首页 > 最新文献

International Journal of Information Security and Privacy最新文献

英文 中文
CSMCSM CSMCSM
IF 0.8 Q3 Computer Science Pub Date : 2021-01-01 DOI: 10.4018/ijisp.2021010103
H. Salama, Mohamed Zaki Abd El Mageed, G. Salama, K. Badran
Many MANET research works are based on the popular informal definition that MANET is a wireless ad-hoc network that has neither infrastructure nor backbone and every network node is autonomous and moves depending on its mobility. Unfortunately, this definition pays no attention to the network servers that are essential in core-based, mission-critical, and military MANETs. In core-based MANETs, external intrusion detection systems (IDS) cannot detect internal Byzantine attacks; in addition, internal Byzantine fault tolerant (BFT) systems are unqualified to detect typical external wireless attack. Therefore, there is a real need to combine both internal and external mobile ad-hoc network (MANET) ID systems. Here, CSMCSM is presented as a two-level client server model for comprehensive security in MANETs that integrates internal and external attack detectors in one device. The internal component is based on a BFT consensus algorithm while the external component employs decision tree to classify the MANET attacks.
许多MANET研究工作都是基于一种流行的非正式定义,即MANET是一种既没有基础设施也没有骨干网的无线自组织网络,每个网络节点都是自主的,并根据其移动性进行移动。不幸的是,这个定义没有注意到在基于核心的、关键任务的和军用manet中必不可少的网络服务器。在基于核心的manet中,外部入侵检测系统(IDS)无法检测到内部拜占庭攻击;此外,内部拜占庭容错(BFT)系统无法检测到典型的外部无线攻击。因此,确实需要将内部和外部移动自组织网络(MANET) ID系统结合起来。在这里,CSMCSM作为两级客户端服务器模型提出,用于manet中的综合安全性,该模型将内部和外部攻击检测器集成在一个设备中。内部组件基于BFT一致性算法,外部组件采用决策树对MANET攻击进行分类。
{"title":"CSMCSM","authors":"H. Salama, Mohamed Zaki Abd El Mageed, G. Salama, K. Badran","doi":"10.4018/ijisp.2021010103","DOIUrl":"https://doi.org/10.4018/ijisp.2021010103","url":null,"abstract":"Many MANET research works are based on the popular informal definition that MANET is a wireless ad-hoc network that has neither infrastructure nor backbone and every network node is autonomous and moves depending on its mobility. Unfortunately, this definition pays no attention to the network servers that are essential in core-based, mission-critical, and military MANETs. In core-based MANETs, external intrusion detection systems (IDS) cannot detect internal Byzantine attacks; in addition, internal Byzantine fault tolerant (BFT) systems are unqualified to detect typical external wireless attack. Therefore, there is a real need to combine both internal and external mobile ad-hoc network (MANET) ID systems. Here, CSMCSM is presented as a two-level client server model for comprehensive security in MANETs that integrates internal and external attack detectors in one device. The internal component is based on a BFT consensus algorithm while the external component employs decision tree to classify the MANET attacks.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88702433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Information Security and Privacy: 26th Australasian Conference, ACISP 2021, Virtual Event, December 1–3, 2021, Proceedings 信息安全和隐私:第26届澳大拉西亚会议,ACISP 2021,虚拟事件,2021年12月1日至3日,论文集
IF 0.8 Q3 Computer Science Pub Date : 2021-01-01 DOI: 10.1007/978-3-030-90567-5
{"title":"Information Security and Privacy: 26th Australasian Conference, ACISP 2021, Virtual Event, December 1–3, 2021, Proceedings","authors":"","doi":"10.1007/978-3-030-90567-5","DOIUrl":"https://doi.org/10.1007/978-3-030-90567-5","url":null,"abstract":"","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75685007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Information Security and Privacy: 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 – December 2, 2020, Proceedings 信息安全和隐私:第25届澳大利亚会议,ACISP 2020,珀斯,澳大利亚,2020年11月30日至12月2日,会议录
IF 0.8 Q3 Computer Science Pub Date : 2020-01-01 DOI: 10.1007/978-3-030-55304-3
Joseph K. Liu, Hui Cui, E. Bertino
{"title":"Information Security and Privacy: 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 – December 2, 2020, Proceedings","authors":"Joseph K. Liu, Hui Cui, E. Bertino","doi":"10.1007/978-3-030-55304-3","DOIUrl":"https://doi.org/10.1007/978-3-030-55304-3","url":null,"abstract":"","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85529143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Correction to: Fast Lottery-Based Micropayments for Decentralized Currencies 更正:去中心化货币的基于彩票的快速小额支付
IF 0.8 Q3 Computer Science Pub Date : 2018-07-11 DOI: 10.1007/978-3-319-93638-3_52
Kexin Hu, Zhenfeng Zhang
{"title":"Correction to: Fast Lottery-Based Micropayments for Decentralized Currencies","authors":"Kexin Hu, Zhenfeng Zhang","doi":"10.1007/978-3-319-93638-3_52","DOIUrl":"https://doi.org/10.1007/978-3-319-93638-3_52","url":null,"abstract":"","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2018-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79794030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information Security and Privacy: 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings 信息安全与隐私:第23届澳大拉西亚会议,ACISP 2018,卧龙岗,新南威尔士州,澳大利亚,2018年7月11-13日,会议记录
IF 0.8 Q3 Computer Science Pub Date : 2018-01-01 DOI: 10.1007/978-3-319-93638-3
W. Susilo, Guomin Yang, G. Goos, J. Hartmanis, J. Leeuwen, David Hutchison
{"title":"Information Security and Privacy: 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings","authors":"W. Susilo, Guomin Yang, G. Goos, J. Hartmanis, J. Leeuwen, David Hutchison","doi":"10.1007/978-3-319-93638-3","DOIUrl":"https://doi.org/10.1007/978-3-319-93638-3","url":null,"abstract":"","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88921199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Future of privacy and security – the Four Horsemen 隐私和安全的未来——四骑士
IF 0.8 Q3 Computer Science Pub Date : 2017-10-02 DOI: 10.1080/15536548.2017.1422421
Choton Basu
ABSTRACT In this article, the author focuses on four key issues that are expected to impact the future of privacy and security. These have been labeled — the Four Horsemen, for obvious reasons. In our assessment, these topics or “horsemen” have the potential to change the fundamental tenets of our society. They impact our banking system, medical breakthroughs, use of the internet and web-enabled devices and services. Together, these topics touch the entire range of technical, regulatory, social, legal, and commercial issues. The Four Horsemen are Net Neutrality (and U.S. Internet Privacy Laws), Internet of Things (IoT), Human Genome (Medical), and Cryptocurrency.
在这篇文章中,作者重点讨论了四个有望影响隐私和安全未来的关键问题。他们被贴上了四骑士的标签,原因很明显。在我们的评估中,这些话题或“骑士”有可能改变我们社会的基本原则。它们影响着我们的银行系统、医疗突破、互联网和网络设备和服务的使用。总之,这些主题涉及技术、监管、社会、法律和商业问题的整个范围。四大骑士分别是网络中立性(和美国互联网隐私法)、物联网(IoT)、人类基因组(医疗)和加密货币。
{"title":"Future of privacy and security – the Four Horsemen","authors":"Choton Basu","doi":"10.1080/15536548.2017.1422421","DOIUrl":"https://doi.org/10.1080/15536548.2017.1422421","url":null,"abstract":"ABSTRACT In this article, the author focuses on four key issues that are expected to impact the future of privacy and security. These have been labeled — the Four Horsemen, for obvious reasons. In our assessment, these topics or “horsemen” have the potential to change the fundamental tenets of our society. They impact our banking system, medical breakthroughs, use of the internet and web-enabled devices and services. Together, these topics touch the entire range of technical, regulatory, social, legal, and commercial issues. The Four Horsemen are Net Neutrality (and U.S. Internet Privacy Laws), Internet of Things (IoT), Human Genome (Medical), and Cryptocurrency.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2017-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78136757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predicting information security policy compliance intentions and behavior for six employee-based risks 预测六种基于员工的风险的信息安全策略遵从意图和行为
IF 0.8 Q3 Computer Science Pub Date : 2017-10-02 DOI: 10.1080/15536548.2017.1418632
T. Ryutov, Nicole D. Sintov, Mengtian Zhao, R. John
ABSTRACT Employees’ non-compliance with organizational information security policies poses a significant threat to organizations. Enhancing our understanding of compliance behavior is crucial for improving security. Although research has identified numerous psychological factors that affect intentions to comply with security policies, how such intentions map onto actual compliance behavior is not well understood. Building on a well-supported model of security policy compliance intentions, we evaluate compliance with each of six types of information security policies using decision vignettes, and compare parameters across models. The study contributes to information security compliance research by examining each risk separately and exploring heterogeneity across risk types.
员工不遵守组织的信息安全政策对组织构成了重大威胁。增强我们对遵从性行为的理解对于提高安全性至关重要。尽管研究已经确定了许多影响遵从安全策略的意图的心理因素,但是这些意图如何映射到实际的遵从行为还没有得到很好的理解。在一个得到良好支持的安全策略遵从意图模型的基础上,我们使用决策片段评估了六种类型的信息安全策略的遵从性,并比较了模型之间的参数。本研究通过对每一种风险进行单独考察,探索不同风险类型之间的异质性,为信息安全合规研究做出了贡献。
{"title":"Predicting information security policy compliance intentions and behavior for six employee-based risks","authors":"T. Ryutov, Nicole D. Sintov, Mengtian Zhao, R. John","doi":"10.1080/15536548.2017.1418632","DOIUrl":"https://doi.org/10.1080/15536548.2017.1418632","url":null,"abstract":"ABSTRACT Employees’ non-compliance with organizational information security policies poses a significant threat to organizations. Enhancing our understanding of compliance behavior is crucial for improving security. Although research has identified numerous psychological factors that affect intentions to comply with security policies, how such intentions map onto actual compliance behavior is not well understood. Building on a well-supported model of security policy compliance intentions, we evaluate compliance with each of six types of information security policies using decision vignettes, and compare parameters across models. The study contributes to information security compliance research by examining each risk separately and exploring heterogeneity across risk types.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2017-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81699830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Editorial Preface 编辑前言
IF 0.8 Q3 Computer Science Pub Date : 2017-10-02 DOI: 10.1080/15536548.2017.1394724
Chuleeporn Changchit, K. Bagchi, Choton Basu
The last issue of the Journal of Information Privacy and Security (JIPS) for 2017 contains nine articles and one book review. The issue of privacy and security is increasingly important as we move toward a more technological future. The discussion of these articles focuses on the importance of the protection of personal information on the Internet and social network as well as the policies to help minimizing the misuse of data. In the Book Review section, Dr. Arslan reviews the book titled “The Complete Privacy & Security Desk Reference-Volume I Digital” by Michael Bazzell and Justin Carroll. More details are as follows: The first article titled “Future of Privacy and Security – The Four Horsemen” by Choton Basu, the founding editor of the JIPS. This article is a commentary on the future of the privacy and security field. In this article, the author looks at the four key issues could significantly shape the field and impact society in significant ways. The article discusses the topics of Net Neutrality (and US Internet Privacy Laws), Internet of Things, Human Genome (Medical), and Cryptocurrency. This is an opinion paper that is based on current topics, trends, discussions, events and also the editorial and review work done as the editors of JIPS over 12 years. Processing articles that impact technology, regulation, legal, social and policy has helped shape this vision. It is the author’s assessment that these four trends (each) have the potential to change society forever. The second article titled “A Study of Web Privacy Policies across Industries” by Razieh Nokhbeh Zaeem and K. Suzanne Barber brings to light the shocking rate at which industries misuse their customers Personal Identification Information (PII). The authors conducted studies on 600 companies and found similar trends in each company. The study revealed that companies often misuse their customers PII and some do not even have any privacy policies in place. Zaeem and Barber’s findings in these studies can be used to create better privacy policies for companies and help to educate customers on these policies. In the third article titled “Long-Term Market Implications of Data Breaches, Not”, the authors Russell Lange and Eric Burger assessed the impact of data breaches. They not only addressed the effects these breaches have on the company’s performance and the costs that come with the breach, but also focused on the toll it takes on the customers and peer companies. Citigroup conducted research into these breached companies and found that on average the impact did minimal damage to the companies, but still had negative effects on the company’s stock and performance. The fourth article titled “Who Uses Mobile Apps to Meet Strangers: The Roles of Core Traits and Surface Characteristics”. The authors Lixuan Zhang, Iryna Pentina, and Wendy Fox Kirk investigated the concept of social networking sites, specifically WeChat, a social networking site, that is highly popular in China. The aut
《信息隐私与安全杂志》2017年最后一期包含九篇文章和一篇书评。随着我们走向更加科技化的未来,隐私和安全问题变得越来越重要。这些文章的讨论重点是在互联网和社交网络上保护个人信息的重要性,以及帮助最大限度地减少数据滥用的政策。在书评部分,Arslan博士评论了Michael Bazzell和Justin Carroll所著的《完整的隐私与安全桌面参考-第一卷数字版》一书。详情如下:第一篇文章题为“隐私和安全的未来——四骑士”,作者是JIPS的创始编辑Choton Basu。这篇文章是对隐私和安全领域未来的评论。在这篇文章中,作者着眼于四个关键问题,这些问题可以显著地塑造该领域,并以重要的方式影响社会。本文讨论了网络中立性(和美国互联网隐私法)、物联网、人类基因组(医疗)和加密货币等主题。这是一份基于当前主题、趋势、讨论、事件以及JIPS编辑在12年来所做的编辑和审查工作的意见文件。处理影响技术、法规、法律、社会和政策的文章有助于形成这一愿景。这是作者的评估,这四个趋势(每一个)有可能永远改变社会。第二篇文章题为“跨行业网络隐私政策研究”,作者是Razieh Nokhbeh Zaeem和K. Suzanne Barber,它揭示了行业滥用客户个人身份信息(PII)的惊人速度。作者对600家公司进行了研究,发现每家公司都有类似的趋势。该研究显示,公司经常滥用客户的个人信息,有些公司甚至没有任何隐私政策。Zaeem和Barber在这些研究中的发现可以用来为公司制定更好的隐私政策,并帮助教育客户了解这些政策。在第三篇题为“数据泄露的长期市场影响,不是”的文章中,作者Russell Lange和Eric Burger评估了数据泄露的影响。他们不仅解决了这些违规行为对公司业绩的影响以及违规行为带来的成本,还关注了客户和同行公司所付出的代价。花旗集团(Citigroup)对这些被入侵的公司进行了研究,发现平均而言,这些影响对公司的损害最小,但仍对公司的股票和业绩产生了负面影响。第四篇文章的题目是“谁用手机应用来认识陌生人:核心特征和表面特征的作用”。作者Lixuan Zhang, Iryna Pentina和Wendy Fox Kirk调查了社交网站的概念,特别是b微信,一个在中国非常流行的社交网站。作者研究了个人如何与社交网络互动,并检查了使用b微信社交特征的个人的特征。他们发现,用户不仅上传自己的个人信息,如性别、感情状况和照片,他们还分享自己的位置。作者发现,由于这些信息是可用的,不幸的是,有跟踪、骚扰和强奸的案件。这项研究揭示了在社交网站上分享个人信息的巨大问题,这些作者强调,用户需要更多地意识到在这些网站上披露这些信息的潜在风险。
{"title":"Editorial Preface","authors":"Chuleeporn Changchit, K. Bagchi, Choton Basu","doi":"10.1080/15536548.2017.1394724","DOIUrl":"https://doi.org/10.1080/15536548.2017.1394724","url":null,"abstract":"The last issue of the Journal of Information Privacy and Security (JIPS) for 2017 contains nine articles and one book review. The issue of privacy and security is increasingly important as we move toward a more technological future. The discussion of these articles focuses on the importance of the protection of personal information on the Internet and social network as well as the policies to help minimizing the misuse of data. In the Book Review section, Dr. Arslan reviews the book titled “The Complete Privacy & Security Desk Reference-Volume I Digital” by Michael Bazzell and Justin Carroll. More details are as follows: The first article titled “Future of Privacy and Security – The Four Horsemen” by Choton Basu, the founding editor of the JIPS. This article is a commentary on the future of the privacy and security field. In this article, the author looks at the four key issues could significantly shape the field and impact society in significant ways. The article discusses the topics of Net Neutrality (and US Internet Privacy Laws), Internet of Things, Human Genome (Medical), and Cryptocurrency. This is an opinion paper that is based on current topics, trends, discussions, events and also the editorial and review work done as the editors of JIPS over 12 years. Processing articles that impact technology, regulation, legal, social and policy has helped shape this vision. It is the author’s assessment that these four trends (each) have the potential to change society forever. The second article titled “A Study of Web Privacy Policies across Industries” by Razieh Nokhbeh Zaeem and K. Suzanne Barber brings to light the shocking rate at which industries misuse their customers Personal Identification Information (PII). The authors conducted studies on 600 companies and found similar trends in each company. The study revealed that companies often misuse their customers PII and some do not even have any privacy policies in place. Zaeem and Barber’s findings in these studies can be used to create better privacy policies for companies and help to educate customers on these policies. In the third article titled “Long-Term Market Implications of Data Breaches, Not”, the authors Russell Lange and Eric Burger assessed the impact of data breaches. They not only addressed the effects these breaches have on the company’s performance and the costs that come with the breach, but also focused on the toll it takes on the customers and peer companies. Citigroup conducted research into these breached companies and found that on average the impact did minimal damage to the companies, but still had negative effects on the company’s stock and performance. The fourth article titled “Who Uses Mobile Apps to Meet Strangers: The Roles of Core Traits and Surface Characteristics”. The authors Lixuan Zhang, Iryna Pentina, and Wendy Fox Kirk investigated the concept of social networking sites, specifically WeChat, a social networking site, that is highly popular in China. The aut","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2017-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89476218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of Internet of Things-Related Monitoring Policies 物联网监控政策的制定
IF 0.8 Q3 Computer Science Pub Date : 2017-10-02 DOI: 10.1080/15536548.2017.1419014
G. Kaupins, Janet Stephens
ABSTRACT The Internet of Things (IoT) is a loosely defined term describing internet-connected sensors that among other capabilities enable companies to monitor individuals. New privacy-related challenges can arise when sensors communicate with each other. These challenges call for changes to corporate privacy policies to incorporate potential IoT issues and guidance. This research investigates existing privacy policies and IoT-related research to provide IoT privacy policy recommendations. Privacy policy questions include: Who or what is notified of monitoring? When and where should there be expectations of privacy? Why and how is user data collected and how should monitoring problems be communicated? The analysis concludes with IoT-related privacy policy recommendations.
物联网(IoT)是一个定义松散的术语,描述了互联网连接的传感器,除其他功能外,它使公司能够监控个人。当传感器相互通信时,可能会出现与隐私相关的新挑战。这些挑战要求企业改变隐私政策,纳入潜在的物联网问题和指导。本研究通过对现有隐私政策和物联网相关研究的调查,提出物联网隐私政策建议。隐私政策问题包括:监视通知了谁或什么?什么时候、什么地方应该有隐私保护?为什么以及如何收集用户数据?应该如何沟通监控问题?该分析最后提出了与物联网相关的隐私政策建议。
{"title":"Development of Internet of Things-Related Monitoring Policies","authors":"G. Kaupins, Janet Stephens","doi":"10.1080/15536548.2017.1419014","DOIUrl":"https://doi.org/10.1080/15536548.2017.1419014","url":null,"abstract":"ABSTRACT The Internet of Things (IoT) is a loosely defined term describing internet-connected sensors that among other capabilities enable companies to monitor individuals. New privacy-related challenges can arise when sensors communicate with each other. These challenges call for changes to corporate privacy policies to incorporate potential IoT issues and guidance. This research investigates existing privacy policies and IoT-related research to provide IoT privacy policy recommendations. Privacy policy questions include: Who or what is notified of monitoring? When and where should there be expectations of privacy? Why and how is user data collected and how should monitoring problems be communicated? The analysis concludes with IoT-related privacy policy recommendations.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2017-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75806555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Who uses mobile apps to meet strangers: The roles of core traits and surface characteristics 谁用手机应用与陌生人见面:核心特征和表面特征的作用
IF 0.8 Q3 Computer Science Pub Date : 2017-10-02 DOI: 10.1080/15536548.2017.1394072
Lixuan Zhang, Iryna Pentina, Wendy Fox Kirk
ABSTRACT Digital space continues to be a popular venue for meeting new people. However, little is known about who uses mobile context-aware social networking apps to initiate new relationships. This study investigates the roles of individual core traits and surface characteristics in the adoption of social discovery features on WeChat, a mobile social networking app in China. Analysis of survey data collected from 213 WeChat users finds the core traits of agreeableness and neuroticism to be negatively related to the use of these social discovery features. The surface characteristic of sensation seeking is positively related to the use of social discovery features, while the surface characteristic of loneliness is not. Based on the findings, directions for future research and implications for app developers and marketers are suggested.
数字空间一直是结识新朋友的热门场所。然而,很少有人知道是谁在使用情境感知的移动社交网络应用来建立新关系。本研究探讨了个人核心特征和表面特征在中国移动社交网络应用微信社交发现功能采用中的作用。对213名微信用户的调查数据分析发现,亲和性和神经质的核心特征与这些社交发现功能的使用呈负相关。感觉寻求的表面特征与社交发现特征的使用呈正相关,而孤独感的表面特征与社交发现特征的使用呈正相关。根据研究结果,提出了未来研究的方向以及对应用程序开发者和营销人员的启示。
{"title":"Who uses mobile apps to meet strangers: The roles of core traits and surface characteristics","authors":"Lixuan Zhang, Iryna Pentina, Wendy Fox Kirk","doi":"10.1080/15536548.2017.1394072","DOIUrl":"https://doi.org/10.1080/15536548.2017.1394072","url":null,"abstract":"ABSTRACT Digital space continues to be a popular venue for meeting new people. However, little is known about who uses mobile context-aware social networking apps to initiate new relationships. This study investigates the roles of individual core traits and surface characteristics in the adoption of social discovery features on WeChat, a mobile social networking app in China. Analysis of survey data collected from 213 WeChat users finds the core traits of agreeableness and neuroticism to be negatively related to the use of these social discovery features. The surface characteristic of sensation seeking is positively related to the use of social discovery features, while the surface characteristic of loneliness is not. Based on the findings, directions for future research and implications for app developers and marketers are suggested.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2017-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83665706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
International Journal of Information Security and Privacy
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1