Learn More
Product or company names used in this set are for identification purposes only. Inclusion of the names of the products or companies does not indicate a claim of ownership by IGI Global of the trademark or registered trademark. Handbook of research on social and organizational liabilities in information security / Manish Gupta and Raj Sharman, editors. p.(More)
Of the 200+ parallel-programming languages and environments created in the 1990s, almost all are now defunct. Given that parallel systems are now well within the budget of the typical hobbyist or graduate student, it is not unreasonable to expect a new cohort in excess of several thousand parallel languages and environments to appear in the 2010s. If this(More)
A Collection of 18 Scholarly Titles In today's information age, security preparedness for cyber warfare and terrorism is of critical importance. The rapid advancement of technology creates new risks and threats to surface every day. The Information Warfare and Homeland Security collection is a specialized reference compilation that supports research in the(More)
As organizations increasingly operate, compete, and cooperate in a global context, business processes are also becoming global to propagate the benefits from coordination and standardization across geographical boundaries. In this context, security has gained significance due to increased threats, as well as legislation and compliance issues. This article(More)
The American Association of Pharmaceutical Scientists (AAPS) National Biotechnology Conference Short Course "Translational Challenges in Developing Antibody-Drug Conjugates (ADCs)," held May 24, 2012 in San Diego, CA, was organized by members of the Pharmacokinetics, Pharmacodynamics and Drug Metabolism section of AAPS. Representatives from the(More)
–Role-based access is the most commonly used method for providing access to information systems. Roles are secured through design principles such as least privilege and separation of duties. However, during emergency situations, system availability to first-responders and emergency coordinators through privilege escalation has proved to offer tremendous(More)
One of the fastest growing applications in the banking arena is Electronic Bill Presentation and Payment (EBPP), driven primarily by a desire to reduce costs associated with issuing and settling physical bills. EBPP is a secure system for companies to electronically present bills and other related information to their customers, and host the secure payment(More)
This study investigates the risk of insider threats associated with different applications within a financial institution. Extending routine activity theory (RAT) from criminology literature to information systems security, hypotheses regarding how application characteristics, namely value, inertia, visibility, accessibility, and guardians, cause(More)