본문 바로가기 주메뉴 바로가기
국회도서관 홈으로 정보검색 소장정보 검색

목차보기

영문목차

Section 1. Fundamental Concepts and Theories : This section serves as a foundation for this exhaustive reference tool by addressing underlying principles essential to the understanding of IT Policy and Ethics. Chapters found within these pages provide an excellent framework in which to position IT Policy and Ethics within the field of information science and technology. Insight regarding the critical incorporation of global measures into IT Policy and Ethics is addressed, while crucial stumbling blocks of this field are explored. With 15 chapters comprising this foundational section, the reader can learn and chose from a compendium of expert research on the elemental theories underscoring the IT Policy and Ethics discipline.

Chapter 1. Introduction to Continuous Authentication / Issa Traoré [University of Victoria, Canada] ; Ahmed A.E. Ahmed [University of Victoria, Canada]=1

Chapter 2. Password Sharing and How to Reduce It / Ana Ferreira [Cintesis, Portugal & University of Kent, UK] ; Ricardo Correia [Cintesis, Portugal] ; David W Chadwick [University of Kent, UK] ; Henrique Santos [University of Minho, Portugal] ; Rui Gomes [Hospital Prof. Doutor Fernando Fonseca, Portugal] ; Diogo Reis [Hospital S. Sebastião, Portugal] ; Luis Antunes [Instituto de Telecomunicações, Portugal]=22

Chapter 3. Convergence of Fixed and Mobile Networks / Gábor Kovács [Budapest University of Technology and Economics, Hungary] ; Gábor Árpád Németh [Budapest University of Technology and Economics, Hungary] ; Zoltán Pap [Ericsson, Hungary]=43

Chapter 4. Trust Management and User's Trust Perception in e-Business / Elisa Costante [TU/e Eindhoven University of Technology, The Netherlands] ; Milan Petkovic [TU/e Eindhoven University of Technology, The Netherlands & Philips Research Europe, The Netherlands] ; Jerry den Hartog [TU/e Eindhoven University of Technology, The Netherlands]=64

Chapter 5. Study and Non-Study Related Technologies use of Flemish Students in Higher Education / Steven Bruneel [Katholieke Universiteit Leuven, Belgium] ; Jan Elen [Katholieke Universiteit Leuven, Belgium] ; Kurt De Wit [Katholieke Universiteit Leuven, Belgium] ; Jef C. Verhoeven [Katholieke Universiteit Leuven, Belgium]=84

Chapter 6. Stepwise E-Participation : Good Practice from the Regional Level in Europe / Francesco Molinari [University of Siena, Italy] ; Mateja Kunstelj [University of Ljubljana, Slovenia] ; Ljupčo Todorovski [University of Ljubljana, Slovenia]=105

Chapter 7. Public Key Infrastructure / Reed H. Petty [University of Arkansas at Little Rock, USA] ; Jiang Bian [University of Arkansas at Little Rock, USA] ; Remzi Seker [University of Arkansas at Little Rock, USA]=126

Chapter 8. Access Control in Federated Clouds : The Cloudgrid Case Study / Valentina Casola [University of Naples "Federico II", Italy] ; Antonio Cuomo [University of Sannio, Italy] ; Umberto Villano [University of Sannio, Italy] ; Massimiliano Rak [Second University of Naples, Italy]=148

Chapter 9. Learning, Unlearning, and Relearning : Using Web 2.0 Technologies to Support the Development of Lifelong Learning Skills / Joanna C. Dunlap [University of Colorado Denver, USA] ; Patrick R. Lowenthal [University of Colorado Denver, USA]=170

Chapter 10. The Evolution of KM Practices : The Case of the Renault-Nissan International Strategic Alliance / Nabyla Daidj [TELECOM Business School, France]=194

Chapter 11. Semantic Policies for Modeling Regulatory Process Compliance / Marwane El Kharbili [University of Luxemburg, Luxemburg] ; Elke Pulvermueller [University of Osnabrueck, Germany]=218

Chapter 12. Near Field Authentication / Vasileios Lakafosis [Georgia Institute of Technology, USA] ; Edward Gebara [Georgia Institute of Technology, USA] ; Manos M. Tentzeris [Georgia Institute of Technology, USA] ; Gerald DeJean [Microsoft Research, USA] ; Darko Kirovski [Microsoft Research, USA]=244

Chapter 13. Continuous Authentication in Computers / Harini Jagadeesan [Virginia Tech, USA] ; Michael S. Hsiao [Virginia Tech, USA]=268

Chapter 14. Grid Data Handling / Alexandru Costan [University Politehnica of Bucharest, Romania]=294

Chapter 15. Mass Media Strategies : Hybrid Approach Using a Bioinspired Algorithm and Social Data Mining / Carlos Alberto Ochoa Ortiz Zezzatti [Juarez City University México] ; Darwin Young [COMIMSA Centro Conacyt, Mexico] ; Camelia Chira [Babeş-Bolyai University, Romania] ; Daniel Azpeitia [Juarez City University, México] ; Alán Calvillo [Aguascalientes University, México]=322

Section 2. Tools and Technologies : This section presents an extensive coverage of various tools and technologies available in the field of IT Policy and Ethics that practitioners and academicians alike can utilize to develop different techniques. These chapters enlighten readers about fundamental research on the many tools facilitating the burgeoning field of IT Policy and Ethics. It is through these rigorously researched chapters that the reader is provided with countless examples of the up-and-coming tools and technologies emerging from the field of IT Policy and Ethics. With 15 chapters, this section offers a broad treatment of some of the many tools and technologies within the IT Policy and Ethics field.

Chapter 16. Reversible Information Hiding and Its Application to Image Authentication / Masaaki Fujiyoshi [Tokyo Metropolitan University, Japan] ; Hitoshi Kiya [Tokyo Metropolitan University, Japan]=349

Chapter 17. Applied Cryptography in Electronic Commerce / Sławomir Grzonkowski [National University of Ireland, Ireland] ; Brian D. Ensor [National University of Ireland, Ireland] ; Bill McDaniel [National University of Ireland, Ireland]=368

Chapter 18. Multimodal Biometric Hand-Off for Robust Unobtrusive Continuous Biometric Authentication / P. Daphne Tsatsonlis [Carnegie Mellon University, USA] ; Aaron Jaech [Carnegie Mellon University, USA] ; Robert Batie [Raytheon Company, USA] ; Marios Saivvides [Carnegie Mellon University, USA]=389

Chapter 19. Continuous User Authentication Based on Keystroke Dynamics through Neural Network Committee Machines / Sérgio Roberto de Lima e Silva Filho [Bry Tecnologia S.A., Brazil] ; Mauro Roisenberg [Federal University of Santa Catarina, Brazil]=410

Chapter 20. Identity-Based Cryptography : Applications, Vulnerabilities, and Future Directions / Jenny Torres [University Pierre and Marie Curie, France] ; Michele Nogueira [Federal University of Parana, Brazil] ; Guy Pujolle [University Pierre and Marie Curie, France]=430

Chapter 21. Denial of Service Resilience of Authentication Systems / Valer Bocan [Alcatel-Lucent, Romania] ; Mihai Fagadar-Cosma [Alcatel-Lucent, Romania]=451

Chapter 22. Applied Cryptography in Wireless Sensor Networks / Dulal C. Kar [Texas A&M University-Corpus Christi, USA] ; Hung Ngo [Texas A&M University-Corpus Christi, USA] ; Clifton J. Mulkey [Texas A&M University-Corpus Christi, USA]=471

Chapter 23. A Hybrid Port-Knocking Technique for Host Authentication / Ali H. Hadi [Philadelphia University, Jordan] ; Hussein Al-Bahadili [Petra University, Jordan]=493

Chapter 24. mVITAL : A Standards Compliant Vital Sign Monitor / Yusuf Ozturk [San Diego State University, USA] ; Jayesh Sharma [San Diego State University, USA]=515

Chapter 25. IEEE802.21 Assisted Fast Re-Authentication Scheme over GSABA / Qazi Bouland Mussabbir [Brunel University, UK] ; Thomas John Owens [Brunel University, UK]=539

Chapter 26. Elliptic Curve Cryptography on WISPs / Michael Hutter [Institute for Applied Information Processing and Communications, Graz University of Technology, Austria] ; Erich Wenger [Institute for Applied Information Processing and Communications, Graz University of Technology, Austria] ; Markus Pelnar [Institute for Applied Information Processing and Communications, Graz University of Technology, Austria] ; Christian Pendl [Institute for Applied Information Processing and Communications, Graz University of Technology, Austria]=562

Chapter 27. Point-of-Sale Technologies at Retail Stores : What Will The Future Be Like? / Richard Clodfelter [University of South Carolina, USA]=584

Chapter 28. A Keystroke Biometric System for Long-Text Input / Charles C. Tappert [Pace University, USA] ; Sung-Hyuk Cha [Pace University, USA] ; Mary Villani [Pace University, USA] ; Robert S. Zack [Pace University, USA]=609

vol.2

영문목차

Chapter 29. An Electronic Contract Signing Protocol Using Fingerprint Biometrics / Harkeerat Bedi [University of Tennessee at Chattanooga, USA] ; Li Yang [University of Tennessee at Chattanooga, USA] ; Joseph M. Kizza [University of Tennessee at Chattanooga, USA]=635

Chapter 30. Brain-Like System for Audiovisual Person Authentication Based on Time-to-First Spike Coding / Simei Gomes Wysoski [Auckland University of Technology, New Zealand] ; Lubica Benuskova [University of Otago, New Zealand] ; Nikola Kasabov [Auckland University of Technology, New Zealand]=662

Section 3. Frameworks and Methodologies : This section provides in-depth coverage of conceptual architecture frameworks to provide the reader with a comprehensive understanding of the emerging developments within the field of IT Policy and Ethics. Research fundamentals imperative to the understanding of developmental processes within IT Policy and Ethics are offered. From broad examinations to specific discussions on methodology, the research found within this section spans the discipline while offering detailed, specific discussions. From basic designs to abstract development, these chapters serve to expand the reaches of development and design technologies within the IT Policy and Ethics community. This section includes 13 contributions from researchers throughout the world on the topic of IT Policy and Ethics.

Chapter 31. Using a Social Learning Community to Actively Engage Students' Participation in a Virtual Classroom / Fariel Mohan [University of Trinidad and Tobago, Trinidad and Tobago]=691

Chapter 32. MAC and PHY-Layer Network Coding for Applications in Wireless Communications Networks / Giulio Bartoli [University of Firenze, Italy] ; Francesco Chiti [University of Firenze, Italy] ; Romano Fantacci [University of Firenze, Italy] ; Dania Marabissi [University of Firenze, Italy] ; Andrea Tassi [University of Firenze, Italy]=706

Chapter 33. Key Management / Chuan-Kun Wu [Chinese Academy of Sciences, China]=728

Chapter 34. Creating Ongoing Online Support Communities through Social Networks to Promote Professional Learning / Maria Elena Corbeil [The University of Texas at Brownsville, USA] ; Joseph Rene Corbeil [The University of Texas at Brownsville, USA]=754

Chapter 35. Security Management in Heterogeneous Distributed Sensor Networks / Al-Sakib Khan Pathan [International Islamic University, Malaysia]=773

Chapter 36. A Method of Analysing the Use of Social Networking Sites in Business / Sanaa Askool [University of Reading, UK] ; Aimee Jacobs [University of Reading, UK] ; Keiichi Nakata [University of Reading, UK]=794

Chapter 37. Policy Management in Cloud : Challenges and Approaches / Hassan Takabi [University of Pittsburgh, USA] ; James B. D. Joshi [University of Pittsburgh, USA]=814

Chapter 38. Modeling Access Control in Healthcare Organizations / Efstratia Mourtou [St. Andrew General Hospital, Greece]=835

Chapter 39. An Access Control Model for Dynamic VR Applications / Adam Wójtowicz [Poznań University of Economics, Poland] ; Wojciech Cellary [Poznań University of Economics, Poland]=857

Chapter 40. Building a Cloud-Based Mobile Application Testbed / Hamilton Turner [Virginia Polytechnic Institute, USA] ; Jules White [Virginia Polytechnic Institute, USA] ; Jeff Reed [Virginia Polytechnic Institute, USA] ; José Galindo [Virginia Polytechnic Institute, USA] ; Adam Porter [University of Maryland, USA] ; Madhav Marathe [Virginia Polytechnic Institute, USA] ; Anil Vullikanti [Virginia Polytechnic Institute, USA] ; Aniruddha Gokhale [Vanderbilt University, USA]=879

Chapter 41. Developing Proactive Security Dimensions for SOA / Hany F. EL Yamany [Suez Canal University, Egypt] ; David S. Allison [The University of Western Ontario, Canada] ; Miriam A. M. Capretz [The University of Western Ontario, Canada]=900

Chapter 42. National Interoperability Frameworks : The Way Forward / Fenareti Lampathaki [National Technical University of Athens, Greece] ; Christos Tsiakaliaris [Planet S.A., Greece] ; Antonis Stasis [Hellenic Ministry of Interior, Greece] ; Yannis Charalabidis [National Technical University of Athens, Greece]=923

Chapter 43. Medium Access Control Protocols for Wireless Sensor Networks : Design Space, Challenges, and Future Directions / Pardeep Kumar [Free University Berlin, Germany] ; Mesut Güneş [Free University Berlin, Germany]=947

Section 4. Cases and Applications : This section discusses a variety of applications and opportunities available that can be considered by practitioners in developing viable and effective IT Policy and Ethics programs and processes. This section includes 13 chapters that review topics from case studies in the EU to best practices in Africa and ongoing research in the United States. Further chapters discuss IT Policy and Ethics in a variety of settings. Contributions included in this section provide excellent coverage of today's IT community and how research into IT Policy and Ethics is impacting the social fabric of our present-day global village.

Chapter 44. The Integration of Social Networking in Creating Collaborative Partnerships in Education / Larry S. Tinnerman [Indiana State University, USA] ; James Johnson [Indiana State University, USA]=976

Chapter 45. Audio Visual System for Large Scale People Authentication and Recognition over Internet Protocol(IP) / Sue Inn Ch'ng [Nottingham University Malaysia Campus, Malaysia] ; Kah Phooi Seng [Sunway University, Malaysia] ; Li-Minn Ang [Nottingham University Malaysia Campus, Malaysia] ; Fong Tien Ong [Nottingham University Malaysia Campus, Malaysia]=997

Chapter 46. Music is the Key : Using our Enduring Memory for Songs to Help Users Log On / Marcia Gibson [Institute for Research in Applicable Computing, University of Bedfordshire, UK] ; Karen Renaud [University of Glasgow, UK] ; Marc Conrad [Institute for Research in Applicable Computing, University of Bedfordshire, UK] ; Carsten Maple [Institute for Research in Applicable Computing, University of Bedfordshire, UK]=1018

Chapter 47. Investigating the Performance of the TSS Scheme in Noisy MANETs / Hussein Al-Bahadili [Petra University, Jordan] ; Shakir M. Hussain [Petra University, Jordan] ; Ghassan F. Issa [Petra University, Jordan] ; Khaled El-Zayyat [Al-Ahliyya Amman University, Jordan]=1038

Chapter 48. Secure Exchange of Electronic Health Records / Alejandro Enrique Flores [University of Wollongong, Australia] ; Khin Than Win [University of Wollongong, Australia] ; Willy Susilo [University of Wollongong, Australia]=1059

Chapter 49. RBAC with Generic Rights, Delegation, Revocation, and Constraints / Jacques Wainer [University of Campinas, Brazil] ; Fabio Negrello [University of Campinas, Brazil] ; Igor Ribeiro de Assis [University of Campinas, Brazil]=1080

Chapter 50. E-Simulations for Educating the Professions in Blended Learning Environments / Dale Holt [Deakin University, Australia] ; Stephen Segrave [Deakin University, Australia] ; Jacob Cybulski [Deakin University, Australia]=1102

Chapter 51. Crowdfunding to Improve Environmental Projects' Logistics / Carlos Alberto Ochoa Ortiz Zezzatti [Juarez City University, México] ; Sandra Bustillos [Juarez City University, Mexico] ; Yarira Reyes [Juarez City University, Mexico] ; Alessandra Tagliarducci-Tcherassi [Universitá Della Sapienza, Italy] ; Rubén Jaramillo [LAPEM/CIATEC, Mexico]=1124

Chapter 52. Youth and Online Social Networking : From Local Experiences to Public Discourses / Malene Charlotte Larsen [Aalborg University, Denmark] ; Thomas Ryberg [Aalborg University, Denmark]=1145

Chapter 53. Online Political Participation in the 2008 U.S. Presidential Election : Examining the Democratic Divide / Taewoo Nam [University at Albany, State University of New York, USA] ; Djoko Sigit Sayogo [University at Albany, State University of New York, USA]=1169

Chapter 54. The Role of Social Networking in Civilizational Development : Towards Better Communication and Reasoning in the Global Virtual Nation and Virtual Nation / Andrew Targowski [Western Michigan University, USA]=1193

Chapter 55. Technological Approaches to Maintaining Academic Integrity in Management Education / William Heisler [Troy University, USA] ; Fred Westfall [Troy University, USA] ; Robert Kitahara [Troy University, USA]=1218

Chapter 56. Improving the Effectiveness of Advertising in Internet Social Networking / Francisco Rejón-Guardia [University of Granada, Spain] ; Juan Sánchez-Fernández [University of Granada, Spain] ; Francisco Muñoz-Leiva [University of Granada, Spain]=1244

vol.3

영문목차

Section 5. Issues and Challenges : This section contains 14 chapters, giving a wide variety of perspectives on IT Policy and Ethics and its implications. Such perspectives include reading in privacy, security, trust, ethics, and many more. The section also discusses new ethical considerations within transparency and accountability. Within the chapters, the reader is presented with an in-depth analysis of the most current and relevant issues within this growing field of study. Crucial questions are addressed and alternatives offered, and topics discussed such as interprofessional care, ethical guidelines, health, interoperability, and much more.

Chapter 57. Security Policy Issues in Internet Banking in Malaysia / Normalini Md Kassim [University Science of Malaysia, Malaysia] ; T. Ramayah [University Science of Malaysia, Malaysia]=1274

Chapter 58. Caught in the Web : The Internet and the Demise of Medical Privacy / Keith A. Bauer [Jefferson College of Health Sciences, USA]=1294

Chapter 59. Gender Differences in Social Networking Presence Effects on Web-Based Impression Formation / Leslie Jordan Albert [San Jose State University, USA] ; Timothy R. Hill [San Jose State University, USA] ; Shailaja Venkatsubramanyan [San Jose State University, USA]=1315

Chapter 60. Sociocognitive Inquiry / Brian R. Gaines [University of Victoria, Canada] ; Mildred L. G. Shaw [University of Calgary, Canada]=1336

Chapter 61. End-Users' Acceptance of Biometrics Authentication to Secure E-Commerce within the Context of Saudi Culture : Applying the UTAUT Model / Fahad AL Harby [University of Bradford, UK] ; Rami Qahwaji [University of Bradford, UK] ; Mumtaz Kamala [University of Bradford, UK]=1356

Chapter 62. Certification and Security Issues in Biomedical Grid Portals : The GRISSOM Case Study / Charalampos Doukas [University of the Aegean, Greece] ; Ilias Maglogiannis [University of Central Greece, Greece] ; Aristotle Chatziioannou [National Hellenic Research Foundation, Greece]=1377

Chapter 63. Web Services Composition Problem : Model and Complexity / Fahima Cheikh [Université de Toulouse, France]=1400

Chapter 64. Policy and Issues in Deploying Automated Plagiarism Detection Systems in Academic Communities : A Case Study of VeriGuide / Chi Hong Cheong [The Chinese University of Hong Kong, Hong Kong] ; Tak Pang Lau [The Chinese University of Hong Kong, Hong Kong] ; Irwin King [The Chinese University of Hong Kong, Hong Kong]=1425

Chapter 65. The Paradox of the Interactive Web in the U.S. Public Sector / Ines A. Mergel [Syracuse University, USA] ; Charles M. Schweik [University of Massachusetts, USA]=1451

Chapter 66. A Game Theoretical Approach to Design : A MAC Protocol for Wireless Sensor Networks / S. Mehta [Wireless Communications Research Center, Inha University, Korea] ; B. H. Kim [Korea Railroad Research Institute, Korea] ; K.S. Kwak [Wireless Communications Research Center, Inha University, Korea]=1475

Chapter 67. Cognitive Cooperation in Wireless Networks / Eng Hwee Ong [Nokia Research Center, Finland] ; Jamil Y. Khan [The University of Newcastle, Australia]=1498

Chapter 68. Security and Trust in a Global Research Infrastructure / Jens Jensen [Science and Technology Facilities Council, UK] ; David L. Groep [National Institute for Subatomic Physics, the Netherlands]=1523

Chapter 69. Social Networking and Identity / Rachel Barker [University of South Africa, South Africa]=1551

Chapter 70. Digital Convergence and Horizontal Integration Strategies / Troy J. Strader [Drake University, USA]=1579

Section 6. Emerging Trends : This section highlights research potential within the field of IT Policy and Ethics while exploring uncharted areas of study for the advancement of the discipline. Introducing this section are chapters that set the stage for future research directions and topical suggestions for continued debate, centering on the new venues and forums for discussion. A pair of chapters on the usability and effectiveness research makes up the middle of the section of the final 12 chapters, and the book concludes with a look ahead into the future of the IT Policy and Ethics field, with "Securing the External Interfaces of a Federated Infrastructure Cloud." 'In all, this text will serve as a vital resource to practitioners and academics interested in the best practices and applications of the burgeoning field of IT Policy and Ethics.

Chapter 71. Stepping over the Edge : The Implications of New Technologies for Education / Gráinne Conole [The Open University, UK]=1609

Chapter 72. Web 2.0 for eParticipation : Transformational Tweeting or Devaluation of Democracy? / Elizabeth Tait [University of Aberdeen, United Kingdom]=1631

Chapter 73. Privacy-Aware Organisation-Based Access Control Model(PrivOrBAC) / Nabil Ajam [Institut Télécom, Télécom Bretagne, France] ; Nora Cuppens-Boulahia [Institut Télécom, Télécom Bretagne, France] ; Fréderic Cuppens [Institut Télécom, Télécom Bretagne, France]=1656

Chapter 74. Internet Security Using Biometrics / Shrikant Tiwari [Institute of Technology, Banaras Hindu University, India] ; Aruni Singh [Institute of Technology, Banaras Hindu University, India] ; Ravi Shankar Singh [Institute of Technology, Banaras Hindu University, India] ; Sanjay K. Singh [Institute of Technology, Banaras Hindu University, India]=1680

Chapter 75. A Social Relational Network-Based Architecture for Maintaining the Media Integrity and Optimizing the Quality of Experience : A Technical and Business Perspective / Harilaos G. Koumaras [University of Bordeaux, France] ; Jose Oscar Fajardo [University of the Basque Country, Spain] ; Fidel Liberal [University of the Basque Country, Spain] ; Lingfen Sun [University of Plymouth, UK] ; Vaios Koumaras [Business College of Athens, Greece] ; Costas Troulos [PCN, Greece] ; Anastasios Kourtis [National Centre for Scientific Research Demokritos, Greece]=1708

Chapter 76. Towards Continuous Authentication Based on Gait Using Wearable Motion Recording Sensors / Mohammad Omar Derawi [Gjøvik University College, Norway] ; Davrondzhon Gafurov [Gjøvik University College, Norway] ; Patrick Bours [Gjøvik University College, Norway]=1730

Chapter 77. Using a Design Research Approach to Investigate the Knowledge-Building Implications of Online Social Networking and Other Web 2.0 Technologies in Higher Education Contexts / Cameron Richards [Universiti Teknologi, Malaysia]=1752

Chapter 78. Energy-Efficient MAC Protocols in Distributed Sensor Networks / Yupeng Hu [Hunan University, China] ; Rui Li [Hunan University, China]=1776

Chapter 79. RSU Deployment for Content Dissemination and Downloading in Intelligent Transportation Systems / Massimo Reineri [Politecnico di Torino, Italy] ; Claudio Casetti [Politecnico di Torino, Italy] ; Carla-Fabiana Chiasserini [Politecnico di Torino, Italy] ; Marco Fiore [INSA Lyon, INRIA, France] ; Oscar Trullols-Cruces [Universitat Politecnico de Catalunya, Spain] ; Jose M. Barcelo-Ordinas [Universitat Politecnica de Catalunya, Spain]=1798

Chapter 80. Cloud Environment Controls Assessment Framework / Bharat Shah [Lockheed Martin Corporation, USA]=1822

Chapter 81. Applying Continuous Authentication to Protect Electronic Transactions / Silas Leite Albuquerque [University of Brasilia, Brazil] ; Paulo Roberto de Lira Gondim [University of Brasilia, Brazil]=1848

Chapter 82. Securing the External Interfaces of a Federated Infrastructure Cloud / Philippe Massonet [Centre d'Excellence en Technologies de l'Information et de la Communication, Belgium] ; Arnaud Michot [Centre d'Excellence en Technologies de l'Information et de la Communication, Belgium] ; Syed Naqvi [Centre d'Excellence en Technologies de l'Information et de la Communication, Belgium] ; Massimo Villari [University of Messina, Italy] ; Joseph Latanicki [Thales Services, France]=1876

이용현황보기

IT policy and ethics : concepts, methodologies, tools, and applications. v. 1-3 이용현황 표 - 등록번호, 청구기호, 권별정보, 자료실, 이용여부로 구성 되어있습니다.
등록번호 청구기호 권별정보 자료실 이용여부
0001830341 658.4038 -A13-14 v.1 서울관 서고(열람신청 후 1층 대출대) 이용가능
0001830342 658.4038 -A13-14 v.2 서울관 서고(열람신청 후 1층 대출대) 이용가능
0001830343 658.4038 -A13-14 v.3 서울관 서고(열람신청 후 1층 대출대) 이용가능

출판사 책소개

알라딘제공
IT policies are set in place to streamline the preparation and development of information communication technologies in a particular setting. IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications is a comprehensive collection of research on the features of modern organisations in order to advance the understanding of IT standards.

IT policies are set in place to streamline the preparation and development of information communication technologies in a particular setting.

IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications is a comprehensive collection of research on the features of modern organisations in order to advance the understanding of IT standards. This is an essential reference source for researchers, scholars, policymakers, and IT managers as well as organisations interested in carrying out research in IT policies.

About the Author

Information Resources Management Association (IRMA) is a research-based professional organisation dedicated to advancing the concepts and practices of information resources management in modern organisations. IRMA's primary purpose is to promote the understanding, development and practice of managing information resources as key enterprise assets among IRM/IT professionals. IRMA brings together researchers, practitioners, academicians, and policy makers in information technology management from over 50 countries.