Thursday, November 6, 2008

Table of Contents

Estimated Publication Date: Spring 2009

Editor: Kenneth J. Knapp, USAF Academy, USA

Foreword by Merrill Warkentin, Mississippi State University, USA

Table of Contents

Section I: Risk & Threat Assessment

Chapter I. Dynamic Modeling of the Cyber Security Threat Problem: The Black Market for Vulnerabilities

  • Jaziar Radianti, University of Agder, Norway
  • Jose. J. Gonzalez, University of Agder and Gjøvik University College, Norway

Chapter II. An Attack Graph Based Approach for Threat Identification of an Enterprise Network

  • Somak Bhattacharya, Indian Institute of Technology, India
  • Samresh Malhotra, Indian Institute of Technology, India
  • S. K. Ghosh, Indian Institute of Technology, India

Chapter III. Insider Threat Prevention, Detection and Mitigation

  • Robert F. Mills, Air Force Institute of Technology, USA
  • Gilbert L. Peterson, Air Force Institute of Technology, USA
  • Michael R. Grimaila, Air Force Institute of Technology, USA

Chapter IV. An Autocorrelation Methodology for the Assessment of Security Assurance

  • Richard T. Gordon, Bridging The Gap, Inc., USA
  • Allison S. Gehrke, University of Colorado, Denver, USA

Chapter V. Security Implications for Management from the Onset of Information Terrorism

  • Ken Webb, Perth, Australia


Section II: Organizational and Human Security

Chapter VI. The Adoption of Information Security Management Standards: A Literature Review

  • Yves Barlette, GSCM-Montpellier Business School, France
  • Vladislav V. Fomin, Vytautas Magnus University, Lithuania and Rotterdam School of Management, The Netherlands

Chapter VII. Data Smog, Techno Creep and the Hobbling of the Cognitive Dimension

  • Peter R. Marksteiner, U. S. Air Force, USA

Chapter VIII. Balancing the Public Policy Drivers in the Tension between Privacy and Security

  • John W. Bagby, The Pennsylvania State University, USA

Chapter IX. Human Factors in Security: The Role of Information Security Professionals within Organizations

  • Indira R. Guzman, TUI University, USA
  • Kathryn Stam, SUNY Institute of Technology, USA
  • Shaveta Hans, TUI University, USA
  • Carole Angolano, TUI University, USA

Chapter X. Diagnosing Misfits, Inducing Requirements, and Delineating Transformations within Computer Network Operations Organizations

  • Nikolaos Bekatoros, US Naval Postgraduate School, USA
  • Jack L. Koons III, US Naval Postgraduate School, USA
  • Mark E. Nissen, US Naval Postgraduate School, USA
Chapter XI. An Approach to Managing Identity Fraud

  • Rodger Jamieson, The University of New South Wales, Australia
  • Stephen Smith, The University of New South Wales, Australia
  • Greg Stephens, The University of New South Wales, Australia
  • Donald Winchester, The University of New South Wales, Australia


Section III: Emergency Response Planning

Chapter XII. A Repeatable Collaboration Process for Incident Response Planning

  • Alanah Davis, University of Nebraska at Omaha, USA
  • Gert-Jan de Vreede, University of Nebraska at Omaha, USA
  • Leah R. Pietron, University of Nebraska at Omaha, USA

Chapter XIII. Pandemic Influenza, Worker Absenteeism and Impacts on Critical Infrastructures: Freight Transportation as an Illustration

  • Dean A. Jones, Sandia National Laboratories, USA
  • Linda K. Nozick, Cornell University, USA
  • Mark A. Turnquist, Cornell University, USA
  • William J. Sawaya, Texas A&M University, USA

Chapter XIV. Information Sharing: A Study of Information Attributes and their Relative Significance During Catastrophic Events

  • Preeti Singh, University at Buffalo, the State University of New York, USA
  • Pranav Singh, University at Buffalo, the State University of New York, USA
  • Insu Park, University at Buffalo, the State University of New York, USA
  • JinKyu Lee, Oklahoma State University, USA
  • H. Raghav Rao, University at Buffalo, the State University of New York, USA

Chapter XV. An Overview of the Community Cyber Security Maturity Model

  • Greg B. White, University of Texas at San Antonio, USA
  • Mark L. Huson, University of Texas at San Antonio, USA


Section IV: Security Technologies

Chapter XVI. Server Hardening Model Development: A Methodology-Based Approach to Increased System Security

  • Doug White, Roger Williams University, USA
  • Alan Rea, Western Michigan University, USA

Chapter XVII. Trusted Computing: Evolution and Direction

  • Jeff Teo, Montreat College, USA

Chapter XVIII. Introduction, Classification and Implementation of Honeypots

  • Miguel Jose Hernandez y Lopez, Universidad de Buenos Aires, Argentina
  • Carlos Francisco Lerma Resendez, Universidad Autónoma de Tamaulipas, Mexico

Wednesday, April 23, 2008

Editorial Advisory Board & Reviewers

Editor: Dr. Kenneth Knapp, USAF Academy, USA

Board Members:
Dr. Rita A Jordan, Brig Gen, USAF, USAF Academy, USA
Hal Tipton, CISSP, (ISC)2, USA
Mark Barner, SMSgt, USAF, USAF Academy, USA
Dr. Jeff L. Boleng, Lt Col, USAF Academy, USA
Dr. Steve Chadwick, Intel Corporation, USA
Dr. Andrew Colarik, Information Security Consultant, USA
Dr. John K. Corley II, Appalachian State University, USA
Dr. Kevin Curran, University of Ulster, Magee College, Ireland
Gary Denney, Lt Col, USAF, USAF Academy, USA
Dr. Ronald Dodge, United States Military Academy, USA
Dr. Claudia J. Ferrante, USAF Academy, USA
Dr. Dieter Fink, Edith Cowan University, Australia
Dr. F. Nelson Ford, Auburn University, USA
Dr. Michael R. Grimaila, Air Force Institute of Technology, USA
Dr. Matthew M. Hinkle, The Society of Exploration Geophysicists, USA
Mansoor Khan, CISSP, CISA, CFE, CFSA, Thamesteel Limited, UK
Dr. Gary Klein, University of Colorado, Colorado Springs, USA
Dr. Thomas Marshall, Auburn University, USA
Dr. R. Frank Morris, Jr., The Citadel, USA
Dr. R. Kelly Rainer, Jr., Auburn University, USA
Nancy M. Rower, Lt Col, USAF Academy, USA
Dr. Evelyn Thrasher, University of Massachusetts Dartmouth, USA
Dr. Kassem Saleh, Kuwait University, Kuwait
Dr. Matthew Warren, Deakin University, Australia
Dr. Michael Weeks, University of Tampa, USA
--------
Additional Reviewers:
Dr. Ram Dantu, University of North Texas, USA
Dr. Sharon Heilmann, United States Air Force Academy, USA
Dr. Steven Noel, George Mason University, USA
Dr. David Levy, United States Air Force Academy, USA
Dr. Barry Brewer, United States Air Force, USA
Dr. John Bell, United States Air Force, USA
Bart Hubbs, Hospital Corporation of American, USA
Shane Balfe, Royal Holloway, University of London, UK
Paul Powenski, BT/INS International Network Services, UK
Matt B. Palmer, Michigan State University, USA
Pat P. Rieder, United States Air Force Academy, USA
Doug Patton, United States Air Force Academy, USA

Monday, April 14, 2008

Estimated Timeline for Book Project

  • 15 April 08: Full chapters due from authors
  • 15 April - 30 May: Double-blind review process, 3+ reviewers per chapter
  • 30 June: Editor provides authors with feedback on submitted chapters
  • 21 July: Revised chapters due from authors
  • 31 Aug: Editor provides authors with final acceptance notifications
  • 21 Sep: Editor receives final accepted chapters from authors
  • Early 2009: IGI Global publishes book