Pub Date : 2021-01-01DOI: 10.1007/978-3-030-92571-0
{"title":"Information Systems Security: 17th International Conference, ICISS 2021, Patna, India, December 16–20, 2021, Proceedings","authors":"","doi":"10.1007/978-3-030-92571-0","DOIUrl":"https://doi.org/10.1007/978-3-030-92571-0","url":null,"abstract":"","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81313726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-01DOI: 10.1007/978-3-030-65610-2
S. Kanhere, Vishwas T. Patil, S. Sural, M. Gaur
{"title":"Information Systems Security: 16th International Conference, ICISS 2020, Jammu, India, December 16–20, 2020, Proceedings","authors":"S. Kanhere, Vishwas T. Patil, S. Sural, M. Gaur","doi":"10.1007/978-3-030-65610-2","DOIUrl":"https://doi.org/10.1007/978-3-030-65610-2","url":null,"abstract":"","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/978-3-030-65610-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72492757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1007/978-3-030-36945-3
D. Garg, N. Kumar, R. Shyamasundar
{"title":"Information Systems Security: 15th International Conference, ICISS 2019, Hyderabad, India, December 16–20, 2019, Proceedings","authors":"D. Garg, N. Kumar, R. Shyamasundar","doi":"10.1007/978-3-030-36945-3","DOIUrl":"https://doi.org/10.1007/978-3-030-36945-3","url":null,"abstract":"","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76889326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-12-13DOI: 10.1080/10658980701818343
K. Namuduri
{"title":"From the Editor's Desk","authors":"K. Namuduri","doi":"10.1080/10658980701818343","DOIUrl":"https://doi.org/10.1080/10658980701818343","url":null,"abstract":"","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75185107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-12-13DOI: 10.1080/10658980701752864
Harold J. “Rockie” Grimes
{"title":"Security Sickness in the Health Networks","authors":"Harold J. “Rockie” Grimes","doi":"10.1080/10658980701752864","DOIUrl":"https://doi.org/10.1080/10658980701752864","url":null,"abstract":"","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77459048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-11-20DOI: 10.1080/10658980701795087
K. Namuduri
We have two review articles dealing with totally varied subjects in this issue. One article is regarding lean women with polycystic ovaries (PCOS) and the other is regarding oral health and erectile dysfunction (ED). Women with PCOS demonstrate different phenotypes based on their body mass index (BMI), which may vary considerably by geography. We also know that most women with PCOS are obese, and this obesity has a significant impact on the metabolic and reproductive consequences of PCOS. However, one must remember that lean women with PCOS also carry a huge metabolic risk. It has been reported that 5–10% of lean women have PCOS, and 30–50% of women with PCOS are lean. The numbers among the Indian population may be much more, because thin Indian women with PCOS have more fat, less muscle and are sarcopenic with abdominal obesity. Lean Indian women with PCOS are often misdiagnosed and not managed in time. We diagnosed PCOS in lean women when the women had BMI <23 kg/mwith waist circumference (WC) <80 cm. Though obesity has a higher incidence of insulin resistance, 75% of lean women were insulin resistant. luteneizing hormone (LH)/follicle stimulating hormone (FSH) ratios and dehydroepiandrosterone (DHEAS) levels were also higher in lean women with PCOS. Moreover, β-endorphin levels were found to be higher in lean women with PCOS, which correlated with other hormonal parameters. These higher β-endorphins, which stimulate the release of LH, are linked to mood disorders. Lean women with PCOS have a genetic predisposition with insulin resistance and hypersensitivity, as well as higher postprandial insulin levels. These women also have reactive hypoglycemia to carbs, excess hunger and body fat storage. Lean women with PCOS did not report a history of type-2 diabetes among their first-degree relatives. Therefore, the management of lean women with PCOS should deal with handling sarcopenia, building muscle, modifying diet by reducing the intake of carbohydrates and fats and adding proteins. Apart from modifying the diet, one must advise these women to eat less and eat slowly. It is also important to curb stress by various means such as yoga and meditation.
{"title":"From the Editor's Desk","authors":"K. Namuduri","doi":"10.1080/10658980701795087","DOIUrl":"https://doi.org/10.1080/10658980701795087","url":null,"abstract":"We have two review articles dealing with totally varied subjects in this issue. One article is regarding lean women with polycystic ovaries (PCOS) and the other is regarding oral health and erectile dysfunction (ED). Women with PCOS demonstrate different phenotypes based on their body mass index (BMI), which may vary considerably by geography. We also know that most women with PCOS are obese, and this obesity has a significant impact on the metabolic and reproductive consequences of PCOS. However, one must remember that lean women with PCOS also carry a huge metabolic risk. It has been reported that 5–10% of lean women have PCOS, and 30–50% of women with PCOS are lean. The numbers among the Indian population may be much more, because thin Indian women with PCOS have more fat, less muscle and are sarcopenic with abdominal obesity. Lean Indian women with PCOS are often misdiagnosed and not managed in time. We diagnosed PCOS in lean women when the women had BMI <23 kg/mwith waist circumference (WC) <80 cm. Though obesity has a higher incidence of insulin resistance, 75% of lean women were insulin resistant. luteneizing hormone (LH)/follicle stimulating hormone (FSH) ratios and dehydroepiandrosterone (DHEAS) levels were also higher in lean women with PCOS. Moreover, β-endorphin levels were found to be higher in lean women with PCOS, which correlated with other hormonal parameters. These higher β-endorphins, which stimulate the release of LH, are linked to mood disorders. Lean women with PCOS have a genetic predisposition with insulin resistance and hypersensitivity, as well as higher postprandial insulin levels. These women also have reactive hypoglycemia to carbs, excess hunger and body fat storage. Lean women with PCOS did not report a history of type-2 diabetes among their first-degree relatives. Therefore, the management of lean women with PCOS should deal with handling sarcopenia, building muscle, modifying diet by reducing the intake of carbohydrates and fats and adding proteins. Apart from modifying the diet, one must advise these women to eat less and eat slowly. It is also important to curb stress by various means such as yoga and meditation.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89454922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-11-01DOI: 10.1080/10658980701788165
M. Workman
ABSTRACT Recently, research on information security has expanded from its purely technological orientation into striving to understand and explain the role of human behavior in security breaches. However, an area that has been lacking theory-grounded empirical study is in social engineering attacks. While there exists an extensive body of anecdotal literature, factors that account for attack success remains largely speculative. To better understand this increasing phenomenon, we developed a theoretical framework and conducted an empirical field study to investigate social engineering attacks, and from these results, we make recommendations for practice and further research.
{"title":"Gaining Access with Social Engineering: An Empirical Study of the Threat","authors":"M. Workman","doi":"10.1080/10658980701788165","DOIUrl":"https://doi.org/10.1080/10658980701788165","url":null,"abstract":"ABSTRACT Recently, research on information security has expanded from its purely technological orientation into striving to understand and explain the role of human behavior in security breaches. However, an area that has been lacking theory-grounded empirical study is in social engineering attacks. While there exists an extensive body of anecdotal literature, factors that account for attack success remains largely speculative. To better understand this increasing phenomenon, we developed a theoretical framework and conducted an empirical field study to investigate social engineering attacks, and from these results, we make recommendations for practice and further research.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72954628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-11-01DOI: 10.1080/10658980701784602
Guillermo A. Francia, Rahjima R. Francia
ABSTRACT The unprecedented growing demands on security and privacy protection ushered the proliferation of cryptographic tools. This article presents a study on the performance comparison of cryptographic Application Program Interfaces (APIs) that are implemented for the Java and the .Net frameworks. The results of the study clearly indicate the superiority of a set of commercial cryptographic APIs over its open-source counterpart.
{"title":"An Empirical Study on the Performance of Java/.Net Cryptographic APIs","authors":"Guillermo A. Francia, Rahjima R. Francia","doi":"10.1080/10658980701784602","DOIUrl":"https://doi.org/10.1080/10658980701784602","url":null,"abstract":"ABSTRACT The unprecedented growing demands on security and privacy protection ushered the proliferation of cryptographic tools. This article presents a study on the performance comparison of cryptographic Application Program Interfaces (APIs) that are implemented for the Java and the .Net frameworks. The results of the study clearly indicate the superiority of a set of commercial cryptographic APIs over its open-source counterpart.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78832786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-11-01DOI: 10.1080/10658980701747237
Peter O. Okenyi, T. Owens
ABSTRACT Human hacking is a nontechnical kind of intrusion that relies heavily on human manipulation. Its impact is continuously giving serious concern in the Information technology arena which has often been undermined due to the ease with which this technique is widely used to infiltrate networks through unsuspecting individuals that are undeniably considered the “weakest link” in the security circle. Security awareness that brings about behavioral change, reduces employees' vulnerability, and protects against threats exploiting employees' vulnerability having a positive impact overall on risks related to information assets. Strategies for developing and implementing a successful information security awareness program are presented in this article, which also provides an introduction to the subject of human hacking while discussing the various counter-measures available to minimize the likelihood of such occurrences and their financial, reputation, psychological, and legal ramifications.
{"title":"On the Anatomy of Human Hacking","authors":"Peter O. Okenyi, T. Owens","doi":"10.1080/10658980701747237","DOIUrl":"https://doi.org/10.1080/10658980701747237","url":null,"abstract":"ABSTRACT Human hacking is a nontechnical kind of intrusion that relies heavily on human manipulation. Its impact is continuously giving serious concern in the Information technology arena which has often been undermined due to the ease with which this technique is widely used to infiltrate networks through unsuspecting individuals that are undeniably considered the “weakest link” in the security circle. Security awareness that brings about behavioral change, reduces employees' vulnerability, and protects against threats exploiting employees' vulnerability having a positive impact overall on risks related to information assets. Strategies for developing and implementing a successful information security awareness program are presented in this article, which also provides an introduction to the subject of human hacking while discussing the various counter-measures available to minimize the likelihood of such occurrences and their financial, reputation, psychological, and legal ramifications.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90463546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-11-01DOI: 10.1080/10658980701805050
Edward H. Freeman
{"title":"Regulatory Compliance and the Chief Compliance Officer","authors":"Edward H. Freeman","doi":"10.1080/10658980701805050","DOIUrl":"https://doi.org/10.1080/10658980701805050","url":null,"abstract":"","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75870866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}