Thursday, November 6, 2008

Table of Contents

Estimated Publication Date: Spring 2009

Editor: Kenneth J. Knapp, USAF Academy, USA

Foreword by Merrill Warkentin, Mississippi State University, USA

Table of Contents

Section I: Risk & Threat Assessment

Chapter I. Dynamic Modeling of the Cyber Security Threat Problem: The Black Market for Vulnerabilities

  • Jaziar Radianti, University of Agder, Norway
  • Jose. J. Gonzalez, University of Agder and Gjøvik University College, Norway

Chapter II. An Attack Graph Based Approach for Threat Identification of an Enterprise Network

  • Somak Bhattacharya, Indian Institute of Technology, India
  • Samresh Malhotra, Indian Institute of Technology, India
  • S. K. Ghosh, Indian Institute of Technology, India

Chapter III. Insider Threat Prevention, Detection and Mitigation

  • Robert F. Mills, Air Force Institute of Technology, USA
  • Gilbert L. Peterson, Air Force Institute of Technology, USA
  • Michael R. Grimaila, Air Force Institute of Technology, USA

Chapter IV. An Autocorrelation Methodology for the Assessment of Security Assurance

  • Richard T. Gordon, Bridging The Gap, Inc., USA
  • Allison S. Gehrke, University of Colorado, Denver, USA

Chapter V. Security Implications for Management from the Onset of Information Terrorism

  • Ken Webb, Perth, Australia


Section II: Organizational and Human Security

Chapter VI. The Adoption of Information Security Management Standards: A Literature Review

  • Yves Barlette, GSCM-Montpellier Business School, France
  • Vladislav V. Fomin, Vytautas Magnus University, Lithuania and Rotterdam School of Management, The Netherlands

Chapter VII. Data Smog, Techno Creep and the Hobbling of the Cognitive Dimension

  • Peter R. Marksteiner, U. S. Air Force, USA

Chapter VIII. Balancing the Public Policy Drivers in the Tension between Privacy and Security

  • John W. Bagby, The Pennsylvania State University, USA

Chapter IX. Human Factors in Security: The Role of Information Security Professionals within Organizations

  • Indira R. Guzman, TUI University, USA
  • Kathryn Stam, SUNY Institute of Technology, USA
  • Shaveta Hans, TUI University, USA
  • Carole Angolano, TUI University, USA

Chapter X. Diagnosing Misfits, Inducing Requirements, and Delineating Transformations within Computer Network Operations Organizations

  • Nikolaos Bekatoros, US Naval Postgraduate School, USA
  • Jack L. Koons III, US Naval Postgraduate School, USA
  • Mark E. Nissen, US Naval Postgraduate School, USA
Chapter XI. An Approach to Managing Identity Fraud

  • Rodger Jamieson, The University of New South Wales, Australia
  • Stephen Smith, The University of New South Wales, Australia
  • Greg Stephens, The University of New South Wales, Australia
  • Donald Winchester, The University of New South Wales, Australia


Section III: Emergency Response Planning

Chapter XII. A Repeatable Collaboration Process for Incident Response Planning

  • Alanah Davis, University of Nebraska at Omaha, USA
  • Gert-Jan de Vreede, University of Nebraska at Omaha, USA
  • Leah R. Pietron, University of Nebraska at Omaha, USA

Chapter XIII. Pandemic Influenza, Worker Absenteeism and Impacts on Critical Infrastructures: Freight Transportation as an Illustration

  • Dean A. Jones, Sandia National Laboratories, USA
  • Linda K. Nozick, Cornell University, USA
  • Mark A. Turnquist, Cornell University, USA
  • William J. Sawaya, Texas A&M University, USA

Chapter XIV. Information Sharing: A Study of Information Attributes and their Relative Significance During Catastrophic Events

  • Preeti Singh, University at Buffalo, the State University of New York, USA
  • Pranav Singh, University at Buffalo, the State University of New York, USA
  • Insu Park, University at Buffalo, the State University of New York, USA
  • JinKyu Lee, Oklahoma State University, USA
  • H. Raghav Rao, University at Buffalo, the State University of New York, USA

Chapter XV. An Overview of the Community Cyber Security Maturity Model

  • Greg B. White, University of Texas at San Antonio, USA
  • Mark L. Huson, University of Texas at San Antonio, USA


Section IV: Security Technologies

Chapter XVI. Server Hardening Model Development: A Methodology-Based Approach to Increased System Security

  • Doug White, Roger Williams University, USA
  • Alan Rea, Western Michigan University, USA

Chapter XVII. Trusted Computing: Evolution and Direction

  • Jeff Teo, Montreat College, USA

Chapter XVIII. Introduction, Classification and Implementation of Honeypots

  • Miguel Jose Hernandez y Lopez, Universidad de Buenos Aires, Argentina
  • Carlos Francisco Lerma Resendez, Universidad Autónoma de Tamaulipas, Mexico