Legal, Ethical & Social Aspects of IT Products

  • Real-world Electronic Voting

    Design, Analysis and Deployment

    Edited by Feng Hao, Peter Y. A. Ryan

    Real-world Electronic Voting captures all major developments in electronic voting since 2003 in a real-world setting. It covers three broad categories: e-voting protocols, attacks reported on e-voting and new developments on the use of e-voting. This book explores recent innovations in both…

    Hardback – 2016-12-09 
    Auerbach Publications
    Series in Security, Privacy and Trust

  • Private Investigation and Homeland Security

    By Daniel J. Benny

    The threat against the homeland continues and the private investigator plays a critical part in this effort. This includes in providing criminal, civil and background investigation, protective service, security consulting and electronic sweeps. The text will provide an overview of the role of…

    Hardback – 2016-12-09 
    CRC Press

  • Protecting Mobile Networks and Devices

    Challenges and Solutions

    Edited by Weizhi Meng, Xiapu Luo, Steven Furnell, Jianying Zhou

    This book gathers and analyzes the latest attacks, solutions, and trends in mobile networks. Its broad scope covers attacks and solutions related to mobile networks, mobile phone security, and wireless security. It examines the previous and emerging attacks and solutions in the mobile networking…

    Hardback – 2016-12-08 
    Auerbach Publications
    Series in Security, Privacy and Trust

  • Online Hate and Harmful Content

    Cross-National Perspectives

    By Pekka Rasanen, Atte Oksanen, Matti Nasi, Teo Keipi

    Over the past couple of decades, different types of hate material have become an increasing concern as the easy and often anonymous access to excessive amount online content has opened the internet up to both use and abuse. Indeed, by providing inexpensive and instantaneous access without necessary…

    Hardback – 2016-12-07 
    Routledge
    Routledge Research in Information Technology and Society

  • Cybercrime Through an Interdisciplinary Lens

    Edited by Thomas J. Holt

    Research on cybercrime has been largely bifurcated, with social science and computer science researchers working with different research agendas. These fields have produced parallel scholarship to understand cybercrime offending and victimization, as well as techniques to harden systems from…

    Hardback – 2016-12-07 
    Routledge
    Routledge Studies in Crime and Society

  • Security and Auditing of Smart Devices

    Managing Proliferation of Confidential Data on Corporate and BYOD Devices

    By Sajay Rai, Philip Chuckwuma, Richard Cozart

    Most organizations have been caught off-guard with the proliferation of smart devices. The IT organization was comfortable supporting the Blackberry due to its ease of implementation and maintenance. But the use of Android and iOS smart devices have created a maintenance nightmare not only for the…

    Hardback – 2016-11-30 
    Auerbach Publications
    Internal Audit and IT Audit

  • Internal Audit Practice from A to Z

    By Patrick Onwura Nzechukwu

    This book addresses the practice of internal auditing using GAAS (Generally Accepted Auditing Standards), GAGAS (Generally Accepted Government Auditing Standards) and International Standards for the Professional Practice of Internal Auditing (Standards) as enunciated by the IIA. Unique in that it…

    Hardback – 2016-11-08 
    Auerbach Publications
    Internal Audit and IT Audit

  • Study Guide for TOGAF 9.1 Certifications

    By B. V. Kumar

    This book is aimed at addressing the needs of individuals interested in a comprehensive understanding of TOGAF. Those who are keen in getting themselves certified in ‘The TOGAF Foundation Certification’ and ‘The TOGAF Certified Certification’ will find this book useful. The contents of the book…

    Hardback – 2016-10-31 
    Chapman and Hall/CRC

  • Ethics and the Internal Auditor's Political Dilemma

    Tools and Techniques to Evaluate a Company's Ethical Culture

    By Lynn Fountain

    This book helps auditors understand the reality of performing the internal audit role and the importance of properly managing ethical standards. It provides many examples of ethical conflicts and proposes alternative actions for the internal auditor. Internal auditors are well-schooled on the IIA…

    Paperback – 2016-10-28 
    Auerbach Publications
    Internal Audit and IT Audit

  • Operational Auditing

    Principles and Techniques for a Changing World

    By Hernan Murdock

    Internal auditors are expected to perform risk-based audits, but do so partially because they focus on financial and compliance risks at the expense of operational, strategic and technological ones. This limits their ability to evaluate critical risks and processes. This book merges traditional…

    Hardback – 2016-10-27 
    Auerbach Publications
    Internal Audit and IT Audit

  • Location Privacy in Wireless Sensor Networks

    By Ruben Rios, Javier Lopez, Jorge Cuellar

    Today all kinds of ubiquitous systems, led by wireless sensor networks, can be seen as an unprecedented privacy risk given their ability to collect information on quantities and situations so far unsuspected. There is therefore an urgent need to develop mechanisms to ensure privacy in sensor…

    Hardback – 2016-10-10 
    CRC Press
    Series in Security, Privacy and Trust

  • Data Analytics for Internal Auditors

    By Richard E. Cascarino

    There are many webinars and training courses on Data Analytics for Internal Auditors, but no handbook written from the practitioner’s viewpoint covering not only the need and the theory, but a practical hands-on approach to conducting Data Analytics. The spread of IT systems makes it necessary that…

    Hardback – 2016-10-03 
    Auerbach Publications
    Internal Audit and IT Audit

Product Search