Pub Date : 2021-01-01DOI: 10.4018/ijisp.2021010103
H. Salama, Mohamed Zaki Abd El Mageed, G. Salama, K. Badran
Many MANET research works are based on the popular informal definition that MANET is a wireless ad-hoc network that has neither infrastructure nor backbone and every network node is autonomous and moves depending on its mobility. Unfortunately, this definition pays no attention to the network servers that are essential in core-based, mission-critical, and military MANETs. In core-based MANETs, external intrusion detection systems (IDS) cannot detect internal Byzantine attacks; in addition, internal Byzantine fault tolerant (BFT) systems are unqualified to detect typical external wireless attack. Therefore, there is a real need to combine both internal and external mobile ad-hoc network (MANET) ID systems. Here, CSMCSM is presented as a two-level client server model for comprehensive security in MANETs that integrates internal and external attack detectors in one device. The internal component is based on a BFT consensus algorithm while the external component employs decision tree to classify the MANET attacks.
{"title":"CSMCSM","authors":"H. Salama, Mohamed Zaki Abd El Mageed, G. Salama, K. Badran","doi":"10.4018/ijisp.2021010103","DOIUrl":"https://doi.org/10.4018/ijisp.2021010103","url":null,"abstract":"Many MANET research works are based on the popular informal definition that MANET is a wireless ad-hoc network that has neither infrastructure nor backbone and every network node is autonomous and moves depending on its mobility. Unfortunately, this definition pays no attention to the network servers that are essential in core-based, mission-critical, and military MANETs. In core-based MANETs, external intrusion detection systems (IDS) cannot detect internal Byzantine attacks; in addition, internal Byzantine fault tolerant (BFT) systems are unqualified to detect typical external wireless attack. Therefore, there is a real need to combine both internal and external mobile ad-hoc network (MANET) ID systems. Here, CSMCSM is presented as a two-level client server model for comprehensive security in MANETs that integrates internal and external attack detectors in one device. The internal component is based on a BFT consensus algorithm while the external component employs decision tree to classify the MANET attacks.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88702433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-01DOI: 10.1007/978-3-030-90567-5
{"title":"Information Security and Privacy: 26th Australasian Conference, ACISP 2021, Virtual Event, December 1–3, 2021, Proceedings","authors":"","doi":"10.1007/978-3-030-90567-5","DOIUrl":"https://doi.org/10.1007/978-3-030-90567-5","url":null,"abstract":"","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75685007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-01DOI: 10.1007/978-3-030-55304-3
Joseph K. Liu, Hui Cui, E. Bertino
{"title":"Information Security and Privacy: 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 – December 2, 2020, Proceedings","authors":"Joseph K. Liu, Hui Cui, E. Bertino","doi":"10.1007/978-3-030-55304-3","DOIUrl":"https://doi.org/10.1007/978-3-030-55304-3","url":null,"abstract":"","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85529143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-11DOI: 10.1007/978-3-319-93638-3_52
Kexin Hu, Zhenfeng Zhang
{"title":"Correction to: Fast Lottery-Based Micropayments for Decentralized Currencies","authors":"Kexin Hu, Zhenfeng Zhang","doi":"10.1007/978-3-319-93638-3_52","DOIUrl":"https://doi.org/10.1007/978-3-319-93638-3_52","url":null,"abstract":"","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2018-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79794030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-01-01DOI: 10.1007/978-3-319-93638-3
W. Susilo, Guomin Yang, G. Goos, J. Hartmanis, J. Leeuwen, David Hutchison
{"title":"Information Security and Privacy: 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings","authors":"W. Susilo, Guomin Yang, G. Goos, J. Hartmanis, J. Leeuwen, David Hutchison","doi":"10.1007/978-3-319-93638-3","DOIUrl":"https://doi.org/10.1007/978-3-319-93638-3","url":null,"abstract":"","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88921199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-02DOI: 10.1080/15536548.2017.1422421
Choton Basu
ABSTRACT In this article, the author focuses on four key issues that are expected to impact the future of privacy and security. These have been labeled — the Four Horsemen, for obvious reasons. In our assessment, these topics or “horsemen” have the potential to change the fundamental tenets of our society. They impact our banking system, medical breakthroughs, use of the internet and web-enabled devices and services. Together, these topics touch the entire range of technical, regulatory, social, legal, and commercial issues. The Four Horsemen are Net Neutrality (and U.S. Internet Privacy Laws), Internet of Things (IoT), Human Genome (Medical), and Cryptocurrency.
{"title":"Future of privacy and security – the Four Horsemen","authors":"Choton Basu","doi":"10.1080/15536548.2017.1422421","DOIUrl":"https://doi.org/10.1080/15536548.2017.1422421","url":null,"abstract":"ABSTRACT In this article, the author focuses on four key issues that are expected to impact the future of privacy and security. These have been labeled — the Four Horsemen, for obvious reasons. In our assessment, these topics or “horsemen” have the potential to change the fundamental tenets of our society. They impact our banking system, medical breakthroughs, use of the internet and web-enabled devices and services. Together, these topics touch the entire range of technical, regulatory, social, legal, and commercial issues. The Four Horsemen are Net Neutrality (and U.S. Internet Privacy Laws), Internet of Things (IoT), Human Genome (Medical), and Cryptocurrency.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2017-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78136757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-02DOI: 10.1080/15536548.2017.1418632
T. Ryutov, Nicole D. Sintov, Mengtian Zhao, R. John
ABSTRACT Employees’ non-compliance with organizational information security policies poses a significant threat to organizations. Enhancing our understanding of compliance behavior is crucial for improving security. Although research has identified numerous psychological factors that affect intentions to comply with security policies, how such intentions map onto actual compliance behavior is not well understood. Building on a well-supported model of security policy compliance intentions, we evaluate compliance with each of six types of information security policies using decision vignettes, and compare parameters across models. The study contributes to information security compliance research by examining each risk separately and exploring heterogeneity across risk types.
{"title":"Predicting information security policy compliance intentions and behavior for six employee-based risks","authors":"T. Ryutov, Nicole D. Sintov, Mengtian Zhao, R. John","doi":"10.1080/15536548.2017.1418632","DOIUrl":"https://doi.org/10.1080/15536548.2017.1418632","url":null,"abstract":"ABSTRACT Employees’ non-compliance with organizational information security policies poses a significant threat to organizations. Enhancing our understanding of compliance behavior is crucial for improving security. Although research has identified numerous psychological factors that affect intentions to comply with security policies, how such intentions map onto actual compliance behavior is not well understood. Building on a well-supported model of security policy compliance intentions, we evaluate compliance with each of six types of information security policies using decision vignettes, and compare parameters across models. The study contributes to information security compliance research by examining each risk separately and exploring heterogeneity across risk types.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2017-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81699830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-02DOI: 10.1080/15536548.2017.1394724
Chuleeporn Changchit, K. Bagchi, Choton Basu
The last issue of the Journal of Information Privacy and Security (JIPS) for 2017 contains nine articles and one book review. The issue of privacy and security is increasingly important as we move toward a more technological future. The discussion of these articles focuses on the importance of the protection of personal information on the Internet and social network as well as the policies to help minimizing the misuse of data. In the Book Review section, Dr. Arslan reviews the book titled “The Complete Privacy & Security Desk Reference-Volume I Digital” by Michael Bazzell and Justin Carroll. More details are as follows: The first article titled “Future of Privacy and Security – The Four Horsemen” by Choton Basu, the founding editor of the JIPS. This article is a commentary on the future of the privacy and security field. In this article, the author looks at the four key issues could significantly shape the field and impact society in significant ways. The article discusses the topics of Net Neutrality (and US Internet Privacy Laws), Internet of Things, Human Genome (Medical), and Cryptocurrency. This is an opinion paper that is based on current topics, trends, discussions, events and also the editorial and review work done as the editors of JIPS over 12 years. Processing articles that impact technology, regulation, legal, social and policy has helped shape this vision. It is the author’s assessment that these four trends (each) have the potential to change society forever. The second article titled “A Study of Web Privacy Policies across Industries” by Razieh Nokhbeh Zaeem and K. Suzanne Barber brings to light the shocking rate at which industries misuse their customers Personal Identification Information (PII). The authors conducted studies on 600 companies and found similar trends in each company. The study revealed that companies often misuse their customers PII and some do not even have any privacy policies in place. Zaeem and Barber’s findings in these studies can be used to create better privacy policies for companies and help to educate customers on these policies. In the third article titled “Long-Term Market Implications of Data Breaches, Not”, the authors Russell Lange and Eric Burger assessed the impact of data breaches. They not only addressed the effects these breaches have on the company’s performance and the costs that come with the breach, but also focused on the toll it takes on the customers and peer companies. Citigroup conducted research into these breached companies and found that on average the impact did minimal damage to the companies, but still had negative effects on the company’s stock and performance. The fourth article titled “Who Uses Mobile Apps to Meet Strangers: The Roles of Core Traits and Surface Characteristics”. The authors Lixuan Zhang, Iryna Pentina, and Wendy Fox Kirk investigated the concept of social networking sites, specifically WeChat, a social networking site, that is highly popular in China. The aut
{"title":"Editorial Preface","authors":"Chuleeporn Changchit, K. Bagchi, Choton Basu","doi":"10.1080/15536548.2017.1394724","DOIUrl":"https://doi.org/10.1080/15536548.2017.1394724","url":null,"abstract":"The last issue of the Journal of Information Privacy and Security (JIPS) for 2017 contains nine articles and one book review. The issue of privacy and security is increasingly important as we move toward a more technological future. The discussion of these articles focuses on the importance of the protection of personal information on the Internet and social network as well as the policies to help minimizing the misuse of data. In the Book Review section, Dr. Arslan reviews the book titled “The Complete Privacy & Security Desk Reference-Volume I Digital” by Michael Bazzell and Justin Carroll. More details are as follows: The first article titled “Future of Privacy and Security – The Four Horsemen” by Choton Basu, the founding editor of the JIPS. This article is a commentary on the future of the privacy and security field. In this article, the author looks at the four key issues could significantly shape the field and impact society in significant ways. The article discusses the topics of Net Neutrality (and US Internet Privacy Laws), Internet of Things, Human Genome (Medical), and Cryptocurrency. This is an opinion paper that is based on current topics, trends, discussions, events and also the editorial and review work done as the editors of JIPS over 12 years. Processing articles that impact technology, regulation, legal, social and policy has helped shape this vision. It is the author’s assessment that these four trends (each) have the potential to change society forever. The second article titled “A Study of Web Privacy Policies across Industries” by Razieh Nokhbeh Zaeem and K. Suzanne Barber brings to light the shocking rate at which industries misuse their customers Personal Identification Information (PII). The authors conducted studies on 600 companies and found similar trends in each company. The study revealed that companies often misuse their customers PII and some do not even have any privacy policies in place. Zaeem and Barber’s findings in these studies can be used to create better privacy policies for companies and help to educate customers on these policies. In the third article titled “Long-Term Market Implications of Data Breaches, Not”, the authors Russell Lange and Eric Burger assessed the impact of data breaches. They not only addressed the effects these breaches have on the company’s performance and the costs that come with the breach, but also focused on the toll it takes on the customers and peer companies. Citigroup conducted research into these breached companies and found that on average the impact did minimal damage to the companies, but still had negative effects on the company’s stock and performance. The fourth article titled “Who Uses Mobile Apps to Meet Strangers: The Roles of Core Traits and Surface Characteristics”. The authors Lixuan Zhang, Iryna Pentina, and Wendy Fox Kirk investigated the concept of social networking sites, specifically WeChat, a social networking site, that is highly popular in China. The aut","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2017-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89476218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-02DOI: 10.1080/15536548.2017.1419014
G. Kaupins, Janet Stephens
ABSTRACT The Internet of Things (IoT) is a loosely defined term describing internet-connected sensors that among other capabilities enable companies to monitor individuals. New privacy-related challenges can arise when sensors communicate with each other. These challenges call for changes to corporate privacy policies to incorporate potential IoT issues and guidance. This research investigates existing privacy policies and IoT-related research to provide IoT privacy policy recommendations. Privacy policy questions include: Who or what is notified of monitoring? When and where should there be expectations of privacy? Why and how is user data collected and how should monitoring problems be communicated? The analysis concludes with IoT-related privacy policy recommendations.
{"title":"Development of Internet of Things-Related Monitoring Policies","authors":"G. Kaupins, Janet Stephens","doi":"10.1080/15536548.2017.1419014","DOIUrl":"https://doi.org/10.1080/15536548.2017.1419014","url":null,"abstract":"ABSTRACT The Internet of Things (IoT) is a loosely defined term describing internet-connected sensors that among other capabilities enable companies to monitor individuals. New privacy-related challenges can arise when sensors communicate with each other. These challenges call for changes to corporate privacy policies to incorporate potential IoT issues and guidance. This research investigates existing privacy policies and IoT-related research to provide IoT privacy policy recommendations. Privacy policy questions include: Who or what is notified of monitoring? When and where should there be expectations of privacy? Why and how is user data collected and how should monitoring problems be communicated? The analysis concludes with IoT-related privacy policy recommendations.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2017-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75806555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-02DOI: 10.1080/15536548.2017.1394072
Lixuan Zhang, Iryna Pentina, Wendy Fox Kirk
ABSTRACT Digital space continues to be a popular venue for meeting new people. However, little is known about who uses mobile context-aware social networking apps to initiate new relationships. This study investigates the roles of individual core traits and surface characteristics in the adoption of social discovery features on WeChat, a mobile social networking app in China. Analysis of survey data collected from 213 WeChat users finds the core traits of agreeableness and neuroticism to be negatively related to the use of these social discovery features. The surface characteristic of sensation seeking is positively related to the use of social discovery features, while the surface characteristic of loneliness is not. Based on the findings, directions for future research and implications for app developers and marketers are suggested.
{"title":"Who uses mobile apps to meet strangers: The roles of core traits and surface characteristics","authors":"Lixuan Zhang, Iryna Pentina, Wendy Fox Kirk","doi":"10.1080/15536548.2017.1394072","DOIUrl":"https://doi.org/10.1080/15536548.2017.1394072","url":null,"abstract":"ABSTRACT Digital space continues to be a popular venue for meeting new people. However, little is known about who uses mobile context-aware social networking apps to initiate new relationships. This study investigates the roles of individual core traits and surface characteristics in the adoption of social discovery features on WeChat, a mobile social networking app in China. Analysis of survey data collected from 213 WeChat users finds the core traits of agreeableness and neuroticism to be negatively related to the use of these social discovery features. The surface characteristic of sensation seeking is positively related to the use of social discovery features, while the surface characteristic of loneliness is not. Based on the findings, directions for future research and implications for app developers and marketers are suggested.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2017-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83665706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}