Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Impacts and risk assessment of technology for Internet security : enabled information small-medium enterprises (Advances in Information Security)
Shoniregun C., Springer-Verlag New York, Inc., Secaucus, NJ, 2005. 196 pp. Type: Book (9780387243436)
Date Reviewed: Feb 6 2006

This book has the organization and feel of an extended research paper. It discusses the impacts of technology on small-to-medium enterprises, and the need for a risk assessment model. It is challenging to identify an audience for the book as a whole, since some chapters are too basic for advanced readers, and others are too brief for novice readers. For example, section 4.1 of chapter 1 unnecessarily describes what email, voicemail, video conferencing, and other technologies are. On the other hand, section 6 of chapter 1 describes, in a brief fashion, more advanced topics, such as cryptography, Internet protocol security (IPSec), secure electronic transaction (SET), and others. I would not recommend this book for academic use, but it could be useful for researchers interested in the author’s research results.

Seven chapters make up the book. Chapter 1 motivates the need for security and risk assessment. It also provides a complete list of the technologies available for improving the security of business operations via the Internet. Chapter 2 outlines the impacts of technology on enterprises, and inherent security problems in the networking protocols in use today. These security problems are extensively listed, although previous networking knowledge is required in order to fully understand some of them. Chapter 3 mainly defines risk, and introduces the different risk assessment models in the literature. The author systematically and objectively points out the weaknesses in each of these approaches to modeling. Chapter 4 attempts to resolve the weaknesses discussed in chapter 3 by introducing and analyzing the author’s own proposed risk assessment model. Chapter 5 presents the results of a security-related survey administered by the author. Chapter 6 discusses threats,! risk, trust, government concerns over security, and other related topics. Chapter 7 concludes the book.

The book’s topic is very well researched, as is evident from the numerous citations and references available at the end of each chapter. However, the book is very poorly edited. More than 60 spelling, grammatical, and other editorial mistakes were identified. Among these mistakes are incomplete sentences (page 24), missing punctuation marks (page 39), a missing figure (page 22), inconsistencies between text and graphical data (page 122), and repeated sentences (page 17). In addition, the reader gets the feeling that many statements and ideas are repeated too many times throughout the book. Although the book thoroughly and clearly discusses several topics, some of its sections could have been more concisely and clearly presented.

Reviewer:  Imad H. Elhajj Review #: CR132398 (0612-1241)
Bookmark and Share
 
Security (K.4.4 ... )
 
 
Communications Applications (H.4.3 )
 
 
Online Information Services (H.3.5 )
 
 
Security and Protection (K.6.5 )
 
Would you recommend this review?
yes
no
Other reviews under "Security": Date
Security fundamentals for e-commerce
Hassler V., Artech House, Inc., Norwood, MA, 2000.  409, Type: Book (9781580531085)
May 20 2002
Building firm trust online
Schoder D., Yin P. Communications of the ACM 43(12): 73-79, 2000. Type: Article
Oct 1 2001
Electronic commerce relationships: trust by design
Keen P., Ballance G., Chan S., Schrump S., Prentice Hall PTR, Upper Saddle River, NJ, 2000.  249, Type: Book (9780130170378)
Feb 1 2000
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy