy Preservation
  • A Partial Optimization Approach for Privacy Preserving Frequent Itemset Mining
  • A Methodology for UICC-Based Security Services in Pervasive Fixed Mobile Convergence Systems
  • An Analysis of Privacy and Security in the Zachman and Federal Enterprise Architecture Frameworks
  • A Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments
  • Distributed Privacy Preserving Clustering via Homomorphic Secret Sharing and Its Application to (Vertically) Partitioned Spatio-Temporal Data
  • Current Network Security Technology
  • Data Breach Disclosure: A Policy Analysis
  • Computer Hacking and the Techniques of Neutralization: An Empirical Assessment
  • Biometric Security in the E-World
  • Biometric Controls and Privacy
  • Dynamic Control Mechanisms for User Privacy Enhancement
  • Privacy Regulation in the Metaverse
  • Efficient and Reliable Pseudonymous Authentication
  • Image Watermarking
  • Memorizing Algorithm: Protecting User Privacy using Historical Information of Location-Based Services