Learn More
Product or company names used in this set are for identification purposes only. Inclusion of the names of the products or companies does not indicate a claim of ownership by IGI Global of the trademark or registered trademark. Handbook of research on social and organizational liabilities in information security / Manish Gupta and Raj Sharman, editors. p.(More)
A Collection of 18 Scholarly Titles In today's information age, security preparedness for cyber warfare and terrorism is of critical importance. The rapid advancement of technology creates new risks and threats to surface every day. The Information Warfare and Homeland Security collection is a specialized reference compilation that supports research in the(More)
Of the 200+ parallel-programming languages and environments created in the 1990s, almost all are now defunct. Given that parallel systems are now well within the budget of the typical hobbyist or graduate student, it is not unreasonable to expect a new cohort in excess of several thousand parallel languages and environments to appear in the 2010s. If this(More)
As organizations increasingly operate, compete, and cooperate in a global context, business processes are also becoming global to propagate the benefits from coordination and standardization across geographical boundaries. In this context, security has gained significance due to increased threats, as well as legislation and compliance issues. This article(More)
One of the fastest growing applications in the banking arena is Electronic Bill Presentation and Payment (EBPP), driven primarily by a desire to reduce costs associated with issuing and settling physical bills. EBPP is a secure system for companies to electronically present bills and other related information to their customers, and host the secure payment(More)
–Role-based access is the most commonly used method for providing access to information systems. Roles are secured through design principles such as least privilege and separation of duties. However, during emergency situations, system availability to first-responders and emergency coordinators through privilege escalation has proved to offer tremendous(More)
The present work proposes three intelligent Load frequency controllers to control and regulate the power output and system frequency by controlling the speed of generator. Controllers are tested on two area thermal thermal interconnected power system. A multi objective function is created by two criterions Integral Square Error (ISE), and Integral of Time(More)
This study investigates the risk of insider threats associated with different applications within a financial institution. Extending routine activity theory (RAT) from criminology literature to information systems security, hypotheses regarding how application characteristics, namely value, inertia, visibility, accessibility, and guardians, cause(More)