IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Classifying Articles in Information Ethics and Security

Classifying Articles in Information Ethics and Security
View Sample PDF
Author(s): Zack Jourdan (Auburn University, USA)
Copyright: 2007
Pages: 8
Source title: Encyclopedia of Information Ethics and Security
Source Author(s)/Editor(s): Marian Quigley (Monash University, Australia)
DOI: 10.4018/978-1-59140-987-8.ch011

Purchase

View Classifying Articles in Information Ethics and Security on the publisher's website for pricing and purchasing information.

Abstract

Practitioners and researchers have been working to develop information systems (IS) that are functional and yet secure from a variety of threats at a reasonable cost (Austin & Darby, 2003; Mercuri, 2003; Cavusoglu, Cavusoglu, & Raghunathan, 2004; Sipponen, 2005). Information security and ethics (ISS/E) research involves a number of diverse subjects, including networking protocols (Sedaghat, Pieprzyk, & Vossough, 2002), database management (Sarathy & Muralidhar, 2002), cryptography (Anderson, 1994), ethics (Tavani, 2004; Straub & Welke, 1998), coping with risk (Banerjee, Cronan, & Jones, 1998), end-user attitudes (Harrington, 1996), and passwords (Zviran & Haga, 1999).

Related Content

Regner Sabillon. © 2022. 18 pages.
Jeffrey S. Zanzig, Guillermo A. Francia III. © 2022. 20 pages.
Gregory B. White, Natalie Sjelin. © 2022. 17 pages.
Baris Cimen, Meltem Mutluturk, Esra Kocak, Bilgin Metin. © 2022. 21 pages.
Regner Sabillon. © 2022. 63 pages.
Gregory B. White, Natalie Sjelin. © 2022. 16 pages.
Aristides Dasso, Ana Funes. © 2022. 17 pages.
Body Bottom