Pub Date : 2020-01-01DOI: 10.1007/978-3-030-55304-3
Joseph K. Liu, Hui Cui, E. Bertino
{"title":"Information Security and Privacy: 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 – December 2, 2020, Proceedings","authors":"Joseph K. Liu, Hui Cui, E. Bertino","doi":"10.1007/978-3-030-55304-3","DOIUrl":"https://doi.org/10.1007/978-3-030-55304-3","url":null,"abstract":"","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"37 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85529143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-11DOI: 10.1007/978-3-319-93638-3_52
Kexin Hu, Zhenfeng Zhang
{"title":"Correction to: Fast Lottery-Based Micropayments for Decentralized Currencies","authors":"Kexin Hu, Zhenfeng Zhang","doi":"10.1007/978-3-319-93638-3_52","DOIUrl":"https://doi.org/10.1007/978-3-319-93638-3_52","url":null,"abstract":"","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"70 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2018-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79794030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-01-01DOI: 10.1007/978-3-319-93638-3
W. Susilo, Guomin Yang, G. Goos, J. Hartmanis, J. Leeuwen, David Hutchison
{"title":"Information Security and Privacy: 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings","authors":"W. Susilo, Guomin Yang, G. Goos, J. Hartmanis, J. Leeuwen, David Hutchison","doi":"10.1007/978-3-319-93638-3","DOIUrl":"https://doi.org/10.1007/978-3-319-93638-3","url":null,"abstract":"","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"136 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88921199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-02DOI: 10.1080/15536548.2017.1422421
Choton Basu
ABSTRACT In this article, the author focuses on four key issues that are expected to impact the future of privacy and security. These have been labeled — the Four Horsemen, for obvious reasons. In our assessment, these topics or “horsemen” have the potential to change the fundamental tenets of our society. They impact our banking system, medical breakthroughs, use of the internet and web-enabled devices and services. Together, these topics touch the entire range of technical, regulatory, social, legal, and commercial issues. The Four Horsemen are Net Neutrality (and U.S. Internet Privacy Laws), Internet of Things (IoT), Human Genome (Medical), and Cryptocurrency.
{"title":"Future of privacy and security – the Four Horsemen","authors":"Choton Basu","doi":"10.1080/15536548.2017.1422421","DOIUrl":"https://doi.org/10.1080/15536548.2017.1422421","url":null,"abstract":"ABSTRACT In this article, the author focuses on four key issues that are expected to impact the future of privacy and security. These have been labeled — the Four Horsemen, for obvious reasons. In our assessment, these topics or “horsemen” have the potential to change the fundamental tenets of our society. They impact our banking system, medical breakthroughs, use of the internet and web-enabled devices and services. Together, these topics touch the entire range of technical, regulatory, social, legal, and commercial issues. The Four Horsemen are Net Neutrality (and U.S. Internet Privacy Laws), Internet of Things (IoT), Human Genome (Medical), and Cryptocurrency.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"44 1","pages":"164 - 168"},"PeriodicalIF":0.8,"publicationDate":"2017-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78136757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-02DOI: 10.1080/15536548.2017.1394724
Chuleeporn Changchit, K. Bagchi, Choton Basu
The last issue of the Journal of Information Privacy and Security (JIPS) for 2017 contains nine articles and one book review. The issue of privacy and security is increasingly important as we move toward a more technological future. The discussion of these articles focuses on the importance of the protection of personal information on the Internet and social network as well as the policies to help minimizing the misuse of data. In the Book Review section, Dr. Arslan reviews the book titled “The Complete Privacy & Security Desk Reference-Volume I Digital” by Michael Bazzell and Justin Carroll. More details are as follows: The first article titled “Future of Privacy and Security – The Four Horsemen” by Choton Basu, the founding editor of the JIPS. This article is a commentary on the future of the privacy and security field. In this article, the author looks at the four key issues could significantly shape the field and impact society in significant ways. The article discusses the topics of Net Neutrality (and US Internet Privacy Laws), Internet of Things, Human Genome (Medical), and Cryptocurrency. This is an opinion paper that is based on current topics, trends, discussions, events and also the editorial and review work done as the editors of JIPS over 12 years. Processing articles that impact technology, regulation, legal, social and policy has helped shape this vision. It is the author’s assessment that these four trends (each) have the potential to change society forever. The second article titled “A Study of Web Privacy Policies across Industries” by Razieh Nokhbeh Zaeem and K. Suzanne Barber brings to light the shocking rate at which industries misuse their customers Personal Identification Information (PII). The authors conducted studies on 600 companies and found similar trends in each company. The study revealed that companies often misuse their customers PII and some do not even have any privacy policies in place. Zaeem and Barber’s findings in these studies can be used to create better privacy policies for companies and help to educate customers on these policies. In the third article titled “Long-Term Market Implications of Data Breaches, Not”, the authors Russell Lange and Eric Burger assessed the impact of data breaches. They not only addressed the effects these breaches have on the company’s performance and the costs that come with the breach, but also focused on the toll it takes on the customers and peer companies. Citigroup conducted research into these breached companies and found that on average the impact did minimal damage to the companies, but still had negative effects on the company’s stock and performance. The fourth article titled “Who Uses Mobile Apps to Meet Strangers: The Roles of Core Traits and Surface Characteristics”. The authors Lixuan Zhang, Iryna Pentina, and Wendy Fox Kirk investigated the concept of social networking sites, specifically WeChat, a social networking site, that is highly popular in China. The aut
{"title":"Editorial Preface","authors":"Chuleeporn Changchit, K. Bagchi, Choton Basu","doi":"10.1080/15536548.2017.1394724","DOIUrl":"https://doi.org/10.1080/15536548.2017.1394724","url":null,"abstract":"The last issue of the Journal of Information Privacy and Security (JIPS) for 2017 contains nine articles and one book review. The issue of privacy and security is increasingly important as we move toward a more technological future. The discussion of these articles focuses on the importance of the protection of personal information on the Internet and social network as well as the policies to help minimizing the misuse of data. In the Book Review section, Dr. Arslan reviews the book titled “The Complete Privacy & Security Desk Reference-Volume I Digital” by Michael Bazzell and Justin Carroll. More details are as follows: The first article titled “Future of Privacy and Security – The Four Horsemen” by Choton Basu, the founding editor of the JIPS. This article is a commentary on the future of the privacy and security field. In this article, the author looks at the four key issues could significantly shape the field and impact society in significant ways. The article discusses the topics of Net Neutrality (and US Internet Privacy Laws), Internet of Things, Human Genome (Medical), and Cryptocurrency. This is an opinion paper that is based on current topics, trends, discussions, events and also the editorial and review work done as the editors of JIPS over 12 years. Processing articles that impact technology, regulation, legal, social and policy has helped shape this vision. It is the author’s assessment that these four trends (each) have the potential to change society forever. The second article titled “A Study of Web Privacy Policies across Industries” by Razieh Nokhbeh Zaeem and K. Suzanne Barber brings to light the shocking rate at which industries misuse their customers Personal Identification Information (PII). The authors conducted studies on 600 companies and found similar trends in each company. The study revealed that companies often misuse their customers PII and some do not even have any privacy policies in place. Zaeem and Barber’s findings in these studies can be used to create better privacy policies for companies and help to educate customers on these policies. In the third article titled “Long-Term Market Implications of Data Breaches, Not”, the authors Russell Lange and Eric Burger assessed the impact of data breaches. They not only addressed the effects these breaches have on the company’s performance and the costs that come with the breach, but also focused on the toll it takes on the customers and peer companies. Citigroup conducted research into these breached companies and found that on average the impact did minimal damage to the companies, but still had negative effects on the company’s stock and performance. The fourth article titled “Who Uses Mobile Apps to Meet Strangers: The Roles of Core Traits and Surface Characteristics”. The authors Lixuan Zhang, Iryna Pentina, and Wendy Fox Kirk investigated the concept of social networking sites, specifically WeChat, a social networking site, that is highly popular in China. The aut","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"34 1","pages":"161 - 163"},"PeriodicalIF":0.8,"publicationDate":"2017-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89476218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-02DOI: 10.1080/15536548.2017.1418632
T. Ryutov, Nicole D. Sintov, Mengtian Zhao, R. John
ABSTRACT Employees’ non-compliance with organizational information security policies poses a significant threat to organizations. Enhancing our understanding of compliance behavior is crucial for improving security. Although research has identified numerous psychological factors that affect intentions to comply with security policies, how such intentions map onto actual compliance behavior is not well understood. Building on a well-supported model of security policy compliance intentions, we evaluate compliance with each of six types of information security policies using decision vignettes, and compare parameters across models. The study contributes to information security compliance research by examining each risk separately and exploring heterogeneity across risk types.
{"title":"Predicting information security policy compliance intentions and behavior for six employee-based risks","authors":"T. Ryutov, Nicole D. Sintov, Mengtian Zhao, R. John","doi":"10.1080/15536548.2017.1418632","DOIUrl":"https://doi.org/10.1080/15536548.2017.1418632","url":null,"abstract":"ABSTRACT Employees’ non-compliance with organizational information security policies poses a significant threat to organizations. Enhancing our understanding of compliance behavior is crucial for improving security. Although research has identified numerous psychological factors that affect intentions to comply with security policies, how such intentions map onto actual compliance behavior is not well understood. Building on a well-supported model of security policy compliance intentions, we evaluate compliance with each of six types of information security policies using decision vignettes, and compare parameters across models. The study contributes to information security compliance research by examining each risk separately and exploring heterogeneity across risk types.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"223 1","pages":"260 - 281"},"PeriodicalIF":0.8,"publicationDate":"2017-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81699830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-02DOI: 10.1080/15536548.2017.1419014
G. Kaupins, Janet Stephens
ABSTRACT The Internet of Things (IoT) is a loosely defined term describing internet-connected sensors that among other capabilities enable companies to monitor individuals. New privacy-related challenges can arise when sensors communicate with each other. These challenges call for changes to corporate privacy policies to incorporate potential IoT issues and guidance. This research investigates existing privacy policies and IoT-related research to provide IoT privacy policy recommendations. Privacy policy questions include: Who or what is notified of monitoring? When and where should there be expectations of privacy? Why and how is user data collected and how should monitoring problems be communicated? The analysis concludes with IoT-related privacy policy recommendations.
{"title":"Development of Internet of Things-Related Monitoring Policies","authors":"G. Kaupins, Janet Stephens","doi":"10.1080/15536548.2017.1419014","DOIUrl":"https://doi.org/10.1080/15536548.2017.1419014","url":null,"abstract":"ABSTRACT The Internet of Things (IoT) is a loosely defined term describing internet-connected sensors that among other capabilities enable companies to monitor individuals. New privacy-related challenges can arise when sensors communicate with each other. These challenges call for changes to corporate privacy policies to incorporate potential IoT issues and guidance. This research investigates existing privacy policies and IoT-related research to provide IoT privacy policy recommendations. Privacy policy questions include: Who or what is notified of monitoring? When and where should there be expectations of privacy? Why and how is user data collected and how should monitoring problems be communicated? The analysis concludes with IoT-related privacy policy recommendations.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"13 1","pages":"282 - 295"},"PeriodicalIF":0.8,"publicationDate":"2017-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75806555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-02DOI: 10.1080/15536548.2017.1394060
Faruk Arslan
As I was writing this book review, the announcement about Equifax’s data breach, which affected about 143 million people, was dominating the daily discussions within United States. Following this major event, many institutions such as banks and credit reporting agencies were reaching out to their customers providing guidance as to how they can address identity theft issues, which may be caused by this data breach. The effect of these snippets of guidance on individuals’ privacy and security behavior remains to be evaluated. However, it is no secret that developing the digital security and privacy literacy of individuals has become a necessity given the massive digitization, storage, and processing of personal data by organizations worldwide. Within this context, Bazzell and Carroll’s book The Complete Privacy & Security Desk Reference-Volume I Digital is a welcome resource for a wide variety of audience. Reading the biography of both authors, one can easily note their vast amount of practical experience related to computer security, forensics, digital intelligence, and privacy. The content of their book reflects the accumulation of this practical experience. The authors categorized the content of the book into four levels of difficulty: i) basic, ii) intermediate, iii) advanced, and iv) expert, to appeal to a wide range of audience with a diverse set of interests and skill sets. They organized the material into an introduction, followed by 27 chapters, a conclusion, and an index. In the following section, I will provide a brief summary of these sections.
{"title":"Bazzell, M., & Carroll, J. (2016). The Complete Privacy & Security Desk Reference-Volume I Digital. United States of America: CreateSpace Independent Publishing Platform, 478 pp","authors":"Faruk Arslan","doi":"10.1080/15536548.2017.1394060","DOIUrl":"https://doi.org/10.1080/15536548.2017.1394060","url":null,"abstract":"As I was writing this book review, the announcement about Equifax’s data breach, which affected about 143 million people, was dominating the daily discussions within United States. Following this major event, many institutions such as banks and credit reporting agencies were reaching out to their customers providing guidance as to how they can address identity theft issues, which may be caused by this data breach. The effect of these snippets of guidance on individuals’ privacy and security behavior remains to be evaluated. However, it is no secret that developing the digital security and privacy literacy of individuals has become a necessity given the massive digitization, storage, and processing of personal data by organizations worldwide. Within this context, Bazzell and Carroll’s book The Complete Privacy & Security Desk Reference-Volume I Digital is a welcome resource for a wide variety of audience. Reading the biography of both authors, one can easily note their vast amount of practical experience related to computer security, forensics, digital intelligence, and privacy. The content of their book reflects the accumulation of this practical experience. The authors categorized the content of the book into four levels of difficulty: i) basic, ii) intermediate, iii) advanced, and iv) expert, to appeal to a wide range of audience with a diverse set of interests and skill sets. They organized the material into an introduction, followed by 27 chapters, a conclusion, and an index. In the following section, I will provide a brief summary of these sections.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"11 1","pages":"316 - 318"},"PeriodicalIF":0.8,"publicationDate":"2017-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74397442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-02DOI: 10.1080/15536548.2017.1394072
Lixuan Zhang, Iryna Pentina, Wendy Fox Kirk
ABSTRACT Digital space continues to be a popular venue for meeting new people. However, little is known about who uses mobile context-aware social networking apps to initiate new relationships. This study investigates the roles of individual core traits and surface characteristics in the adoption of social discovery features on WeChat, a mobile social networking app in China. Analysis of survey data collected from 213 WeChat users finds the core traits of agreeableness and neuroticism to be negatively related to the use of these social discovery features. The surface characteristic of sensation seeking is positively related to the use of social discovery features, while the surface characteristic of loneliness is not. Based on the findings, directions for future research and implications for app developers and marketers are suggested.
{"title":"Who uses mobile apps to meet strangers: The roles of core traits and surface characteristics","authors":"Lixuan Zhang, Iryna Pentina, Wendy Fox Kirk","doi":"10.1080/15536548.2017.1394072","DOIUrl":"https://doi.org/10.1080/15536548.2017.1394072","url":null,"abstract":"ABSTRACT Digital space continues to be a popular venue for meeting new people. However, little is known about who uses mobile context-aware social networking apps to initiate new relationships. This study investigates the roles of individual core traits and surface characteristics in the adoption of social discovery features on WeChat, a mobile social networking app in China. Analysis of survey data collected from 213 WeChat users finds the core traits of agreeableness and neuroticism to be negatively related to the use of these social discovery features. The surface characteristic of sensation seeking is positively related to the use of social discovery features, while the surface characteristic of loneliness is not. Based on the findings, directions for future research and implications for app developers and marketers are suggested.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"72 5 1","pages":"207 - 225"},"PeriodicalIF":0.8,"publicationDate":"2017-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83665706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-02DOI: 10.1080/15536548.2017.1412114
Faruk Arslan, Niharika Dayyala
ABSTRACT Growing use of the data generated via online social networking sites (SNS) for big data analytics renders the topic of information privacy as a critical concern and calls for a deeper investigation of individuals’ information privacy beliefs and behaviors. The primary goal of our research is to empirically test the effectiveness of the Miltgen and Peyrat-Guillard model in explaining the information privacy behavior of social network site users using a large-N sample from the European Union (EU). Results from the factor-based partial least squares - structural equation modeling (PLS-SEM) analysis provide partial support to this model. We elaborate on enhancements and discuss possible extensions to the model.
{"title":"Cultural and Generational Influences on Information Privacy Concerns within Online Social Networks: An Empirical Evaluation of the Miltgen and Peyrat-Guillard Model","authors":"Faruk Arslan, Niharika Dayyala","doi":"10.1080/15536548.2017.1412114","DOIUrl":"https://doi.org/10.1080/15536548.2017.1412114","url":null,"abstract":"ABSTRACT Growing use of the data generated via online social networking sites (SNS) for big data analytics renders the topic of information privacy as a critical concern and calls for a deeper investigation of individuals’ information privacy beliefs and behaviors. The primary goal of our research is to empirically test the effectiveness of the Miltgen and Peyrat-Guillard model in explaining the information privacy behavior of social network site users using a large-N sample from the European Union (EU). Results from the factor-based partial least squares - structural equation modeling (PLS-SEM) analysis provide partial support to this model. We elaborate on enhancements and discuss possible extensions to the model.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"13 1","pages":"238 - 259"},"PeriodicalIF":0.8,"publicationDate":"2017-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80284987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}