Information Security and Ethics: Concepts, Methodologies, Tools and Applications

Ethical dilemmas and security challenges have emerged rapidly alongside the accelerated evolution of information processing and management technologies. As technology continues to advance, the need for strong responses to these challenges, well centered on reliable research, becomes increasingly critical. Information Security and Ethics: Concepts, Methodologies, Tools, and Applications serves as the ultimate source on all theories and models associated with information privacy and safeguard practices to help anchor and guide the development of technologies, standards, and best practices to meet these challenges. Compiling over 300 chapters representing the work of some 750 international experts, this comprehensive, six-volume collection examines a complete array of topics in this area, including authentication technologies, cyber-crime, cryptographic tools, monitoring systems, forensic computing, and confidentiality applications, and their relation to raising the level of security and ethical standards in technology-driven environments. Essential to the information science and technology collection of any library, this reference set will serve the needs of researchers in a variety of related fields, including business, e-commerce, government, law enforcement, and many more.

[1]  Emmanuel Lévinas,et al.  Le temps et l'autre , 1983 .

[2]  Dan Schiller,et al.  Digital Capitalism: Networking the Global Market System , 1999 .

[3]  John Martin Fischer,et al.  Recent Work on Moral Responsibility* , 1999, Ethics.

[4]  Lucas D. Introna Privacy and the computer: why we need privacy in the information society , 1997 .

[5]  John D. Howard,et al.  An analysis of security incidents on the Internet 1989-1995 , 1998 .

[6]  Janusz R. Getta,et al.  Hybrid Concurrency Control in Multilevel Secure Database Systems , 2003, Applied Informatics.

[7]  Bryan W. Husted,et al.  Is it ethical to use ethics as strategy , 2000 .

[8]  A. Goldman Why Citizens Should Vote: A Causal Responsibility Approach , 1999 .

[9]  Patricia H. Werhane,et al.  Persons, rights, and corporations , 1985 .

[10]  H. Kreikebaum,et al.  Grundlagen der Unternehmensethik , 1996 .

[11]  Pekka Nikander,et al.  Users and Trust in Cyberspace (Transcript of Discussion) , 2000, Security Protocols Workshop.

[12]  Richard J. Severson,et al.  The Principles of Information Ethics , 1997 .

[13]  M. Healy,et al.  The impact of information and communications technology on managerial practices: the use of codes of conduct , 2003 .

[14]  Benjamin Kuipers,et al.  Computer power and human reason , 1976, SGAR.

[15]  Bernd Carsten Stahl Das kollektive Subjekt der Verantwortung , 2000 .

[16]  Simon Rogerson Ethical Aspects of Information Technology: Issues for Senior Executives , 1998 .

[17]  J. Rutter From the Sociology of Trust Towards a Sociology of 'E-trust , 2001 .

[18]  Sirkka L. Jarvenpaa,et al.  The Use of Information Technology to Enhance Management School Education: A Theoretical View , 1995, MIS Q..

[19]  Bernd Carsten Stahl,et al.  Responsible Management of Information Systems , 2003 .

[20]  Hans Lenk,et al.  Verantwortung und soziale Fallen , 1990 .

[21]  Edward Skoudis Counter Hack: A Step-by-Step Guide to Computer Attacks and Effective Defenses , 2001 .

[22]  M. Ronald Buckley,et al.  The Hypothesized Relationship Between Accountability and Ethical Behavior , 2001 .

[23]  H. Jonas Das Prinzip Verantwortung , 1979 .

[24]  Sushil Jajodia,et al.  Alternative correctness criteria for concurrent execution of transactions in multilevel secure databases , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.

[25]  James H. Moor,et al.  Towards a theory of privacy in the information age , 1997, CSOC.

[26]  William Perrizo Request order linked list (ROLL): a concurrency control object for centralized and distributed database systems , 1991, [1991] Proceedings. Seventh International Conference on Data Engineering.

[27]  Aikaterini Mitrokotsa,et al.  DDoS attacks and defense mechanisms: classification and state-of-the-art , 2004, Comput. Networks.

[28]  Thomas W. Dunfee,et al.  How Binding the Ties? Business Ethics as Integrative Social ContractsTies That Bind: A Social Contracts Approach to Business Ethics , 1999 .

[29]  William Bechtel,et al.  ATTRIBUTING RESPONSIBILITY TO COMPUTER SYSTEMS , 1985 .

[30]  Immanuel Kant,et al.  Kritik der praktischen Vernunft ; Grundlegung zur Metaphysik der Sitten , 1974 .

[31]  Mary J. Culnan,et al.  "How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use , 1993, MIS Q..

[32]  Duncan Langford Business Computer Ethics , 1999 .

[33]  Dorothy E. Denning,et al.  Cryptography and Data Security , 1982 .

[34]  Paul Ricoeur Soi même comme un autre , 1990 .

[35]  Adam Rifkin,et al.  Trust Management on the World Wide Web , 1998, Comput. Networks.

[36]  D. Elliott Bell,et al.  Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .

[37]  Peter Reiher,et al.  A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.

[38]  H. L. A. Hart,et al.  Punishment and Responsibility: Essays in the Philosophy of Law , 1968 .

[39]  Herman T. Tavani,et al.  Privacy protection, control of information, and privacy-enhancing technologies , 2001, CSOC.

[40]  Jayant R. Haritsa,et al.  Secure transaction processing in firm real-time database systems , 1997, SIGMOD '97.

[41]  Robert Boncella Internet Privacy: At Home and At Work , 2001, Commun. Assoc. Inf. Syst..

[42]  Andrew B. Whinston,et al.  Defeating distributed denial of service attacks , 2000 .

[43]  John E. R. Staddon,et al.  On Responsibility in Science and Law , 1999, Social Philosophy and Policy.

[44]  Donald Gotterbarn,et al.  Using the new ACM code of ethics in decision making , 1993, CACM.

[45]  L. Jean Camp Web Security and Privacy: An American Perspective , 1999, Inf. Soc..

[46]  Bev Littlewood,et al.  THE RISKS OF SOFTWARE , 1992 .

[47]  Bernd Carsten Stahl,et al.  Ethical issues in e-teaching-A theoretical framework , 2002 .

[48]  Sven Dietrich,et al.  Analyzing Distributed Denial of Service Tools: The Shaft Case , 2000, LISA.

[49]  Paul J Criscuolo,et al.  Distributed Denial of Service: Trin00, Tribe Flood Network, Tribe Flood Network 2000, and Stacheldraht CIAC-2319 , 2000 .

[50]  Jaideep Srivastava,et al.  Multilevel secure database concurrency control , 1990, [1990] Proceedings. Sixth International Conference on Data Engineering.

[51]  M. Velasquez Business Ethics: Concepts and Cases , 1982 .

[52]  John Weckert,et al.  Computer and Information Ethics , 1997 .

[53]  Kurt Bayertz,et al.  Verantwortung : Prinzip oder Problem? , 1995 .

[54]  Laura P. Hartman,et al.  Technology and Ethics: Privacy in the Workplace , 2001 .

[55]  Irma van der Ploeg Written on the body: biometrics and identity , 1999, CSOC.

[56]  Marc Neuberg La responsabilité : questions philosophiques , 1997 .

[57]  Janice C. Sipior,et al.  The ethical and legal quandary of email privacy , 1995, CACM.

[58]  M. Castells,et al.  The Hacker Ethic and the Spirit of the Information Age , 2001 .

[59]  Norman E. Bowie,et al.  Book Review , 2001, Business Ethics Quarterly.

[60]  Detmar W. Straub,et al.  Key information liability issues facing managers: software piracy, proprietary databases, and indi , 1990 .

[61]  Ruby B. Lee,et al.  Remote Denial of Service Attacks and Countermeasures , 2001 .

[62]  Blake Ives,et al.  Web-based Virtual Learning Environments: a Research Framework and a Preliminary Assessment of Effectiveness in Basic It Skills Training Author(s): Piccoli Et Al./web-based Virtual Learning Environments Web-based Virtual Learning Environments: a Research Framework and a Preliminary Assessment of Effe , 2022 .

[63]  Otfried Höffe,et al.  Moral als Preis der Moderne : ein Versuch über Wissenschaft, Technik und Umwelt , 1993 .

[64]  Harry G. Frankfurt Alternate Possibilities and Moral Responsibility , 1969 .

[65]  Hans Lenk,et al.  Konkrete Humanität : Vorlesungen über Verantwortung und Menschlichkeit , 1998 .

[66]  R. Posner Philosophical Dimensions of Privacy: An economic theory of privacy , 1984 .

[67]  Sonja Grabner-Kraeuter The Role of Consumers' Trust in Online-Shopping , 2002 .

[68]  D. Norris,et al.  Electronic Government at the Local Level , 2003 .

[69]  Reagan M. Ramsower,et al.  Cyberethics: Social and Moral Issues in the Computer Age , 2000 .

[70]  Louis D. Brandeis,et al.  The Right to Privacy , 1890 .

[71]  Michael Stocker,et al.  Responsibility and the Abuse Excuse , 1999, Social Philosophy and Policy.

[72]  R. Mason Four ethical issues of the information age , 1986 .

[73]  Bhavani M. Thuraisingham,et al.  Improving timeliness in real-time secure database systems , 1996, SGMD.

[74]  J. Habermas Theorie des kommunikativen Handelns , 1981 .

[75]  R. Jay Wallace,et al.  Responsibility and the moral sentiments , 1997 .

[76]  J. Rachels Why privacy is important , 1985 .

[77]  Sungyoung Lee,et al.  A secure dynamic copy protocol in real-time secure database systems , 1999, LCTES '99.

[78]  Donna L. Hoffman,et al.  Building consumer trust online , 1999, CACM.

[79]  H. Jeff Smith,et al.  Values, personal information privacy, and regulatory approaches , 1995, CACM.

[80]  R. Spinello Case studies in information and computer ethics , 1996 .

[81]  William S. Brown Ontological Security, Existential Anxiety and Workplace Privacy , 2000 .

[82]  Stefan Savage,et al.  Inferring Internet denial-of-service activity , 2001, TOCS.

[83]  Marc Rotenberg,et al.  Communications privacy: implications for network design , 1993, CACM.