Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions

The intersection of politics, law, privacy, and security in the context of computer technology is both sensitive and complex. Computer viruses, worms, Trojan horses, spy-ware, computer exploits, poorly designed software, inadequate technology laws, politics and terrorism all of these have a profound effect on our daily computing operations and habits, with major political and social implications. Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions connects privacy and politics, offering a point-in-time review of recent developments of computer security, with a special focus on the relevance and implications of global privacy, law, and politics for society, individuals, and corporations. An estimable addition to any library collection, this reference source compiles high quality, timely content on such cutting-edge topics as reverse engineering of software, understanding emerging computer exploits, emerging lawsuits and cases, global and societal implications, and protection from attacks on privacy.

[1]  Cai Dong-feng Review of knowledge management , 2008 .

[2]  Mukesh Singhal,et al.  Trust Management in Distributed Systems , 2007, Computer.

[3]  Stuart J. Barnes,et al.  Initial trust and online buyer behaviour , 2007, Ind. Manag. Data Syst..

[4]  Koutarou Suzuki,et al.  RFID Privacy Issues and Technical Challenges , 2005, IEEE Engineering Management Review.

[5]  ProTon Europe,et al.  Ethics and technology : ethical issues in an age of information and communication technology , 2007 .

[6]  Feroz Ahmed Siddiqui,et al.  Organisational critical success factors in adoption of e-banking at the Woolwich bank , 2006, Int. J. Inf. Manag..

[7]  Julia Brande Earp,et al.  An experimental economics approach toward quantifying online privacy choices , 2006, Inf. Syst. Frontiers.

[8]  A. Wall,et al.  Identifying the Links Between White-collar Crime and Terrorism , 2006 .

[9]  Stephen A. Weis Privacy Enhancing Technologies , 2006, IEEE Security & Privacy Magazine.

[10]  Gurpreet Dhillon,et al.  Value‐focused assessment of information system security in organizations , 2006, Inf. Syst. J..

[11]  Lance J. Hoffman,et al.  Trust beyond security: an expanded trust model , 2006, CACM.

[12]  Dieter Gollmann,et al.  Why Trust is Bad for Security , 2006, Electron. Notes Theor. Comput. Sci..

[13]  Tamara Dinev,et al.  An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..

[14]  Shuchih Ernest Chang,et al.  Organizational factors to the effectiveness of implementing information security management , 2006, Ind. Manag. Data Syst..

[15]  Thomas Daemen and Ira Rubinstein The Identity Metasystem: Towards a Privacy-Compliant Solution to the Challenges of Digital Identity , 2006 .

[16]  Peter Fleischer,et al.  EU data privacy in practice - Microsoft's approach to compliance , 2006, Comput. Law Secur. Rev..

[17]  Anza Akram,et al.  Electronic Privacy: Patient Concerns , 2015, Communications of the IIMA.

[18]  Richard A. Spinello CyberEthics - morality and law in cyberspace (3. ed.) , 2006 .

[19]  Judy Drennan,et al.  Privacy, Risk Perception, and Expert Online Behavior: An Exploratory Study of Household End Users , 2006, J. Organ. End User Comput..

[20]  David F. Rico A Framework for Measuring ROI of Enterprise Architecture , 2006 .

[21]  Moez Limayem,et al.  A Critical Review of Online Consumer Behavior: Empirical Research , 2005, J. Electron. Commer. Organ..

[22]  Diana C. Mutz Social Trust and E-Commerce Experimental Evidence for the Effects of Social Trust on Individuals’ Economic Behavior , 2005 .

[23]  Atul Gupta,et al.  Information systems security issues and decisions for small businesses: An empirical examination , 2005, Inf. Manag. Comput. Security.

[24]  Peter R.J. Trim,et al.  Managing computer security issues: preventing and limiting future threats and disasters , 2005 .

[25]  Yolande E. Chan,et al.  Theoretical Explanations for Firms' Information Privacy Behaviors , 2005, J. Assoc. Inf. Syst..

[26]  Wen-Ying Wang,et al.  Intellectual capital and performance in causal models: Evidence from the information technology industry in Taiwan , 2005 .

[27]  Stuart Dillon,et al.  Perceived Risk, the Internet Shopping Experience and Online Purchasing Behavior: A New Zealand Perspective , 2005, J. Glob. Inf. Manag..

[28]  Vijay Varadharajan,et al.  Designing secure wireless mobile ad hoc networks , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).

[29]  J. A. Harding *,et al.  An enterprise modeling and integration framework based on knowledge discovery and data mining , 2005 .

[30]  Anne L. Powell,et al.  Information Security Threats and Practices in Small Businesses , 2005, Inf. Syst. Manag..

[31]  Veda C. Storey,et al.  Privacy, fair information practices and the fortune 500: the virtual reality of compliance , 2005, DATB.

[32]  Weisong Shi,et al.  PET: A PErsonalized Trust Model with Reputation and Risk Evaluation for P2P Resource Sharing , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.

[33]  Matthew K. O. Lee,et al.  The Asymmetric Effect of Website Attribute Performance on Satisfaction: An Empirical Study , 2004, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.

[34]  Silke Holtmanns,et al.  Trust and Privacy in Context-Aware Support for Communication in Mobile Groups , 2005 .

[35]  William L. Sparks,et al.  The importance of building social capital , 2005 .

[36]  K. Cameron The Laws of Identity , 2005 .

[37]  Julie Cameron,et al.  Ten Concepts for an eBusiness Collaborative Project Management Framework , 2005, Bled eConference.

[38]  D. Harrison Charles J Vivek McKnight,et al.  Dispositional Trust And Distrust Distinctions in Predicting High- and Low-Risk Internet Expert Advice Site Perceptions , 2005 .

[39]  Naresh K. Malhotra,et al.  Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..

[40]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2004, SASN '04.

[41]  Vijay Varadharajan,et al.  Enhancing grid security with trust management , 2004, IEEE International Conference onServices Computing, 2004. (SCC 2004). Proceedings. 2004.

[42]  K.S.J. Pister,et al.  An ultra-low energy microcontroller for Smart Dust wireless sensor networks , 2004, 2004 IEEE International Solid-State Circuits Conference (IEEE Cat. No.04CH37519).

[43]  Tom Stafford,et al.  Spyware: The Ghost in the Machine , 2004, Commun. Assoc. Inf. Syst..

[44]  Zhaoyu Liu,et al.  A dynamic trust model for mobile ad hoc networks , 2004, Proceedings. 10th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2004. FTDCS 2004..

[45]  Ramanathan V. Guha,et al.  Propagation of trust and distrust , 2004, WWW '04.

[46]  Muthucumaru Maheswaran,et al.  A trust brokering system and its application to resource management in public-resource grids , 2004, 18th International Parallel and Distributed Processing Symposium, 2004. Proceedings..

[47]  M. Wade,et al.  Review: the resource-based view and information systems research: review, extension, and suggestions for future research , 2004 .

[48]  Xin Li,et al.  Predicting user trust in information systems: a comparison of competing trust models , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.

[49]  Varun Grover,et al.  The Role of System Trust in Business-to-Consumer Transactions , 2003, J. Manag. Inf. Syst..

[50]  Linda Volonino,et al.  Principles and practice of information security : protecting computers from hackers and lawyers , 2004 .

[51]  H. Jeff Smith Information Privacy and its Management , 2004, MIS Q. Executive.

[52]  Marit Hansen,et al.  Privacy-enhancing identity management , 2004, Inf. Secur. Tech. Rep..

[53]  Lina Zhou,et al.  Managing Web Services Security , 2004, AMCIS.

[54]  Claire Gauzente WEB MERCHANTS' PRIVACY AND SECURITY STATEMENTS: HOW REASSURING ARE THEY FOR CONSUMERS? A TWO-SIDED APPROACH , 2004 .

[55]  Carl E. Landwehr,et al.  Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.

[56]  S. Buchegger,et al.  A Robust Reputation System for P2P and Mobile Ad-hoc Networks , 2004 .

[57]  Matt Bishop,et al.  What Is Computer Security? , 2003, IEEE Secur. Priv..

[58]  Rahul Roy,et al.  Dynamics of organizational information security , 2003 .

[59]  Srinivasan Seshan,et al.  IrisNet: An Architecture for a Worldwide Sensor Web , 2003, IEEE Pervasive Comput..

[60]  Chrysanthos Dellarocas,et al.  The Digitization of Word-of-Mouth: Promise and Challenges of Online Feedback Mechanisms , 2003, Manag. Sci..

[61]  Neil F. Doherty,et al.  The application of information security policies in large UK-based organizations: an exploratory investigation , 2003, Inf. Manag. Comput. Secur..

[62]  Seungjoon Lee,et al.  Cooperative peer groups in NICE , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[63]  Yong Chen,et al.  Using Trust for Secure Collaboration in Uncertain Environments , 2003, IEEE Pervasive Comput..

[64]  Susan Wiedenbeck,et al.  On-line trust: concepts, evolving themes, a model , 2003, Int. J. Hum. Comput. Stud..

[65]  Audun Jøsang,et al.  Simulating the Effect of Reputation Systems on E-markets , 2003, iTrust.

[66]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[67]  Michael J. Gallivan,et al.  Trust, control and the role of interorganizational systems in electronic partnerships , 2003, Inf. Syst. J..

[68]  Hock-Hai Teo,et al.  An integrative study of information systems security effectiveness , 2003, Int. J. Inf. Manag..

[69]  Detmar W. Straub,et al.  Trust and TAM in Online Shopping: An Integrated Model , 2003, MIS Q..

[70]  Paul A. Pavlou,et al.  Building Effective Online Marketplaces with Institution-Based Trust , 2004, Inf. Syst. Res..

[71]  Paul A. Pavlou,et al.  Evidence of the Effect of Trust Building Technology in Electronic Markets: Price Premiums and Buyer Behavior , 2002, MIS Q..

[72]  Charles J. Kacmar,et al.  Developing and Validating Trust Measures for e-Commerce: An Integrative Typology , 2002, Inf. Syst. Res..

[73]  P. Resnick,et al.  Eliciting Honest Feedback in Electronic Markets , 2002 .

[74]  Anol Bhattacherjee,et al.  Individual Trust in Online Firms: Scale Development and Initial Test , 2002, J. Manag. Inf. Syst..

[75]  Yolanda Gil,et al.  Trusting Information Sources One Citizen at a Time , 2002, SEMWEB.

[76]  Ian Clarke,et al.  Protecting Free Expression Online with Freenet , 2002, IEEE Internet Comput..

[77]  Lik Mui,et al.  Computational models of trust and reputation: agents, evolutionary games, and social networks , 2002 .

[78]  Audun Jøsang,et al.  AIS Electronic Library (AISeL) , 2017 .

[79]  Jaswinder Pal Singh,et al.  Computing and using reputations for internet ratings , 2001, EC '01.

[80]  Karl Aberer,et al.  Managing trust in a peer-2-peer information system , 2001, CIKM '01.

[81]  Roger Clarke,et al.  Person location and person tracking - Technologies, risks and policy implications , 2001, Inf. Technol. People.

[82]  Audun Jøsang,et al.  A Logic for Uncertain Probabilities , 2001, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[83]  Varun Grover,et al.  General Perspectives on Knowledge Management: Fostering a Research Agenda , 2001, J. Manag. Inf. Syst..

[84]  Albert H. Segars,et al.  Knowledge Management: An Organizational Capabilities Perspective , 2001, J. Manag. Inf. Syst..

[85]  B. Gallupe,et al.  Knowledge management systems: surveying the landscape , 2001 .

[86]  Gordon Bell,et al.  A personal digital store , 2001, CACM.

[87]  Kristofer S. J. Pister,et al.  Smart Dust: Communicating with a Cubic-Millimeter Computer , 2001, Computer.

[88]  Richard A. Spinello,et al.  Cyberethics: Morality and Law in Cyberspace , 2001 .

[89]  D. Gefen,et al.  E-commerce: the role of familiarity and trust , 2000 .

[90]  John Riedl,et al.  Explaining collaborative filtering recommendations , 2000, CSCW '00.

[91]  Chrysanthos Dellarocas,et al.  Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior , 2000, EC '00.

[92]  Morris Sloman,et al.  A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.

[93]  R. Smith,et al.  Compilation of State and Federal Privacy Laws , 2000 .

[94]  Gurpreet Dhillon,et al.  Technical opinion: Information system security management in the new millennium , 2000, CACM.

[95]  M. Culnan Protecting Privacy Online: Is Self-Regulation Working? , 2000 .

[96]  Daniel W. Manchala E-Commerce Trust Metrics and Models , 2000, IEEE Internet Comput..

[97]  Stephen Hailes,et al.  Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[98]  Margaret Ross,et al.  BS7799: A Suitable Model for Information Security Management , 2000 .

[99]  N. L. Chervany,et al.  What is Trust? A Conceptual Analysis and an Interdisciplinary Model , 2000 .

[100]  Omar El Sawy,et al.  IT-Intensive Value Innovation in the Electronic Economy: Insights From Marshall Industries , 1999, MIS Q..

[101]  Lorne Olfman,et al.  On becoming virtual: the driving forces and arrangements , 1999, SIGCPR '99.

[102]  Donna L. Hoffman,et al.  Building consumer trust online , 1999, CACM.

[103]  R. Hoyle Statistical Strategies for Small Sample Research , 1999 .

[104]  John Hulland,et al.  Use of partial least squares (PLS) in strategic management research: a review of four recent studies , 1999 .

[105]  D. J. Knight Performance measures for increasing intellectual capital , 1999 .

[106]  Roger Clarke,et al.  Internet privacy concerns confirm the case for intervention , 1999, CACM.

[107]  Chi Wai Chung,et al.  Computer based information systems (CBIS) adoption in small businesses : Hong Kong experience and success factors , 1999 .

[108]  Dorothy E. Denning,et al.  HIDING CRIMES IN CYBERSPACE , 1999 .

[109]  Andrew B. Whinston,et al.  Building trust in the electronic market through an economic incentive mechanism , 1999, ICIS.

[110]  Audun Jøsang,et al.  An Algebra for Assessing Trust in Certification Chains , 1999, NDSS.

[111]  M. Culnan,et al.  Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .

[112]  Detmar W. Straub,et al.  Coping With Systems Risk: Security Planning Models for Management Decision Making , 1998, MIS Q..

[113]  C. Calhoun Community without Propinquity Revisited: Communications Technology and the Transformation of the Urban Public Sphere , 1998 .

[114]  Paul Grosswiler,et al.  Historical Hopes, Media Fears, and the Electronic Town Meeting Concept: Where Technology Meets Democracy or Demagogy? , 1998 .

[115]  Adam Rifkin,et al.  Trust Management on the World Wide Web , 1998, Comput. Networks.

[116]  Wynne W. Chin Issues and Opinion on Structural Equation Modeling by , 2009 .

[117]  N. Bontis Intellectual capital: an exploratory study that develops measures and models , 1998 .

[118]  Audun J sang,et al.  An Algebra for Assessing Trust in Certi cation Chains , 1998 .

[119]  H. Nissenbaum Toward an Approach to Privacy in Public: Challenges of Information Technology , 1997 .

[120]  James H. Moor,et al.  Towards a theory of privacy in the information age , 1997, CSOC.

[121]  Peter P. Swire Markets, Self-Regulation, and Government Enforcement in the Protection of Personal Information, in Privacy and Self-Regulation in the Information Age by the U.S. Department of Commerce. , 1997 .

[122]  John G. Lynch,et al.  Interactive Home Shopping: Consumer, Retailer, and Manufacturer Incentives to Participate in Electronic Marketplaces , 1997 .

[123]  Kerry Ferguson,et al.  World Information Flows and the Impact of New Technology , 1997, 1997 International Symposium on Technology and Society Technology and Society at a Time of Sweeping Change. Proceedings.

[124]  Paul F. Syverson,et al.  Anonymous connections and onion routing , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[125]  Richard Wise,et al.  Global paradox , 1996, The Lancet.

[126]  Karen D. Loch,et al.  Evaluating ethical decision making and computer use , 1996, CACM.

[127]  H. Jeff Smith,et al.  Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..

[128]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[129]  K. Hacker Missing links in the evolution of electronic democratization , 1996 .

[130]  Lewis A. Friedland Electronic democracy and the new citizenship , 1996 .

[131]  James Backhouse,et al.  Risks in the use of information technology within organizations , 1996 .

[132]  Kenneth C. Laudon,et al.  Markets and privacy , 1993, CACM.

[133]  William L. Fuerst,et al.  Information technology and sustained competitive advantage: a resource-based analysis , 1995 .

[134]  Karen D. Loch,et al.  Ethics and computer use , 1995, CACM.

[135]  J. H. Davis,et al.  An Integrative Model Of Organizational Trust , 1995 .

[136]  A. Michael Froomkin,et al.  Anonymity and its Enmities , 1995 .

[137]  Stephen Marsh,et al.  Formalising Trust as a Computational Concept , 1994 .

[138]  Mary J. Culnan,et al.  "How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use , 1993, MIS Q..

[139]  Dorothy E. Denning,et al.  A new paradigm for trusted systems , 1993, NSPW '92-93.

[140]  P. Croce Erosion of mass culture , 1993 .

[141]  William H. Dutton,et al.  Political Science Research on Teledemocracy , 1992 .

[142]  Roger Clarke Extra-Organisational Systems: A Challenge to the Software Engineering Paradigm , 1992, IFIP Congress.

[143]  E. Turban,et al.  Information systems security: A managerial perspective , 1992 .

[144]  Houston H. Carr,et al.  Threats to Information Systems: Today's Reality, Yesterday's Understanding , 1992, MIS Q..

[145]  Yolande E. Chan Business Strategy, Information Systems Strategy, And Strategic Fit: Measurement And Performance Impacts , 1992 .

[146]  J. Ellul Technology and Democracy , 1992 .

[147]  I. Nordin,et al.  State, Technology, and Planning , 1991 .

[148]  Izak Benbasat,et al.  Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation , 1991, Inf. Syst. Res..

[149]  Thomas W. Simon Electronic Inequality , 1991 .

[150]  S. Boon,et al.  The dynamics of interpersonal trust: resolving uncertainty in the ace of risk , 1991 .

[151]  Gary W. Dickson,et al.  A Principles-Based Enterprise Architecture: Lessons from Texaco and Star Enterprise , 1990, MIS Q..

[152]  Detmar W. Straub,et al.  Key information liability issues facing managers: software piracy, proprietary databases, and indi , 1990 .

[153]  Karel Cool,et al.  Asset stock accumulation and sustainability of competitive advantage , 1989 .

[154]  D. Collard,et al.  Trust : making and breaking cooperative relations , 1989 .

[155]  Roger A. Clarke,et al.  Information technology and dataveillance , 1988, CACM.

[156]  John A. Zachman,et al.  A Framework for Information Systems Architecture , 1987, IBM Syst. J..

[157]  Bart Kosko,et al.  Fuzzy Cognitive Maps , 1986, Int. J. Man Mach. Stud..

[158]  David Chaum,et al.  Security without identification: transaction systems to make big brother obsolete , 1985, CACM.

[159]  H. P Gassmann,et al.  OECD guidelines governing the protection of privacy and transborder flows of personal data , 1981 .

[160]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[161]  I. Ajzen,et al.  Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .