The book deals with the management of information systems security and privacy, based on a model that covers technological, organizational and legal views. This is the basis for a focused and methodologically structured approach that presents "the big picture" of information systems security and privacy, while targeting managers and technical profiles. The book addresses principles in the background, regardless of a particular technology or organization. It enables a reader to suit these principles to an organization's needs and to implement them accordingly by using explicit procedures...
The book deals with the management of information systems security and privacy, based on a model that covers technological, organizational and lega...
The book deals with the management of information systems security and privacy, based on a model that covers technological, organizational and legal views. This is the basis for a focused and methodologically structured approach that presents "the big picture" of information systems security and privacy, while targeting managers and technical profiles. The book addresses principles in the background, regardless of a particular technology or organization. It enables a reader to suit these principles to an organization's needs and to implement them accordingly by using explicit procedures...
The book deals with the management of information systems security and privacy, based on a model that covers technological, organizational and lega...
This book provides an understanding of the core pillars of trust and reputation systems in electronic business settings. Existing standards and solutions like recommendation systems, web services, semantic and big data technologies are put into context to prevent subverting efforts using false ratings, faked identities and other security issues.
This book provides an understanding of the core pillars of trust and reputation systems in electronic business settings. Existing standards and soluti...