[ecoop-info] Call for Chapters: Handbook of Research on Online Banking Security

Dr. Shadi Aljawarneh shadi.jawarneh at yahoo.com
Fri Jan 15 12:05:00 CET 2016


Call for Chapters: Handbook of Research on Online Banking Security


 EditorsProf. Shadi A. Aljawarneh, (Software Engineering Department, CIT, Jordan University of Science and Technology, Irbid, Jordan)
Call for ChaptersProposals Submission Deadline: December 31, 2015
Full Chapters Due: January 30, 2016

IntroductionAlthough the e-banking field has been found Information Systems literature since the mid-1990s, there is still a lack of advanced research into banking security adoption and associated organizational issues. In addition, there is a shortage in case studies surveying the real experience of firms and organizations in deploying e-banking security. As e-banking is an IT product for development and evolution, this sort of gap in the advanced research makes some sensitive issues and challenges for banking sector, particularly these that currently develop e-banking security because the weaknesses and actual limitations in subject to this field normally mean difficulties in planning and developing e-banking security measures and controls.The use of the Internet as a main distribution channel raises the necessity of securing e-banking since it becomes a vital issue to the environment and could make organizations more vulnerable to system attacks and threats. Although there are several techinques and methods to security as a whole (for example, checklists, risk analysis, formal methods and soft approaches – Backhouse and Dhillon, 1996; Siponen, 2001) whose value is evident – there is an expectation that security can be more efficiently managed if the concentration goes beyond technical-oriented solutions (James, 1996; Siponen, 2001; Dhillon and Torkzadeh, 2006).E-banking can not only offer various benefits to customers in terms of ease and cost of transactions, but it also poses new challenges for banks in supervising their financial systems and in designing and implementing necessary security measures and controls. Therefore, understanding security communication in e-banking issues is important for senior management because it would assist them enhance their approach to e-banking security. This handbook book addresses this issue by reporting exploratory case studies about developing and implementing security in e-banking. Particularly, this handbook of advanced research aims to explore how e-banking security measures and controls takes place within the bank, what are the standards and procedures that play an important role to the success of e-banking security and what key lessons come out of their experience which could be generalized.This book also looks to discuss and address the difficulties and challenges that banks have faced in implementing security techniques, technologies and applications. The editor will seek chapters that address different aspects of e-banking adoption, ranging from Phishing of Banking Information, Pharming of Banking Websites, Adaptive Authentication in Banking, “Watering Hole” Attacks, Malware-Based Attacks, Zeus Trojan, Mobile Banking Security, Identity Theft, and related topics.
ObjectiveThis comprehensive and timely publication aims to be an essential reference source, building on the available literature in the field of e-banking security while providing for further research opportunities in this dynamic field. It is hoped that this text will provide the resources necessary for policy makers, technology developers and managers to adopt and implement security techniques and technologies in developing banks across the globe. Target AudiencePolicy makers, academicians, researchers, advanced-level students, technology developers, bank officers and government officials will find this text useful in furthering their research exposure to pertinent topics in e-banking security and assisting in furthering their own research efforts in this field.Recommended TopicsContributors are welcome to submit chapters on the following topics relating to Electronic Government use, implementation, and adoption in developing countries:·         Phishing of Banking Information·         Pharming of Banking Websites·         Adaptive Authentication in Banking·         “Watering Hole” Attacks·         Malware-Based Attacks·         Zeus Trojan·         Mobile Banking Security·         Identity Theft·         Case Studies on Securing Electronic Banking Use·         Legal Considerations in Electronic Banking Security·         Ethical Considerations in Electronic Banking Security·         Customers Perceptions of Electronic Banking Security·         Advanced Electronic Banking Security Technologies, Approaches and Methods·         Use of Cloud Concept in Electronic Banking Security·         New Directions in Electronic Banking Security
Submission Procedure
Researchers and practitioners are invited to submit on or before December 31, 2015, a 1,000-2,000 word chapter proposal clearly explaining the mission and concerns of his or her proposed chapter. Full chapters are expected to be submitted by January 30, 2016. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project.Note: there are no submission or acceptance fees for manuscripts submitted to this book publication, Handbook of Research on Online Banking Security. All manuscripts are accepted based on a double-blind peer review editorial process. All proposals should be submitted through the “Propose a Chapter” link at the bottom of this page. PublisherThis book is scheduled to be published by IGI Global (formerly Idea Group Inc.), an international academic publisher of the “Information Science Reference” (formerly Idea Group Reference), “Medical Information Science Reference,” “Business Science Reference,” and “Engineering Science Reference” imprints. IGI Global specializes in publishing reference books, scholarly journals, and electronic databases featuring academic research on a variety of innovative topic areas including, but not limited to, education, social science, medicine and healthcare, business and management, information science and technology, engineering, public administration, library and information science, media and communication studies, and environmental science. For additional information regarding the publisher, please visit www.igi-global.com. This publication is anticipated to be released in 2016. Book SeriesFor release in the Advances in Information Security, Privacy, & Ethics (AISPE) Book SeriesISSN: 1948-9730The Advances in Information Security, Privacy, & Ethics (AISPE) Book Series provides cutting-edge research on the protection and misuse of information and technology across various industries and settings. Comprised of scholarly research on topics such as identity management, cryptography, system security, authentication, and data protection, this book series is ideal for reference by IT professionals, academicians, and upper-level students. Important DatesDecember 31, 2015: Proposal Submission DeadlineJanuary 30, 2015: Full Chapter SubmissionFebruary 28, 2016: Review Results ReturnedApril 15, 2015: Final Acceptance Notification Inquiries Prof. Shadi A. AljawarnehSoftware Engineering DepartmentJordan University of Science and TechnologyIrbid, Jordanshadi.jawarneh at yahoo.comsaaljawarneh@just.edu.jo

  


More information about the ecoop-info mailing list