{"title":"Editorial Preface","authors":"K. Bagchi","doi":"10.1080/15536548.2015.1073505","DOIUrl":null,"url":null,"abstract":"The third 2015 issue of JIPS contains three exciting research articles in addition to an interview with a leading business consultant and a review of a new “classic” book. Mobile malware detection is not an easy task. The first paper titled, “M0Droid, An Android Behavioral-Based Malware Detection Model” by Mohsen Damshenas, Ali Dehghantanha, KimKwang Raymond Choo and Ramlan Mahmud, deals with M0Droid, a behavioral-based Android malware detection technique. The authors propose a method to generate standardized mobile malware signatures and a method for comparing generated signatures. Running M0Droid against Genome dataset yields impressive detection rates. The second paper titled, “Investigating Factors Influencing Web-Browsing Safety Efficacy (WSE) Among Older Adults” by Victoria Kisekka, Rajarshi Chakraborty, Sharmistha BagchiSen, and H. Raghav Rao looks into the ability of older adults to anticipate online threats. Several factors that influence older adults’ ability to distinguish between safe and unsafe websites were investigated with partial least square (PLS) regression analysis using a set of older adults age 55 years and older. The authors find that factors such as risk aversion, security education, and perceived ability in finding information online were positively associated with web-browsing safety. The third paper titled, “Information Security: SETA Program Status at Jordanian Universities” by Mohammad S. Eyadat delves into the important issue of the information security education awareness training (SETA) program at universities in Jordan. The author found a high rate of unawareness of security with no education and training programs available in the surveyed universities. In the Expert Opinion section, Choton Basu interviews Allen Hsieh, a consultant from China who recently consulted with Accenture in China. Hsieh observes that a big percentage of the phones in China are either jail-broken or otherwise problematic, and thus they are easier targets for exploits. In the Book Review section, Adolfo Coronado reviews “Introduction to Computer Security” authored by M. Goodrich & R. Tamassia and published by Addison-Wesley. Adolfo observes that the selection of topics in this book is relevant to any introductory book in computer security,","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"25 1","pages":"139 - 140"},"PeriodicalIF":0.5000,"publicationDate":"2015-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Information Security and Privacy","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/15536548.2015.1073505","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, SOFTWARE ENGINEERING","Score":null,"Total":0}
引用次数: 0
Abstract
The third 2015 issue of JIPS contains three exciting research articles in addition to an interview with a leading business consultant and a review of a new “classic” book. Mobile malware detection is not an easy task. The first paper titled, “M0Droid, An Android Behavioral-Based Malware Detection Model” by Mohsen Damshenas, Ali Dehghantanha, KimKwang Raymond Choo and Ramlan Mahmud, deals with M0Droid, a behavioral-based Android malware detection technique. The authors propose a method to generate standardized mobile malware signatures and a method for comparing generated signatures. Running M0Droid against Genome dataset yields impressive detection rates. The second paper titled, “Investigating Factors Influencing Web-Browsing Safety Efficacy (WSE) Among Older Adults” by Victoria Kisekka, Rajarshi Chakraborty, Sharmistha BagchiSen, and H. Raghav Rao looks into the ability of older adults to anticipate online threats. Several factors that influence older adults’ ability to distinguish between safe and unsafe websites were investigated with partial least square (PLS) regression analysis using a set of older adults age 55 years and older. The authors find that factors such as risk aversion, security education, and perceived ability in finding information online were positively associated with web-browsing safety. The third paper titled, “Information Security: SETA Program Status at Jordanian Universities” by Mohammad S. Eyadat delves into the important issue of the information security education awareness training (SETA) program at universities in Jordan. The author found a high rate of unawareness of security with no education and training programs available in the surveyed universities. In the Expert Opinion section, Choton Basu interviews Allen Hsieh, a consultant from China who recently consulted with Accenture in China. Hsieh observes that a big percentage of the phones in China are either jail-broken or otherwise problematic, and thus they are easier targets for exploits. In the Book Review section, Adolfo Coronado reviews “Introduction to Computer Security” authored by M. Goodrich & R. Tamassia and published by Addison-Wesley. Adolfo observes that the selection of topics in this book is relevant to any introductory book in computer security,
期刊介绍:
As information technology and the Internet become more and more ubiquitous and pervasive in our daily lives, there is an essential need for a more thorough understanding of information security and privacy issues and concerns. The International Journal of Information Security and Privacy (IJISP) creates and fosters a forum where research in the theory and practice of information security and privacy is advanced. IJISP publishes high quality papers dealing with a wide range of issues, ranging from technical, legal, regulatory, organizational, managerial, cultural, ethical and human aspects of information security and privacy, through a balanced mix of theoretical and empirical research articles, case studies, book reviews, tutorials, and editorials. This journal encourages submission of manuscripts that present research frameworks, methods, methodologies, theory development and validation, case studies, simulation results and analysis, technological architectures, infrastructure issues in design, and implementation and maintenance of secure and privacy preserving initiatives.