{"title":"Editorial Preface","authors":"K. Bagchi","doi":"10.1080/15536548.2015.1105590","DOIUrl":null,"url":null,"abstract":"The fourth issue of Journal of Information Privacy and Security (JIPS), 2014, contains two regular research papers and a research essay special section containing three interesting research essays. The first regular article titled, “Job Quitters, Information Security Awareness, and Knowledge Management Strategies” by Hongbo Lyu and Justin Zhang talks about a unique set of people: Job Quitters. A lack of theory in this area is what makes the article interesting. When the potential security threat comes from Job Quitters, Lyu and Zhang find that the firm should implement full knowledge management initiatives to achieve a knowledge management performance quotient as high as possible under certain conditions. The article also provides initial guidance on knowledge management strategy to security practitioners. The second regular contribution titled, “The Application of Keystroke Analysis for Physical Security: A Field Experiment” by Christopher S. Leberknight and Michael L. Recce is on the role of keystroke analysis as a behavioral biometric analysis using a real world environment. It extends the previous work by investigating the classification performance of keystroke analysis using a biometric keypad and several novel typing features during a 5-week field experiment. The article observes that typing patterns stabilize with very little variation between different time periods. The Research Essay special section that follows contains three research essays on physical security related issues. This special section starts with an introduction by Gaurav Gupta and Indranil Bose (Associate Editor, JIPS). Three research essays follow this introduction. Since information and communication technologies have become a part of surveillance infrastructures, new privacy and security issues arise. In order to cope with these challenges, the readers of JIPS may need to have an understanding of these physical security issues. In the Book Review section, Adolfo Coronado reviews a book titled, “Information Assurance for the Enterprise: A Roadmap to Information Security”, written by C. Schou and D. Shoemaker. Dr. Coronado observes that “The aim of this book is to take a management role, therefore, the topics are introduced with a management emphasis and not a technical perspective.” We acknowledge services of JIPS reviewers as well as outside reviewers for the journal. Thanks are also due to our editorial board members and associate editors for their untiring efforts to provide critical reviews in a timely manner. Thanks to Dr. Choton Basu (University of Wisconsin Whitewater) for conducting a few interviews for JIPS, in spite of his busy schedule. Thanks also to Dr. Chuleeporn Changchit (Texas A&M, Corpus Christi) for routinely forwarding articles sent to her by authors. Finally, thanks are due to our publisher who helped us in every possible way. Happy holidays and a happy new year to you all!","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"11 1","pages":"187 - 188"},"PeriodicalIF":0.5000,"publicationDate":"2015-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Information Security and Privacy","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/15536548.2015.1105590","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, SOFTWARE ENGINEERING","Score":null,"Total":0}
引用次数: 0
Abstract
The fourth issue of Journal of Information Privacy and Security (JIPS), 2014, contains two regular research papers and a research essay special section containing three interesting research essays. The first regular article titled, “Job Quitters, Information Security Awareness, and Knowledge Management Strategies” by Hongbo Lyu and Justin Zhang talks about a unique set of people: Job Quitters. A lack of theory in this area is what makes the article interesting. When the potential security threat comes from Job Quitters, Lyu and Zhang find that the firm should implement full knowledge management initiatives to achieve a knowledge management performance quotient as high as possible under certain conditions. The article also provides initial guidance on knowledge management strategy to security practitioners. The second regular contribution titled, “The Application of Keystroke Analysis for Physical Security: A Field Experiment” by Christopher S. Leberknight and Michael L. Recce is on the role of keystroke analysis as a behavioral biometric analysis using a real world environment. It extends the previous work by investigating the classification performance of keystroke analysis using a biometric keypad and several novel typing features during a 5-week field experiment. The article observes that typing patterns stabilize with very little variation between different time periods. The Research Essay special section that follows contains three research essays on physical security related issues. This special section starts with an introduction by Gaurav Gupta and Indranil Bose (Associate Editor, JIPS). Three research essays follow this introduction. Since information and communication technologies have become a part of surveillance infrastructures, new privacy and security issues arise. In order to cope with these challenges, the readers of JIPS may need to have an understanding of these physical security issues. In the Book Review section, Adolfo Coronado reviews a book titled, “Information Assurance for the Enterprise: A Roadmap to Information Security”, written by C. Schou and D. Shoemaker. Dr. Coronado observes that “The aim of this book is to take a management role, therefore, the topics are introduced with a management emphasis and not a technical perspective.” We acknowledge services of JIPS reviewers as well as outside reviewers for the journal. Thanks are also due to our editorial board members and associate editors for their untiring efforts to provide critical reviews in a timely manner. Thanks to Dr. Choton Basu (University of Wisconsin Whitewater) for conducting a few interviews for JIPS, in spite of his busy schedule. Thanks also to Dr. Chuleeporn Changchit (Texas A&M, Corpus Christi) for routinely forwarding articles sent to her by authors. Finally, thanks are due to our publisher who helped us in every possible way. Happy holidays and a happy new year to you all!
《信息隐私与安全杂志》(Journal of Information Privacy and Security, JIPS) 2014年第四期包含两篇常规研究论文和一篇研究论文专题,其中包含三篇有趣的研究论文。第一篇定期文章题为“辞职者、信息安全意识和知识管理策略”,由吕洪波和贾斯汀·张撰写,讨论了一群独特的人:辞职者。这方面缺乏理论正是这篇文章的有趣之处。Lyu和Zhang发现,当潜在的安全威胁来自于离职者时,企业应该实施全面的知识管理举措,以在一定条件下实现尽可能高的知识管理绩效商。本文还为安全从业者提供了关于知识管理策略的初步指导。第二个定期贡献题为“击键分析在物理安全中的应用:现场实验”,作者是Christopher S. Leberknight和Michael L. Recce,讨论了击键分析作为一种使用真实世界环境的行为生物计量分析的作用。在为期5周的现场实验中,通过研究使用生物识别键盘和几个新颖的打字特征的击键分析的分类性能,扩展了先前的工作。本文观察到,键入模式在不同时间段之间的变化非常小,非常稳定。下面的研究论文特别部分包含三篇关于物理安全相关问题的研究论文。这个特别的部分从Gaurav Gupta和Indranil Bose (JIPS副主编)的介绍开始。接下来是三篇研究论文。由于信息和通信技术已成为监视基础设施的一部分,因此出现了新的隐私和安全问题。为了应对这些挑战,JIPS的读者可能需要了解这些物理安全问题。在书评部分,Adolfo Coronado评论了一本名为“企业信息保障:信息安全路线图”的书,作者是C. Schou和D. Shoemaker。科罗纳多博士指出:“这本书的目的是扮演一个管理角色,因此,这些主题是从管理的角度介绍的,而不是从技术的角度。”我们感谢JIPS审稿人以及期刊外部审稿人的服务。我们也要感谢我们的编辑委员会成员和副编辑们的不懈努力,及时提供重要的评论。感谢Choton Basu博士(威斯康星大学白水分校)在百忙之中为JIPS进行了几次采访。也感谢chleeporn Changchit博士(Texas A&M, Corpus Christi)定期转发作者发给她的文章。最后,感谢我们的发行商,他们以各种可能的方式帮助了我们。祝大家节日快乐,新年快乐!
期刊介绍:
As information technology and the Internet become more and more ubiquitous and pervasive in our daily lives, there is an essential need for a more thorough understanding of information security and privacy issues and concerns. The International Journal of Information Security and Privacy (IJISP) creates and fosters a forum where research in the theory and practice of information security and privacy is advanced. IJISP publishes high quality papers dealing with a wide range of issues, ranging from technical, legal, regulatory, organizational, managerial, cultural, ethical and human aspects of information security and privacy, through a balanced mix of theoretical and empirical research articles, case studies, book reviews, tutorials, and editorials. This journal encourages submission of manuscripts that present research frameworks, methods, methodologies, theory development and validation, case studies, simulation results and analysis, technological architectures, infrastructure issues in design, and implementation and maintenance of secure and privacy preserving initiatives.