International Journal of Information Security and Privacy最新文献

筛选
英文 中文
Information Security and Privacy: 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 – December 2, 2020, Proceedings 信息安全和隐私:第25届澳大利亚会议,ACISP 2020,珀斯,澳大利亚,2020年11月30日至12月2日,会议录
IF 0.8
International Journal of Information Security and Privacy Pub Date : 2020-01-01 DOI: 10.1007/978-3-030-55304-3
Joseph K. Liu, Hui Cui, E. Bertino
{"title":"Information Security and Privacy: 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 – December 2, 2020, Proceedings","authors":"Joseph K. Liu, Hui Cui, E. Bertino","doi":"10.1007/978-3-030-55304-3","DOIUrl":"https://doi.org/10.1007/978-3-030-55304-3","url":null,"abstract":"","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"37 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85529143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Correction to: Fast Lottery-Based Micropayments for Decentralized Currencies 更正:去中心化货币的基于彩票的快速小额支付
IF 0.8
International Journal of Information Security and Privacy Pub Date : 2018-07-11 DOI: 10.1007/978-3-319-93638-3_52
Kexin Hu, Zhenfeng Zhang
{"title":"Correction to: Fast Lottery-Based Micropayments for Decentralized Currencies","authors":"Kexin Hu, Zhenfeng Zhang","doi":"10.1007/978-3-319-93638-3_52","DOIUrl":"https://doi.org/10.1007/978-3-319-93638-3_52","url":null,"abstract":"","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"70 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2018-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79794030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information Security and Privacy: 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings 信息安全与隐私:第23届澳大拉西亚会议,ACISP 2018,卧龙岗,新南威尔士州,澳大利亚,2018年7月11-13日,会议记录
IF 0.8
International Journal of Information Security and Privacy Pub Date : 2018-01-01 DOI: 10.1007/978-3-319-93638-3
W. Susilo, Guomin Yang, G. Goos, J. Hartmanis, J. Leeuwen, David Hutchison
{"title":"Information Security and Privacy: 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings","authors":"W. Susilo, Guomin Yang, G. Goos, J. Hartmanis, J. Leeuwen, David Hutchison","doi":"10.1007/978-3-319-93638-3","DOIUrl":"https://doi.org/10.1007/978-3-319-93638-3","url":null,"abstract":"","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"136 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88921199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Future of privacy and security – the Four Horsemen 隐私和安全的未来——四骑士
IF 0.8
International Journal of Information Security and Privacy Pub Date : 2017-10-02 DOI: 10.1080/15536548.2017.1422421
Choton Basu
{"title":"Future of privacy and security – the Four Horsemen","authors":"Choton Basu","doi":"10.1080/15536548.2017.1422421","DOIUrl":"https://doi.org/10.1080/15536548.2017.1422421","url":null,"abstract":"ABSTRACT In this article, the author focuses on four key issues that are expected to impact the future of privacy and security. These have been labeled — the Four Horsemen, for obvious reasons. In our assessment, these topics or “horsemen” have the potential to change the fundamental tenets of our society. They impact our banking system, medical breakthroughs, use of the internet and web-enabled devices and services. Together, these topics touch the entire range of technical, regulatory, social, legal, and commercial issues. The Four Horsemen are Net Neutrality (and U.S. Internet Privacy Laws), Internet of Things (IoT), Human Genome (Medical), and Cryptocurrency.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"44 1","pages":"164 - 168"},"PeriodicalIF":0.8,"publicationDate":"2017-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78136757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Editorial Preface 编辑前言
IF 0.8
International Journal of Information Security and Privacy Pub Date : 2017-10-02 DOI: 10.1080/15536548.2017.1394724
Chuleeporn Changchit, K. Bagchi, Choton Basu
{"title":"Editorial Preface","authors":"Chuleeporn Changchit, K. Bagchi, Choton Basu","doi":"10.1080/15536548.2017.1394724","DOIUrl":"https://doi.org/10.1080/15536548.2017.1394724","url":null,"abstract":"The last issue of the Journal of Information Privacy and Security (JIPS) for 2017 contains nine articles and one book review. The issue of privacy and security is increasingly important as we move toward a more technological future. The discussion of these articles focuses on the importance of the protection of personal information on the Internet and social network as well as the policies to help minimizing the misuse of data. In the Book Review section, Dr. Arslan reviews the book titled “The Complete Privacy & Security Desk Reference-Volume I Digital” by Michael Bazzell and Justin Carroll. More details are as follows: The first article titled “Future of Privacy and Security – The Four Horsemen” by Choton Basu, the founding editor of the JIPS. This article is a commentary on the future of the privacy and security field. In this article, the author looks at the four key issues could significantly shape the field and impact society in significant ways. The article discusses the topics of Net Neutrality (and US Internet Privacy Laws), Internet of Things, Human Genome (Medical), and Cryptocurrency. This is an opinion paper that is based on current topics, trends, discussions, events and also the editorial and review work done as the editors of JIPS over 12 years. Processing articles that impact technology, regulation, legal, social and policy has helped shape this vision. It is the author’s assessment that these four trends (each) have the potential to change society forever. The second article titled “A Study of Web Privacy Policies across Industries” by Razieh Nokhbeh Zaeem and K. Suzanne Barber brings to light the shocking rate at which industries misuse their customers Personal Identification Information (PII). The authors conducted studies on 600 companies and found similar trends in each company. The study revealed that companies often misuse their customers PII and some do not even have any privacy policies in place. Zaeem and Barber’s findings in these studies can be used to create better privacy policies for companies and help to educate customers on these policies. In the third article titled “Long-Term Market Implications of Data Breaches, Not”, the authors Russell Lange and Eric Burger assessed the impact of data breaches. They not only addressed the effects these breaches have on the company’s performance and the costs that come with the breach, but also focused on the toll it takes on the customers and peer companies. Citigroup conducted research into these breached companies and found that on average the impact did minimal damage to the companies, but still had negative effects on the company’s stock and performance. The fourth article titled “Who Uses Mobile Apps to Meet Strangers: The Roles of Core Traits and Surface Characteristics”. The authors Lixuan Zhang, Iryna Pentina, and Wendy Fox Kirk investigated the concept of social networking sites, specifically WeChat, a social networking site, that is highly popular in China. The aut","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"34 1","pages":"161 - 163"},"PeriodicalIF":0.8,"publicationDate":"2017-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89476218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predicting information security policy compliance intentions and behavior for six employee-based risks 预测六种基于员工的风险的信息安全策略遵从意图和行为
IF 0.8
International Journal of Information Security and Privacy Pub Date : 2017-10-02 DOI: 10.1080/15536548.2017.1418632
T. Ryutov, Nicole D. Sintov, Mengtian Zhao, R. John
{"title":"Predicting information security policy compliance intentions and behavior for six employee-based risks","authors":"T. Ryutov, Nicole D. Sintov, Mengtian Zhao, R. John","doi":"10.1080/15536548.2017.1418632","DOIUrl":"https://doi.org/10.1080/15536548.2017.1418632","url":null,"abstract":"ABSTRACT Employees’ non-compliance with organizational information security policies poses a significant threat to organizations. Enhancing our understanding of compliance behavior is crucial for improving security. Although research has identified numerous psychological factors that affect intentions to comply with security policies, how such intentions map onto actual compliance behavior is not well understood. Building on a well-supported model of security policy compliance intentions, we evaluate compliance with each of six types of information security policies using decision vignettes, and compare parameters across models. The study contributes to information security compliance research by examining each risk separately and exploring heterogeneity across risk types.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"223 1","pages":"260 - 281"},"PeriodicalIF":0.8,"publicationDate":"2017-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81699830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Development of Internet of Things-Related Monitoring Policies 物联网监控政策的制定
IF 0.8
International Journal of Information Security and Privacy Pub Date : 2017-10-02 DOI: 10.1080/15536548.2017.1419014
G. Kaupins, Janet Stephens
{"title":"Development of Internet of Things-Related Monitoring Policies","authors":"G. Kaupins, Janet Stephens","doi":"10.1080/15536548.2017.1419014","DOIUrl":"https://doi.org/10.1080/15536548.2017.1419014","url":null,"abstract":"ABSTRACT The Internet of Things (IoT) is a loosely defined term describing internet-connected sensors that among other capabilities enable companies to monitor individuals. New privacy-related challenges can arise when sensors communicate with each other. These challenges call for changes to corporate privacy policies to incorporate potential IoT issues and guidance. This research investigates existing privacy policies and IoT-related research to provide IoT privacy policy recommendations. Privacy policy questions include: Who or what is notified of monitoring? When and where should there be expectations of privacy? Why and how is user data collected and how should monitoring problems be communicated? The analysis concludes with IoT-related privacy policy recommendations.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"13 1","pages":"282 - 295"},"PeriodicalIF":0.8,"publicationDate":"2017-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75806555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Bazzell, M., & Carroll, J. (2016). The Complete Privacy & Security Desk Reference-Volume I Digital. United States of America: CreateSpace Independent Publishing Platform, 478 pp 巴泽尔,M.,卡罗尔,J.(2016)。完整的隐私和安全桌参考-卷1数字。美利坚合众国:CreateSpace独立出版平台,478页
IF 0.8
International Journal of Information Security and Privacy Pub Date : 2017-10-02 DOI: 10.1080/15536548.2017.1394060
Faruk Arslan
{"title":"Bazzell, M., & Carroll, J. (2016). The Complete Privacy & Security Desk Reference-Volume I Digital. United States of America: CreateSpace Independent Publishing Platform, 478 pp","authors":"Faruk Arslan","doi":"10.1080/15536548.2017.1394060","DOIUrl":"https://doi.org/10.1080/15536548.2017.1394060","url":null,"abstract":"As I was writing this book review, the announcement about Equifax’s data breach, which affected about 143 million people, was dominating the daily discussions within United States. Following this major event, many institutions such as banks and credit reporting agencies were reaching out to their customers providing guidance as to how they can address identity theft issues, which may be caused by this data breach. The effect of these snippets of guidance on individuals’ privacy and security behavior remains to be evaluated. However, it is no secret that developing the digital security and privacy literacy of individuals has become a necessity given the massive digitization, storage, and processing of personal data by organizations worldwide. Within this context, Bazzell and Carroll’s book The Complete Privacy & Security Desk Reference-Volume I Digital is a welcome resource for a wide variety of audience. Reading the biography of both authors, one can easily note their vast amount of practical experience related to computer security, forensics, digital intelligence, and privacy. The content of their book reflects the accumulation of this practical experience. The authors categorized the content of the book into four levels of difficulty: i) basic, ii) intermediate, iii) advanced, and iv) expert, to appeal to a wide range of audience with a diverse set of interests and skill sets. They organized the material into an introduction, followed by 27 chapters, a conclusion, and an index. In the following section, I will provide a brief summary of these sections.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"11 1","pages":"316 - 318"},"PeriodicalIF":0.8,"publicationDate":"2017-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74397442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Who uses mobile apps to meet strangers: The roles of core traits and surface characteristics 谁用手机应用与陌生人见面:核心特征和表面特征的作用
IF 0.8
International Journal of Information Security and Privacy Pub Date : 2017-10-02 DOI: 10.1080/15536548.2017.1394072
Lixuan Zhang, Iryna Pentina, Wendy Fox Kirk
{"title":"Who uses mobile apps to meet strangers: The roles of core traits and surface characteristics","authors":"Lixuan Zhang, Iryna Pentina, Wendy Fox Kirk","doi":"10.1080/15536548.2017.1394072","DOIUrl":"https://doi.org/10.1080/15536548.2017.1394072","url":null,"abstract":"ABSTRACT Digital space continues to be a popular venue for meeting new people. However, little is known about who uses mobile context-aware social networking apps to initiate new relationships. This study investigates the roles of individual core traits and surface characteristics in the adoption of social discovery features on WeChat, a mobile social networking app in China. Analysis of survey data collected from 213 WeChat users finds the core traits of agreeableness and neuroticism to be negatively related to the use of these social discovery features. The surface characteristic of sensation seeking is positively related to the use of social discovery features, while the surface characteristic of loneliness is not. Based on the findings, directions for future research and implications for app developers and marketers are suggested.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"72 5 1","pages":"207 - 225"},"PeriodicalIF":0.8,"publicationDate":"2017-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83665706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Cultural and Generational Influences on Information Privacy Concerns within Online Social Networks: An Empirical Evaluation of the Miltgen and Peyrat-Guillard Model 在线社交网络中对信息隐私关注的文化和代际影响:对Miltgen和Peyrat-Guillard模型的实证评估
IF 0.8
International Journal of Information Security and Privacy Pub Date : 2017-10-02 DOI: 10.1080/15536548.2017.1412114
Faruk Arslan, Niharika Dayyala
{"title":"Cultural and Generational Influences on Information Privacy Concerns within Online Social Networks: An Empirical Evaluation of the Miltgen and Peyrat-Guillard Model","authors":"Faruk Arslan, Niharika Dayyala","doi":"10.1080/15536548.2017.1412114","DOIUrl":"https://doi.org/10.1080/15536548.2017.1412114","url":null,"abstract":"ABSTRACT Growing use of the data generated via online social networking sites (SNS) for big data analytics renders the topic of information privacy as a critical concern and calls for a deeper investigation of individuals’ information privacy beliefs and behaviors. The primary goal of our research is to empirically test the effectiveness of the Miltgen and Peyrat-Guillard model in explaining the information privacy behavior of social network site users using a large-N sample from the European Union (EU). Results from the factor-based partial least squares - structural equation modeling (PLS-SEM) analysis provide partial support to this model. We elaborate on enhancements and discuss possible extensions to the model.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"13 1","pages":"238 - 259"},"PeriodicalIF":0.8,"publicationDate":"2017-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80284987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信