首页 > 最新文献

International Journal of Information Security and Privacy最新文献

英文 中文
Information Security and Privacy: 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 – December 2, 2020, Proceedings 信息安全和隐私:第25届澳大利亚会议,ACISP 2020,珀斯,澳大利亚,2020年11月30日至12月2日,会议录
IF 0.8 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2020-01-01 DOI: 10.1007/978-3-030-55304-3
Joseph K. Liu, Hui Cui, E. Bertino
{"title":"Information Security and Privacy: 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 – December 2, 2020, Proceedings","authors":"Joseph K. Liu, Hui Cui, E. Bertino","doi":"10.1007/978-3-030-55304-3","DOIUrl":"https://doi.org/10.1007/978-3-030-55304-3","url":null,"abstract":"","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"37 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85529143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Correction to: Fast Lottery-Based Micropayments for Decentralized Currencies 更正:去中心化货币的基于彩票的快速小额支付
IF 0.8 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2018-07-11 DOI: 10.1007/978-3-319-93638-3_52
Kexin Hu, Zhenfeng Zhang
{"title":"Correction to: Fast Lottery-Based Micropayments for Decentralized Currencies","authors":"Kexin Hu, Zhenfeng Zhang","doi":"10.1007/978-3-319-93638-3_52","DOIUrl":"https://doi.org/10.1007/978-3-319-93638-3_52","url":null,"abstract":"","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"70 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2018-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79794030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information Security and Privacy: 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings 信息安全与隐私:第23届澳大拉西亚会议,ACISP 2018,卧龙岗,新南威尔士州,澳大利亚,2018年7月11-13日,会议记录
IF 0.8 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2018-01-01 DOI: 10.1007/978-3-319-93638-3
W. Susilo, Guomin Yang, G. Goos, J. Hartmanis, J. Leeuwen, David Hutchison
{"title":"Information Security and Privacy: 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings","authors":"W. Susilo, Guomin Yang, G. Goos, J. Hartmanis, J. Leeuwen, David Hutchison","doi":"10.1007/978-3-319-93638-3","DOIUrl":"https://doi.org/10.1007/978-3-319-93638-3","url":null,"abstract":"","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"136 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88921199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Future of privacy and security – the Four Horsemen 隐私和安全的未来——四骑士
IF 0.8 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2017-10-02 DOI: 10.1080/15536548.2017.1422421
Choton Basu
ABSTRACT In this article, the author focuses on four key issues that are expected to impact the future of privacy and security. These have been labeled — the Four Horsemen, for obvious reasons. In our assessment, these topics or “horsemen” have the potential to change the fundamental tenets of our society. They impact our banking system, medical breakthroughs, use of the internet and web-enabled devices and services. Together, these topics touch the entire range of technical, regulatory, social, legal, and commercial issues. The Four Horsemen are Net Neutrality (and U.S. Internet Privacy Laws), Internet of Things (IoT), Human Genome (Medical), and Cryptocurrency.
在这篇文章中,作者重点讨论了四个有望影响隐私和安全未来的关键问题。他们被贴上了四骑士的标签,原因很明显。在我们的评估中,这些话题或“骑士”有可能改变我们社会的基本原则。它们影响着我们的银行系统、医疗突破、互联网和网络设备和服务的使用。总之,这些主题涉及技术、监管、社会、法律和商业问题的整个范围。四大骑士分别是网络中立性(和美国互联网隐私法)、物联网(IoT)、人类基因组(医疗)和加密货币。
{"title":"Future of privacy and security – the Four Horsemen","authors":"Choton Basu","doi":"10.1080/15536548.2017.1422421","DOIUrl":"https://doi.org/10.1080/15536548.2017.1422421","url":null,"abstract":"ABSTRACT In this article, the author focuses on four key issues that are expected to impact the future of privacy and security. These have been labeled — the Four Horsemen, for obvious reasons. In our assessment, these topics or “horsemen” have the potential to change the fundamental tenets of our society. They impact our banking system, medical breakthroughs, use of the internet and web-enabled devices and services. Together, these topics touch the entire range of technical, regulatory, social, legal, and commercial issues. The Four Horsemen are Net Neutrality (and U.S. Internet Privacy Laws), Internet of Things (IoT), Human Genome (Medical), and Cryptocurrency.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"44 1","pages":"164 - 168"},"PeriodicalIF":0.8,"publicationDate":"2017-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78136757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Editorial Preface 编辑前言
IF 0.8 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2017-10-02 DOI: 10.1080/15536548.2017.1394724
Chuleeporn Changchit, K. Bagchi, Choton Basu
The last issue of the Journal of Information Privacy and Security (JIPS) for 2017 contains nine articles and one book review. The issue of privacy and security is increasingly important as we move toward a more technological future. The discussion of these articles focuses on the importance of the protection of personal information on the Internet and social network as well as the policies to help minimizing the misuse of data. In the Book Review section, Dr. Arslan reviews the book titled “The Complete Privacy & Security Desk Reference-Volume I Digital” by Michael Bazzell and Justin Carroll. More details are as follows: The first article titled “Future of Privacy and Security – The Four Horsemen” by Choton Basu, the founding editor of the JIPS. This article is a commentary on the future of the privacy and security field. In this article, the author looks at the four key issues could significantly shape the field and impact society in significant ways. The article discusses the topics of Net Neutrality (and US Internet Privacy Laws), Internet of Things, Human Genome (Medical), and Cryptocurrency. This is an opinion paper that is based on current topics, trends, discussions, events and also the editorial and review work done as the editors of JIPS over 12 years. Processing articles that impact technology, regulation, legal, social and policy has helped shape this vision. It is the author’s assessment that these four trends (each) have the potential to change society forever. The second article titled “A Study of Web Privacy Policies across Industries” by Razieh Nokhbeh Zaeem and K. Suzanne Barber brings to light the shocking rate at which industries misuse their customers Personal Identification Information (PII). The authors conducted studies on 600 companies and found similar trends in each company. The study revealed that companies often misuse their customers PII and some do not even have any privacy policies in place. Zaeem and Barber’s findings in these studies can be used to create better privacy policies for companies and help to educate customers on these policies. In the third article titled “Long-Term Market Implications of Data Breaches, Not”, the authors Russell Lange and Eric Burger assessed the impact of data breaches. They not only addressed the effects these breaches have on the company’s performance and the costs that come with the breach, but also focused on the toll it takes on the customers and peer companies. Citigroup conducted research into these breached companies and found that on average the impact did minimal damage to the companies, but still had negative effects on the company’s stock and performance. The fourth article titled “Who Uses Mobile Apps to Meet Strangers: The Roles of Core Traits and Surface Characteristics”. The authors Lixuan Zhang, Iryna Pentina, and Wendy Fox Kirk investigated the concept of social networking sites, specifically WeChat, a social networking site, that is highly popular in China. The aut
《信息隐私与安全杂志》2017年最后一期包含九篇文章和一篇书评。随着我们走向更加科技化的未来,隐私和安全问题变得越来越重要。这些文章的讨论重点是在互联网和社交网络上保护个人信息的重要性,以及帮助最大限度地减少数据滥用的政策。在书评部分,Arslan博士评论了Michael Bazzell和Justin Carroll所著的《完整的隐私与安全桌面参考-第一卷数字版》一书。详情如下:第一篇文章题为“隐私和安全的未来——四骑士”,作者是JIPS的创始编辑Choton Basu。这篇文章是对隐私和安全领域未来的评论。在这篇文章中,作者着眼于四个关键问题,这些问题可以显著地塑造该领域,并以重要的方式影响社会。本文讨论了网络中立性(和美国互联网隐私法)、物联网、人类基因组(医疗)和加密货币等主题。这是一份基于当前主题、趋势、讨论、事件以及JIPS编辑在12年来所做的编辑和审查工作的意见文件。处理影响技术、法规、法律、社会和政策的文章有助于形成这一愿景。这是作者的评估,这四个趋势(每一个)有可能永远改变社会。第二篇文章题为“跨行业网络隐私政策研究”,作者是Razieh Nokhbeh Zaeem和K. Suzanne Barber,它揭示了行业滥用客户个人身份信息(PII)的惊人速度。作者对600家公司进行了研究,发现每家公司都有类似的趋势。该研究显示,公司经常滥用客户的个人信息,有些公司甚至没有任何隐私政策。Zaeem和Barber在这些研究中的发现可以用来为公司制定更好的隐私政策,并帮助教育客户了解这些政策。在第三篇题为“数据泄露的长期市场影响,不是”的文章中,作者Russell Lange和Eric Burger评估了数据泄露的影响。他们不仅解决了这些违规行为对公司业绩的影响以及违规行为带来的成本,还关注了客户和同行公司所付出的代价。花旗集团(Citigroup)对这些被入侵的公司进行了研究,发现平均而言,这些影响对公司的损害最小,但仍对公司的股票和业绩产生了负面影响。第四篇文章的题目是“谁用手机应用来认识陌生人:核心特征和表面特征的作用”。作者Lixuan Zhang, Iryna Pentina和Wendy Fox Kirk调查了社交网站的概念,特别是b微信,一个在中国非常流行的社交网站。作者研究了个人如何与社交网络互动,并检查了使用b微信社交特征的个人的特征。他们发现,用户不仅上传自己的个人信息,如性别、感情状况和照片,他们还分享自己的位置。作者发现,由于这些信息是可用的,不幸的是,有跟踪、骚扰和强奸的案件。这项研究揭示了在社交网站上分享个人信息的巨大问题,这些作者强调,用户需要更多地意识到在这些网站上披露这些信息的潜在风险。
{"title":"Editorial Preface","authors":"Chuleeporn Changchit, K. Bagchi, Choton Basu","doi":"10.1080/15536548.2017.1394724","DOIUrl":"https://doi.org/10.1080/15536548.2017.1394724","url":null,"abstract":"The last issue of the Journal of Information Privacy and Security (JIPS) for 2017 contains nine articles and one book review. The issue of privacy and security is increasingly important as we move toward a more technological future. The discussion of these articles focuses on the importance of the protection of personal information on the Internet and social network as well as the policies to help minimizing the misuse of data. In the Book Review section, Dr. Arslan reviews the book titled “The Complete Privacy & Security Desk Reference-Volume I Digital” by Michael Bazzell and Justin Carroll. More details are as follows: The first article titled “Future of Privacy and Security – The Four Horsemen” by Choton Basu, the founding editor of the JIPS. This article is a commentary on the future of the privacy and security field. In this article, the author looks at the four key issues could significantly shape the field and impact society in significant ways. The article discusses the topics of Net Neutrality (and US Internet Privacy Laws), Internet of Things, Human Genome (Medical), and Cryptocurrency. This is an opinion paper that is based on current topics, trends, discussions, events and also the editorial and review work done as the editors of JIPS over 12 years. Processing articles that impact technology, regulation, legal, social and policy has helped shape this vision. It is the author’s assessment that these four trends (each) have the potential to change society forever. The second article titled “A Study of Web Privacy Policies across Industries” by Razieh Nokhbeh Zaeem and K. Suzanne Barber brings to light the shocking rate at which industries misuse their customers Personal Identification Information (PII). The authors conducted studies on 600 companies and found similar trends in each company. The study revealed that companies often misuse their customers PII and some do not even have any privacy policies in place. Zaeem and Barber’s findings in these studies can be used to create better privacy policies for companies and help to educate customers on these policies. In the third article titled “Long-Term Market Implications of Data Breaches, Not”, the authors Russell Lange and Eric Burger assessed the impact of data breaches. They not only addressed the effects these breaches have on the company’s performance and the costs that come with the breach, but also focused on the toll it takes on the customers and peer companies. Citigroup conducted research into these breached companies and found that on average the impact did minimal damage to the companies, but still had negative effects on the company’s stock and performance. The fourth article titled “Who Uses Mobile Apps to Meet Strangers: The Roles of Core Traits and Surface Characteristics”. The authors Lixuan Zhang, Iryna Pentina, and Wendy Fox Kirk investigated the concept of social networking sites, specifically WeChat, a social networking site, that is highly popular in China. The aut","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"34 1","pages":"161 - 163"},"PeriodicalIF":0.8,"publicationDate":"2017-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89476218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predicting information security policy compliance intentions and behavior for six employee-based risks 预测六种基于员工的风险的信息安全策略遵从意图和行为
IF 0.8 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2017-10-02 DOI: 10.1080/15536548.2017.1418632
T. Ryutov, Nicole D. Sintov, Mengtian Zhao, R. John
ABSTRACT Employees’ non-compliance with organizational information security policies poses a significant threat to organizations. Enhancing our understanding of compliance behavior is crucial for improving security. Although research has identified numerous psychological factors that affect intentions to comply with security policies, how such intentions map onto actual compliance behavior is not well understood. Building on a well-supported model of security policy compliance intentions, we evaluate compliance with each of six types of information security policies using decision vignettes, and compare parameters across models. The study contributes to information security compliance research by examining each risk separately and exploring heterogeneity across risk types.
员工不遵守组织的信息安全政策对组织构成了重大威胁。增强我们对遵从性行为的理解对于提高安全性至关重要。尽管研究已经确定了许多影响遵从安全策略的意图的心理因素,但是这些意图如何映射到实际的遵从行为还没有得到很好的理解。在一个得到良好支持的安全策略遵从意图模型的基础上,我们使用决策片段评估了六种类型的信息安全策略的遵从性,并比较了模型之间的参数。本研究通过对每一种风险进行单独考察,探索不同风险类型之间的异质性,为信息安全合规研究做出了贡献。
{"title":"Predicting information security policy compliance intentions and behavior for six employee-based risks","authors":"T. Ryutov, Nicole D. Sintov, Mengtian Zhao, R. John","doi":"10.1080/15536548.2017.1418632","DOIUrl":"https://doi.org/10.1080/15536548.2017.1418632","url":null,"abstract":"ABSTRACT Employees’ non-compliance with organizational information security policies poses a significant threat to organizations. Enhancing our understanding of compliance behavior is crucial for improving security. Although research has identified numerous psychological factors that affect intentions to comply with security policies, how such intentions map onto actual compliance behavior is not well understood. Building on a well-supported model of security policy compliance intentions, we evaluate compliance with each of six types of information security policies using decision vignettes, and compare parameters across models. The study contributes to information security compliance research by examining each risk separately and exploring heterogeneity across risk types.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"223 1","pages":"260 - 281"},"PeriodicalIF":0.8,"publicationDate":"2017-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81699830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Development of Internet of Things-Related Monitoring Policies 物联网监控政策的制定
IF 0.8 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2017-10-02 DOI: 10.1080/15536548.2017.1419014
G. Kaupins, Janet Stephens
ABSTRACT The Internet of Things (IoT) is a loosely defined term describing internet-connected sensors that among other capabilities enable companies to monitor individuals. New privacy-related challenges can arise when sensors communicate with each other. These challenges call for changes to corporate privacy policies to incorporate potential IoT issues and guidance. This research investigates existing privacy policies and IoT-related research to provide IoT privacy policy recommendations. Privacy policy questions include: Who or what is notified of monitoring? When and where should there be expectations of privacy? Why and how is user data collected and how should monitoring problems be communicated? The analysis concludes with IoT-related privacy policy recommendations.
物联网(IoT)是一个定义松散的术语,描述了互联网连接的传感器,除其他功能外,它使公司能够监控个人。当传感器相互通信时,可能会出现与隐私相关的新挑战。这些挑战要求企业改变隐私政策,纳入潜在的物联网问题和指导。本研究通过对现有隐私政策和物联网相关研究的调查,提出物联网隐私政策建议。隐私政策问题包括:监视通知了谁或什么?什么时候、什么地方应该有隐私保护?为什么以及如何收集用户数据?应该如何沟通监控问题?该分析最后提出了与物联网相关的隐私政策建议。
{"title":"Development of Internet of Things-Related Monitoring Policies","authors":"G. Kaupins, Janet Stephens","doi":"10.1080/15536548.2017.1419014","DOIUrl":"https://doi.org/10.1080/15536548.2017.1419014","url":null,"abstract":"ABSTRACT The Internet of Things (IoT) is a loosely defined term describing internet-connected sensors that among other capabilities enable companies to monitor individuals. New privacy-related challenges can arise when sensors communicate with each other. These challenges call for changes to corporate privacy policies to incorporate potential IoT issues and guidance. This research investigates existing privacy policies and IoT-related research to provide IoT privacy policy recommendations. Privacy policy questions include: Who or what is notified of monitoring? When and where should there be expectations of privacy? Why and how is user data collected and how should monitoring problems be communicated? The analysis concludes with IoT-related privacy policy recommendations.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"13 1","pages":"282 - 295"},"PeriodicalIF":0.8,"publicationDate":"2017-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75806555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Bazzell, M., & Carroll, J. (2016). The Complete Privacy & Security Desk Reference-Volume I Digital. United States of America: CreateSpace Independent Publishing Platform, 478 pp 巴泽尔,M.,卡罗尔,J.(2016)。完整的隐私和安全桌参考-卷1数字。美利坚合众国:CreateSpace独立出版平台,478页
IF 0.8 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2017-10-02 DOI: 10.1080/15536548.2017.1394060
Faruk Arslan
As I was writing this book review, the announcement about Equifax’s data breach, which affected about 143 million people, was dominating the daily discussions within United States. Following this major event, many institutions such as banks and credit reporting agencies were reaching out to their customers providing guidance as to how they can address identity theft issues, which may be caused by this data breach. The effect of these snippets of guidance on individuals’ privacy and security behavior remains to be evaluated. However, it is no secret that developing the digital security and privacy literacy of individuals has become a necessity given the massive digitization, storage, and processing of personal data by organizations worldwide. Within this context, Bazzell and Carroll’s book The Complete Privacy & Security Desk Reference-Volume I Digital is a welcome resource for a wide variety of audience. Reading the biography of both authors, one can easily note their vast amount of practical experience related to computer security, forensics, digital intelligence, and privacy. The content of their book reflects the accumulation of this practical experience. The authors categorized the content of the book into four levels of difficulty: i) basic, ii) intermediate, iii) advanced, and iv) expert, to appeal to a wide range of audience with a diverse set of interests and skill sets. They organized the material into an introduction, followed by 27 chapters, a conclusion, and an index. In the following section, I will provide a brief summary of these sections.
在我写这篇书评的时候,有关Equifax数据泄露的消息,影响了大约1.43亿人,在美国每天都是讨论的焦点。在这一重大事件之后,许多机构,如银行和信用报告机构,都在联系他们的客户,向他们提供指导,告诉他们如何解决可能由这次数据泄露引起的身份盗窃问题。这些指导对个人隐私和安全行为的影响仍有待评估。然而,鉴于全球组织对个人数据的大规模数字化、存储和处理,发展个人的数字安全和隐私素养已成为必要,这已不是什么秘密。在这种背景下,Bazzell和Carroll的书《完整的隐私和安全桌面参考-第一卷数字版》是一个受广泛读者欢迎的资源。阅读两位作者的传记,人们可以很容易地注意到他们在计算机安全、取证、数字智能和隐私方面的大量实践经验。他们的书的内容反映了这种实践经验的积累。作者将本书的内容分为四个难度级别:i)基本,ii)中级,iii)高级和iv)专家,以吸引具有不同兴趣和技能的广泛受众。他们将材料组织成引言,接着是27章、结论和索引。在下一节中,我将简要总结这些部分。
{"title":"Bazzell, M., & Carroll, J. (2016). The Complete Privacy & Security Desk Reference-Volume I Digital. United States of America: CreateSpace Independent Publishing Platform, 478 pp","authors":"Faruk Arslan","doi":"10.1080/15536548.2017.1394060","DOIUrl":"https://doi.org/10.1080/15536548.2017.1394060","url":null,"abstract":"As I was writing this book review, the announcement about Equifax’s data breach, which affected about 143 million people, was dominating the daily discussions within United States. Following this major event, many institutions such as banks and credit reporting agencies were reaching out to their customers providing guidance as to how they can address identity theft issues, which may be caused by this data breach. The effect of these snippets of guidance on individuals’ privacy and security behavior remains to be evaluated. However, it is no secret that developing the digital security and privacy literacy of individuals has become a necessity given the massive digitization, storage, and processing of personal data by organizations worldwide. Within this context, Bazzell and Carroll’s book The Complete Privacy & Security Desk Reference-Volume I Digital is a welcome resource for a wide variety of audience. Reading the biography of both authors, one can easily note their vast amount of practical experience related to computer security, forensics, digital intelligence, and privacy. The content of their book reflects the accumulation of this practical experience. The authors categorized the content of the book into four levels of difficulty: i) basic, ii) intermediate, iii) advanced, and iv) expert, to appeal to a wide range of audience with a diverse set of interests and skill sets. They organized the material into an introduction, followed by 27 chapters, a conclusion, and an index. In the following section, I will provide a brief summary of these sections.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"11 1","pages":"316 - 318"},"PeriodicalIF":0.8,"publicationDate":"2017-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74397442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Who uses mobile apps to meet strangers: The roles of core traits and surface characteristics 谁用手机应用与陌生人见面:核心特征和表面特征的作用
IF 0.8 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2017-10-02 DOI: 10.1080/15536548.2017.1394072
Lixuan Zhang, Iryna Pentina, Wendy Fox Kirk
ABSTRACT Digital space continues to be a popular venue for meeting new people. However, little is known about who uses mobile context-aware social networking apps to initiate new relationships. This study investigates the roles of individual core traits and surface characteristics in the adoption of social discovery features on WeChat, a mobile social networking app in China. Analysis of survey data collected from 213 WeChat users finds the core traits of agreeableness and neuroticism to be negatively related to the use of these social discovery features. The surface characteristic of sensation seeking is positively related to the use of social discovery features, while the surface characteristic of loneliness is not. Based on the findings, directions for future research and implications for app developers and marketers are suggested.
数字空间一直是结识新朋友的热门场所。然而,很少有人知道是谁在使用情境感知的移动社交网络应用来建立新关系。本研究探讨了个人核心特征和表面特征在中国移动社交网络应用微信社交发现功能采用中的作用。对213名微信用户的调查数据分析发现,亲和性和神经质的核心特征与这些社交发现功能的使用呈负相关。感觉寻求的表面特征与社交发现特征的使用呈正相关,而孤独感的表面特征与社交发现特征的使用呈正相关。根据研究结果,提出了未来研究的方向以及对应用程序开发者和营销人员的启示。
{"title":"Who uses mobile apps to meet strangers: The roles of core traits and surface characteristics","authors":"Lixuan Zhang, Iryna Pentina, Wendy Fox Kirk","doi":"10.1080/15536548.2017.1394072","DOIUrl":"https://doi.org/10.1080/15536548.2017.1394072","url":null,"abstract":"ABSTRACT Digital space continues to be a popular venue for meeting new people. However, little is known about who uses mobile context-aware social networking apps to initiate new relationships. This study investigates the roles of individual core traits and surface characteristics in the adoption of social discovery features on WeChat, a mobile social networking app in China. Analysis of survey data collected from 213 WeChat users finds the core traits of agreeableness and neuroticism to be negatively related to the use of these social discovery features. The surface characteristic of sensation seeking is positively related to the use of social discovery features, while the surface characteristic of loneliness is not. Based on the findings, directions for future research and implications for app developers and marketers are suggested.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"72 5 1","pages":"207 - 225"},"PeriodicalIF":0.8,"publicationDate":"2017-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83665706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Cultural and Generational Influences on Information Privacy Concerns within Online Social Networks: An Empirical Evaluation of the Miltgen and Peyrat-Guillard Model 在线社交网络中对信息隐私关注的文化和代际影响:对Miltgen和Peyrat-Guillard模型的实证评估
IF 0.8 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2017-10-02 DOI: 10.1080/15536548.2017.1412114
Faruk Arslan, Niharika Dayyala
ABSTRACT Growing use of the data generated via online social networking sites (SNS) for big data analytics renders the topic of information privacy as a critical concern and calls for a deeper investigation of individuals’ information privacy beliefs and behaviors. The primary goal of our research is to empirically test the effectiveness of the Miltgen and Peyrat-Guillard model in explaining the information privacy behavior of social network site users using a large-N sample from the European Union (EU). Results from the factor-based partial least squares - structural equation modeling (PLS-SEM) analysis provide partial support to this model. We elaborate on enhancements and discuss possible extensions to the model.
越来越多地使用在线社交网站(SNS)生成的数据进行大数据分析,使得信息隐私成为一个关键问题,并要求对个人的信息隐私信念和行为进行更深入的研究。本研究的主要目的是利用来自欧盟(EU)的大n样本,实证检验Miltgen和Peyrat-Guillard模型在解释社交网站用户信息隐私行为方面的有效性。基于因子的偏最小二乘-结构方程模型(PLS-SEM)分析结果为该模型提供了部分支持。我们详细介绍了增强功能并讨论了模型的可能扩展。
{"title":"Cultural and Generational Influences on Information Privacy Concerns within Online Social Networks: An Empirical Evaluation of the Miltgen and Peyrat-Guillard Model","authors":"Faruk Arslan, Niharika Dayyala","doi":"10.1080/15536548.2017.1412114","DOIUrl":"https://doi.org/10.1080/15536548.2017.1412114","url":null,"abstract":"ABSTRACT Growing use of the data generated via online social networking sites (SNS) for big data analytics renders the topic of information privacy as a critical concern and calls for a deeper investigation of individuals’ information privacy beliefs and behaviors. The primary goal of our research is to empirically test the effectiveness of the Miltgen and Peyrat-Guillard model in explaining the information privacy behavior of social network site users using a large-N sample from the European Union (EU). Results from the factor-based partial least squares - structural equation modeling (PLS-SEM) analysis provide partial support to this model. We elaborate on enhancements and discuss possible extensions to the model.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"13 1","pages":"238 - 259"},"PeriodicalIF":0.8,"publicationDate":"2017-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80284987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
International Journal of Information Security and Privacy
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1