首页 > 最新文献

International Journal of Information Security and Privacy最新文献

英文 中文
Interview With Lionel Cassin 采访莱昂内尔·卡辛
IF 0.8 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2017-04-03 DOI: 10.1080/15536548.2017.1322437
Chuleeporn Changchit
{"title":"Interview With Lionel Cassin","authors":"Chuleeporn Changchit","doi":"10.1080/15536548.2017.1322437","DOIUrl":"https://doi.org/10.1080/15536548.2017.1322437","url":null,"abstract":"","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"72 1","pages":"97 - 98"},"PeriodicalIF":0.8,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90896504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security and Privacy in Social Networks, by Yaniv Altshuler, Yuval Elovici, Armin B. Cremers, Nadav Aharony, Alex Pentland 《社交网络中的安全和隐私》,作者:Yaniv Altshuler, Yuval Elovici, Armin B. Cremers, Nadav Aharony, Alex Pentland
IF 0.8 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2017-04-03 DOI: 10.1080/15536548.2017.1322439
Faruk Arslan
Security and Privacy in Social Networks is an edited collection of an introduction and 10 scholarly articles, which are partially based on the research work presented at the Workshop on Security and Privacy in Social Networks, in connection with the 2012 IEEE Social Computing Conference. Given the growing prominence of online social networks (OSN) and their corresponding security and privacy problems, this book aims to propose solutions as well as develop a common language for use between researchers and practitioners. The authors organized the book into 11 chapters, dedicating the first chapter to introduction and the remaining 10 to research articles. In the upcoming paragraphs, I will provide a review of the key ideas discussed in each chapter and then conclude my review.
《社交网络中的安全和隐私》是一本编辑过的介绍和10篇学术文章的合集,其中部分内容基于在社交网络安全和隐私研讨会上发表的研究工作,该研讨会与2012年IEEE社交计算会议有关。鉴于在线社交网络(OSN)及其相应的安全和隐私问题日益突出,本书旨在提出解决方案,并开发一种通用语言,供研究人员和从业人员使用。作者将该书分为11章,第一章是绪论,其余10章是研究文章。在接下来的段落中,我将对每章中讨论的关键思想进行回顾,然后总结我的回顾。
{"title":"Security and Privacy in Social Networks, by Yaniv Altshuler, Yuval Elovici, Armin B. Cremers, Nadav Aharony, Alex Pentland","authors":"Faruk Arslan","doi":"10.1080/15536548.2017.1322439","DOIUrl":"https://doi.org/10.1080/15536548.2017.1322439","url":null,"abstract":"Security and Privacy in Social Networks is an edited collection of an introduction and 10 scholarly articles, which are partially based on the research work presented at the Workshop on Security and Privacy in Social Networks, in connection with the 2012 IEEE Social Computing Conference. Given the growing prominence of online social networks (OSN) and their corresponding security and privacy problems, this book aims to propose solutions as well as develop a common language for use between researchers and practitioners. The authors organized the book into 11 chapters, dedicating the first chapter to introduction and the remaining 10 to research articles. In the upcoming paragraphs, I will provide a review of the key ideas discussed in each chapter and then conclude my review.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"23 1","pages":"102 - 99"},"PeriodicalIF":0.8,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76347677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
What Affects Users to Click on Display Ads on Social Media? The Roles of Message Values, Involvement, and Security 是什么影响用户点击社交媒体上的展示广告?消息值、参与和安全性的角色
IF 0.8 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2017-04-03 DOI: 10.1080/15536548.2017.1322434
E. Mao, Jing Zhang
ABSTRACT This project represents one of the few efforts in studying the effectiveness of social media advertising (ads). Specifically, the effects of three major communication components—message, channel/media, and receiver/audience—on ad clicks are examined. The message component includes perceived informativeness, entertainment, and intrusiveness of the ad; the media component focuses on social media security and the audience component focuses on their involvement. The effects of ad clicks on product evaluations and then on intentions to spread positive word-of-mouth are also investigated. A research model is developed and tested with online-survey data from 572 social media users. The contributions, practical implications, and future research directions are discussed in the context of social media.
本项目是研究社交媒体广告有效性的少数努力之一。具体来说,三个主要的通信组件——消息、渠道/媒体和接收者/受众——对广告点击的影响进行了研究。信息组件包括广告的感知信息性、娱乐性和侵入性;媒体部分侧重于社交媒体安全,受众部分侧重于他们的参与。广告点击对产品评价的影响,然后对传播积极口碑的意图也进行了调查。通过572名社交媒体用户的在线调查数据,建立了一个研究模型并进行了测试。本文以社交媒体为背景,讨论了本文的贡献、现实意义和未来的研究方向。
{"title":"What Affects Users to Click on Display Ads on Social Media? The Roles of Message Values, Involvement, and Security","authors":"E. Mao, Jing Zhang","doi":"10.1080/15536548.2017.1322434","DOIUrl":"https://doi.org/10.1080/15536548.2017.1322434","url":null,"abstract":"ABSTRACT This project represents one of the few efforts in studying the effectiveness of social media advertising (ads). Specifically, the effects of three major communication components—message, channel/media, and receiver/audience—on ad clicks are examined. The message component includes perceived informativeness, entertainment, and intrusiveness of the ad; the media component focuses on social media security and the audience component focuses on their involvement. The effects of ad clicks on product evaluations and then on intentions to spread positive word-of-mouth are also investigated. A research model is developed and tested with online-survey data from 572 social media users. The contributions, practical implications, and future research directions are discussed in the context of social media.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"30 1","pages":"84 - 96"},"PeriodicalIF":0.8,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85172767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
The Effect of Procedural and Technological Security Countermeasures on the Propensity to Misuse Medical Data 程序和技术安全对策对医疗数据滥用倾向的影响
IF 0.8 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2017-04-03 DOI: 10.1080/15536548.2017.1322421
W. Arunothong, D. Nazareth
ABSTRACT As healthcare providers seek to comply with HIPAA and endeavor to secure their data from external breaches, they also need to realize that another threat to misuse of this data is inappropriate internal use by employees. Not all instances of misuse constitute a HIPAA violation, but they have the potential to become one. Medical data misuse by employees can be alleviated and curbed through the appropriate use of procedural and technological countermeasures. This paper seeks to determine whether electronic health records (EHR) policy and auditing procedures play a role in the propensity of providers to misuse medical data. Through an on-line survey of US physicians, nurses, medical students, and nursing students, using four case vignettes representing various forms of misuse, this research found that providers who were more aware of institutional security policy were more likely to adhere to policies than their counterparts who were not similarly informed. Likewise, providers who believed that their organizations monitored their EHR usage were less likely to engage in misuse than their counterparts who believed they were not monitored. The findings underscore the need for healthcare organizations to emphasize the importance of HIPAA compliance, and inform employees about the steps that the institution takes to maintain compliance, both from a procedural as well as technological standpoint. This study suggests that increasing the awareness of security and policy measures among employees is a vital part of preventing misuse.
当医疗保健提供者寻求遵守HIPAA并努力保护其数据免受外部泄露时,他们也需要意识到员工内部不适当使用这些数据是滥用这些数据的另一个威胁。并不是所有的滥用行为都违反了HIPAA,但它们有可能成为违反HIPAA的行为。雇员滥用医疗数据可以通过适当使用程序和技术对策来减轻和遏制。本文旨在确定电子健康记录(EHR)政策和审计程序是否在提供者滥用医疗数据的倾向中发挥作用。通过对美国医生、护士、医学生和护理学生的在线调查,使用四个代表各种形式滥用的案例,本研究发现,更了解机构安全政策的提供者比不了解类似信息的同行更有可能遵守政策。同样地,那些认为他们的组织监控了他们的电子病历使用情况的供应商比那些认为他们没有被监控的同行更不可能滥用电子病历。调查结果强调了医疗保健组织需要强调HIPAA合规性的重要性,并从程序和技术的角度告知员工该机构为保持合规性所采取的步骤。这项研究表明,提高员工的安全意识和政策措施是防止滥用的重要组成部分。
{"title":"The Effect of Procedural and Technological Security Countermeasures on the Propensity to Misuse Medical Data","authors":"W. Arunothong, D. Nazareth","doi":"10.1080/15536548.2017.1322421","DOIUrl":"https://doi.org/10.1080/15536548.2017.1322421","url":null,"abstract":"ABSTRACT As healthcare providers seek to comply with HIPAA and endeavor to secure their data from external breaches, they also need to realize that another threat to misuse of this data is inappropriate internal use by employees. Not all instances of misuse constitute a HIPAA violation, but they have the potential to become one. Medical data misuse by employees can be alleviated and curbed through the appropriate use of procedural and technological countermeasures. This paper seeks to determine whether electronic health records (EHR) policy and auditing procedures play a role in the propensity of providers to misuse medical data. Through an on-line survey of US physicians, nurses, medical students, and nursing students, using four case vignettes representing various forms of misuse, this research found that providers who were more aware of institutional security policy were more likely to adhere to policies than their counterparts who were not similarly informed. Likewise, providers who believed that their organizations monitored their EHR usage were less likely to engage in misuse than their counterparts who believed they were not monitored. The findings underscore the need for healthcare organizations to emphasize the importance of HIPAA compliance, and inform employees about the steps that the institution takes to maintain compliance, both from a procedural as well as technological standpoint. This study suggests that increasing the awareness of security and policy measures among employees is a vital part of preventing misuse.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"48 1","pages":"69 - 83"},"PeriodicalIF":0.8,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76303175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy and Security Concerns with Healthcare Data and Social Media Usage 医疗保健数据和社交媒体使用的隐私和安全问题
IF 0.8 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2017-04-03 DOI: 10.1080/15536548.2017.1322413
Chuleeporn Changchit, K. Bagchi
First of all, I’m glad to be back on board and allow Dr. Bagchi to take a good break for a while. It is nice to be in touch with everyone again. The second issue of the Journal of Information Privacy & Security (JIPS) for 2017 contains three articles, one expert opinion, and one book review. The first two articles focus on the importance of protecting personal information and securing data in the healthcare industries. The third article discusses the influence of consumers’ security perception on their social advertising usage. In the Expert Opinion section, Mr. Lionel Cassin, an information security officer at Texas A&M University–Corpus Christi, discusses the major issues of security and privacy that the university is facing, and points out that it is crucial to improve awareness of information security and privacy on campus. In the Book Review section, Dr. Arslan reviews the book titled Security and Privacy in Social Networks by Yaniv Altshuler, Yuval Elovici, Armin B. Cremers, Nadav Aharony, and Alex Pentland. More details are as follows: The first article is titled “Handling Confidentiality and Privacy on Cloud-based Health Information Systems.” The authors Carlos Serrao and Elsa Cardoso propose an approach to minimize the security risks in health-related data based on rights management technologies. Based on a trend that the health-related data may be migrated into the cloud, opportunities are increasing for cybercriminals to commit fraud or other similar criminal schemes after directing their attacks towards health and medical data of patients. To prevent organizations from financial and reputational losses, several initiatives have been created to improve the confidentiality and privacy requirements of the health and medical information. In this article, the authors propose the usage of the rights management systems as this approach can offer a governed environment and enables critical privacy and security mechanism. Although the system will not solve all the problems, it can help reducing the impact of large data breaches, making it more difficult for potential attacker to access unprotected information. The second article, “The Effect of Procedural and Technological Security Countermeasures on the Propensity to Misuse Medical Data,” authored by Wachiraporn Arunothong and Derek L. Nazareth, discusses the healthcare providers’ concern about the threat to misuse of medical data by internal users such as their employees. Even though the use of electronic medical records (EMRs) and electronic health records (EHRs) can help increase the efficiency and effectiveness of healthcare services, it is crucial to cultivate the awareness of security and to ensure that the employees follow the policy measures to avoid misuse. The results from conducting an online survey with physicians, nurses, medical students, and nursing students revealed that the healthcare providers who have more conscious of institutional security policy were less likely to engag
首先,我很高兴能回到船上让巴奇博士好好休息一会儿。能和大家再次联系真是太好了。《信息隐私与安全杂志》2017年第二期包含三篇文章、一篇专家意见和一篇书评。前两篇文章重点介绍了在医疗保健行业中保护个人信息和保护数据的重要性。第三篇文章探讨了消费者安全感知对其社交广告使用的影响。在专家意见部分,德克萨斯A&M大学科珀斯克里斯蒂分校的信息安全官员Lionel Cassin先生讨论了该大学面临的主要安全和隐私问题,并指出提高校园信息安全和隐私意识至关重要。在书评部分,Arslan博士评论了Yaniv Altshuler、Yuval Elovici、Armin B. Cremers、Nadav Aharony和Alex Pentland合著的《社交网络中的安全和隐私》一书。更多细节如下:第一篇文章的标题是“处理基于云的医疗信息系统的机密性和隐私”。作者Carlos Serrao和Elsa Cardoso提出了一种基于权限管理技术的最小化健康相关数据安全风险的方法。基于与健康相关的数据可能迁移到云的趋势,网络犯罪分子在将攻击指向患者的健康和医疗数据后实施欺诈或其他类似犯罪计划的机会正在增加。为防止各组织遭受财务和声誉损失,已制定了若干举措,以改进对健康和医疗信息的保密和隐私要求。在本文中,作者建议使用权限管理系统,因为这种方法可以提供受治理的环境,并启用关键的隐私和安全机制。虽然该系统不会解决所有问题,但它可以帮助减少大型数据泄露的影响,使潜在的攻击者更难以访问未受保护的信息。第二篇文章,“程序和技术安全对策对滥用医疗数据倾向的影响”,由Wachiraporn Arunothong和Derek L. Nazareth撰写,讨论了医疗服务提供者对内部用户(如员工)滥用医疗数据威胁的担忧。尽管电子医疗记录(emr)和电子健康记录(EHRs)的使用有助于提高医疗保健服务的效率和有效性,但培养安全意识并确保员工遵守政策措施以避免滥用至关重要。对医生、护士、医学生和护理专业学生进行的在线调查结果显示,更了解机构安全政策的医疗保健提供者不太可能滥用。因此,医疗保健组织有必要提供一些培训,例如强大的培训,并定期进行进修培训,以教育员工了解HIPAA合规性的重要性,并从程序和技术的角度告知他们机构为保持合规性所采取的步骤。该研究的结论是,提高员工对安全和政策措施的认识是防止滥用的重要组成部分。本期最后一篇文章题为“是什么影响用户点击社交媒体上的展示广告?”《信息价值、参与和安全的角色》由毛恩和张静合著。这些作者研究了影响社交媒体广告效果的广告点击的三个主要传播成分——信息、渠道/媒体和接收者/受众。然后,他们提出了一个研究模型,并使用来自572社会杂志的在线调查数据进行了测试。2,49 - 50 https://doi.org/10.1080/15536548.2017.1322413
{"title":"Privacy and Security Concerns with Healthcare Data and Social Media Usage","authors":"Chuleeporn Changchit, K. Bagchi","doi":"10.1080/15536548.2017.1322413","DOIUrl":"https://doi.org/10.1080/15536548.2017.1322413","url":null,"abstract":"First of all, I’m glad to be back on board and allow Dr. Bagchi to take a good break for a while. It is nice to be in touch with everyone again. The second issue of the Journal of Information Privacy & Security (JIPS) for 2017 contains three articles, one expert opinion, and one book review. The first two articles focus on the importance of protecting personal information and securing data in the healthcare industries. The third article discusses the influence of consumers’ security perception on their social advertising usage. In the Expert Opinion section, Mr. Lionel Cassin, an information security officer at Texas A&M University–Corpus Christi, discusses the major issues of security and privacy that the university is facing, and points out that it is crucial to improve awareness of information security and privacy on campus. In the Book Review section, Dr. Arslan reviews the book titled Security and Privacy in Social Networks by Yaniv Altshuler, Yuval Elovici, Armin B. Cremers, Nadav Aharony, and Alex Pentland. More details are as follows: The first article is titled “Handling Confidentiality and Privacy on Cloud-based Health Information Systems.” The authors Carlos Serrao and Elsa Cardoso propose an approach to minimize the security risks in health-related data based on rights management technologies. Based on a trend that the health-related data may be migrated into the cloud, opportunities are increasing for cybercriminals to commit fraud or other similar criminal schemes after directing their attacks towards health and medical data of patients. To prevent organizations from financial and reputational losses, several initiatives have been created to improve the confidentiality and privacy requirements of the health and medical information. In this article, the authors propose the usage of the rights management systems as this approach can offer a governed environment and enables critical privacy and security mechanism. Although the system will not solve all the problems, it can help reducing the impact of large data breaches, making it more difficult for potential attacker to access unprotected information. The second article, “The Effect of Procedural and Technological Security Countermeasures on the Propensity to Misuse Medical Data,” authored by Wachiraporn Arunothong and Derek L. Nazareth, discusses the healthcare providers’ concern about the threat to misuse of medical data by internal users such as their employees. Even though the use of electronic medical records (EMRs) and electronic health records (EHRs) can help increase the efficiency and effectiveness of healthcare services, it is crucial to cultivate the awareness of security and to ensure that the employees follow the policy measures to avoid misuse. The results from conducting an online survey with physicians, nurses, medical students, and nursing students revealed that the healthcare providers who have more conscious of institutional security policy were less likely to engag","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"23 1","pages":"49 - 50"},"PeriodicalIF":0.8,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88522801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Does privacy matter to millennials? The case for personal cloud 隐私对千禧一代很重要吗?个人云的案例
IF 0.8 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2017-01-02 DOI: 10.1080/15536548.2016.1243854
Murad A. Moqbel, Valerie L. Bartelt, M. Al-Suqri, A. Al-Maskari
ABSTRACT To date, there is little research on the extent to which privacy, security, and trust influence consumer technology-use decisions based on generation. We, therefore, examine, through the lens of the expectancy-valence theory, the extent to which privacy, security, and trust influence the decision to use personal cloud computing among millennials. We also examine the moderating effect of innovativeness on these relationships. Our structural equation modeling (SEM) analysis of 371 millennials shows that privacy is irrelevant for millennials when making decisions to use personal cloud and that individuals with high innovativeness tend to disregard security when making an adoption decision.
迄今为止,关于隐私、安全和信任在多大程度上影响基于世代的消费者技术使用决策的研究很少。因此,我们通过期望效价理论来研究隐私、安全和信任在多大程度上影响了千禧一代使用个人云计算的决定。我们还研究了创新对这些关系的调节作用。我们对371名千禧一代的结构方程模型(SEM)分析表明,在决定使用个人云时,隐私与千禧一代无关,具有高度创新能力的个人在做出采用决策时往往忽视安全性。
{"title":"Does privacy matter to millennials? The case for personal cloud","authors":"Murad A. Moqbel, Valerie L. Bartelt, M. Al-Suqri, A. Al-Maskari","doi":"10.1080/15536548.2016.1243854","DOIUrl":"https://doi.org/10.1080/15536548.2016.1243854","url":null,"abstract":"ABSTRACT To date, there is little research on the extent to which privacy, security, and trust influence consumer technology-use decisions based on generation. We, therefore, examine, through the lens of the expectancy-valence theory, the extent to which privacy, security, and trust influence the decision to use personal cloud computing among millennials. We also examine the moderating effect of innovativeness on these relationships. Our structural equation modeling (SEM) analysis of 371 millennials shows that privacy is irrelevant for millennials when making decisions to use personal cloud and that individuals with high innovativeness tend to disregard security when making an adoption decision.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"32 1","pages":"17 - 33"},"PeriodicalIF":0.8,"publicationDate":"2017-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75874888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Record Re-Identification of Swapped Numerical Microdata 交换数值微数据的记录再鉴定
IF 0.8 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2017-01-02 DOI: 10.1080/15536548.2017.1281602
K. Muralidhar
ABSTRACT Government agencies, researchers, healthcare providers, and other organizations release data for public use. To protect the privacy of the data subjects, these organizations mask the data prior to release. One popular masking procedure is data swapping, by which values of records are exchanged before being released. Data swapping is one of the preferred techniques since it is simple, easy to implement, and---based on prior studies---provides a reasonable balance between disclosure risk and data utility. In this study, we investigate the ability of an adversary with limited knowledge (of just a single record) to re-identify a record in the swapped data by using a procedure that reverse engineers the data-swapping process. The study also provides the adversary with the ability to evaluate the effectiveness of the re-identification. We empirically evaluate the effectiveness of data swapping using a dataset that has been used previously to evaluate the effectiveness of masking techniques. Our results demonstrate that data swapping can be vulnerable to disclosure even against this limited knowledge adversary.
政府机构、研究人员、医疗保健提供者和其他组织发布数据供公众使用。为了保护数据主体的隐私,这些组织在发布数据之前掩盖数据。一种流行的屏蔽过程是数据交换,通过这种方法,记录的值在被释放之前被交换。数据交换是首选技术之一,因为它简单、易于实现,并且(基于先前的研究)在披露风险和数据效用之间提供了合理的平衡。在本研究中,我们研究了对手在有限的知识(只有一条记录)下通过使用反向工程数据交换过程的过程重新识别交换数据中的记录的能力。该研究还为对手提供了评估再识别有效性的能力。我们使用以前用于评估屏蔽技术有效性的数据集来经验性地评估数据交换的有效性。我们的研究结果表明,即使面对这个知识有限的对手,数据交换也容易被披露。
{"title":"Record Re-Identification of Swapped Numerical Microdata","authors":"K. Muralidhar","doi":"10.1080/15536548.2017.1281602","DOIUrl":"https://doi.org/10.1080/15536548.2017.1281602","url":null,"abstract":"ABSTRACT Government agencies, researchers, healthcare providers, and other organizations release data for public use. To protect the privacy of the data subjects, these organizations mask the data prior to release. One popular masking procedure is data swapping, by which values of records are exchanged before being released. Data swapping is one of the preferred techniques since it is simple, easy to implement, and---based on prior studies---provides a reasonable balance between disclosure risk and data utility. In this study, we investigate the ability of an adversary with limited knowledge (of just a single record) to re-identify a record in the swapped data by using a procedure that reverse engineers the data-swapping process. The study also provides the adversary with the ability to evaluate the effectiveness of the re-identification. We empirically evaluate the effectiveness of data swapping using a dataset that has been used previously to evaluate the effectiveness of masking techniques. Our results demonstrate that data swapping can be vulnerable to disclosure even against this limited knowledge adversary.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"58 1","pages":"34 - 45"},"PeriodicalIF":0.8,"publicationDate":"2017-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90984068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An examination of an e-authentication service as an intervention in e-mail risk perception 电子认证服务作为电子邮件风险感知干预的研究
IF 0.8 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2017-01-02 DOI: 10.1080/15536548.2016.1257681
Rui Chen, Jingguo Wang, Tejaswini C. Herath, H. Rao
ABSTRACT In this article, we develop a three-stage study to examine the role of an e-mail authentication and identification service (eATS) intervention in affecting end-user e-mail risk perceptions. We deploy the eATS and find that it reduces users’ risk perception. Pre-intervention risk perception is found to be positively associated with user perception of the e-authentication service’s usefulness. Moreover, perceived usefulness of the service negatively relates to e-mail risk perception in the post-use stage. Finally, privacy concerns related to the e-authentication service dilute this relationship between usefulness of service and e-mail risk perception reduction.
在本文中,我们开展了一项分三个阶段的研究,以检验电子邮件认证和识别服务(eATS)干预在影响最终用户电子邮件风险感知方面的作用。我们部署了eATS,发现它降低了用户的风险感知。干预前风险感知与用户对电子认证服务有用性的感知呈正相关。此外,服务的感知有用性与使用后阶段的电子邮件风险感知负相关。最后,与电子认证服务相关的隐私问题削弱了服务有用性与降低电子邮件风险感知之间的关系。
{"title":"An examination of an e-authentication service as an intervention in e-mail risk perception","authors":"Rui Chen, Jingguo Wang, Tejaswini C. Herath, H. Rao","doi":"10.1080/15536548.2016.1257681","DOIUrl":"https://doi.org/10.1080/15536548.2016.1257681","url":null,"abstract":"ABSTRACT In this article, we develop a three-stage study to examine the role of an e-mail authentication and identification service (eATS) intervention in affecting end-user e-mail risk perceptions. We deploy the eATS and find that it reduces users’ risk perception. Pre-intervention risk perception is found to be positively associated with user perception of the e-authentication service’s usefulness. Moreover, perceived usefulness of the service negatively relates to e-mail risk perception in the post-use stage. Finally, privacy concerns related to the e-authentication service dilute this relationship between usefulness of service and e-mail risk perception reduction.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"1 1","pages":"16 - 2"},"PeriodicalIF":0.8,"publicationDate":"2017-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90050687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Thinking with Data: How to Turn Information into Insights, by Max Shron 《用数据思考:如何将信息转化为洞察力》,作者:Max Shron
IF 0.8 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2017-01-02 DOI: 10.1080/15536548.2017.1279876
Faruk Arslan
As the emerging field of data science permeates many domains inclusive of information security and privacy, understanding the process of turning information into insights continues to be a major endeavor. In this book, Max Shron provides a practice-oriented set of guidelines, which is geared towards expanding the soft skills required for making the most out of the data. As a data strategy consultant, Mr. Shron acknowledges the importance of hard skills such as data cleaning, mathematical modeling, and data visualization; however, he notes that the soft skills have been ignored within the data science field. He emphasizes that these soft skills, which include “translating vague problems into precisely answerable ones, and combining multiple lines or arguments into one useful result,” can be adapted from other disciplines. The author organizes the book into six chapters. Chapter 1 deals with problem scoping and introduces the readers to a practical framework called CoNVO, which stands for context, need, vision, and outcome. Chapter 2 focuses on techniques to refine the original vision and elaborates on the scaffolding strategy, which is geared toward the initial exploration of data to ensure proper understanding of the problem on hand. Chapter 3 deals with building and presenting arguments, while Chapter 4 discusses three groups of reasoning patterns, which facilitate the structuring of useful arguments. Chapter 5 is dedicated to causal reasoning, whereas the final chapter synthesizes the materials covered from Chapter 1 to 5. The author concludes the book with an appendix dedicated to reading materials, which can be used to further investigate the concepts discussed within the book. In the upcoming paragraphs, I will provide a review of the key ideas discussed in each chapter and conclude my review.
随着新兴的数据科学领域渗透到包括信息安全和隐私在内的许多领域,理解将信息转化为见解的过程仍然是一项重大努力。在这本书中,Max Shron提供了一套以实践为导向的指导方针,旨在扩展充分利用数据所需的软技能。作为一名数据战略顾问,Shron先生承认数据清理、数学建模和数据可视化等硬技能的重要性;然而,他指出,软技能在数据科学领域被忽视了。他强调,这些软技能,包括“将模糊的问题转化为精确可回答的问题,并将多条线或论点组合成一个有用的结果”,可以从其他学科中改编。作者把这本书组织成六章。第1章讨论问题范围,并向读者介绍一个称为CoNVO的实用框架,它代表上下文、需求、愿景和结果。第2章侧重于改进原始愿景的技术,并详细说明脚手架策略,该策略面向数据的初始探索,以确保正确理解手头的问题。第3章讨论构建和呈现论证,而第4章讨论三组推理模式,它们有助于构建有用的论证。第5章致力于因果推理,而最后一章综合了从第1章到第5章所涵盖的材料。作者在书的结尾提供了一个专门用于阅读材料的附录,可以用来进一步研究书中讨论的概念。在接下来的段落中,我将对每章中讨论的关键思想进行回顾,并总结我的回顾。
{"title":"Thinking with Data: How to Turn Information into Insights, by Max Shron","authors":"Faruk Arslan","doi":"10.1080/15536548.2017.1279876","DOIUrl":"https://doi.org/10.1080/15536548.2017.1279876","url":null,"abstract":"As the emerging field of data science permeates many domains inclusive of information security and privacy, understanding the process of turning information into insights continues to be a major endeavor. In this book, Max Shron provides a practice-oriented set of guidelines, which is geared towards expanding the soft skills required for making the most out of the data. As a data strategy consultant, Mr. Shron acknowledges the importance of hard skills such as data cleaning, mathematical modeling, and data visualization; however, he notes that the soft skills have been ignored within the data science field. He emphasizes that these soft skills, which include “translating vague problems into precisely answerable ones, and combining multiple lines or arguments into one useful result,” can be adapted from other disciplines. The author organizes the book into six chapters. Chapter 1 deals with problem scoping and introduces the readers to a practical framework called CoNVO, which stands for context, need, vision, and outcome. Chapter 2 focuses on techniques to refine the original vision and elaborates on the scaffolding strategy, which is geared toward the initial exploration of data to ensure proper understanding of the problem on hand. Chapter 3 deals with building and presenting arguments, while Chapter 4 discusses three groups of reasoning patterns, which facilitate the structuring of useful arguments. Chapter 5 is dedicated to causal reasoning, whereas the final chapter synthesizes the materials covered from Chapter 1 to 5. The author concludes the book with an appendix dedicated to reading materials, which can be used to further investigate the concepts discussed within the book. In the upcoming paragraphs, I will provide a review of the key ideas discussed in each chapter and conclude my review.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"113 1","pages":"46 - 47"},"PeriodicalIF":0.8,"publicationDate":"2017-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88811660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ca-NIDS: A network intrusion detection system using combinatorial algorithm approach Ca-NIDS:一种基于组合算法的网络入侵检测系统
IF 0.8 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2016-10-01 DOI: 10.1080/15536548.2016.1257680
O. Folorunso, F. E. Ayo, Y. Babalola
ABSTRACT A signature-based system (SBS) is a common approach for intrusion detection and the most preferable by researchers. In spite of the popularity of SBS, it cannot detect new attacks on the network compared to anomaly-based systems (ABS). The most challenging problem of SBS is keeping an up-to-date database of known attack signatures and the setting of a suitable threshold level for intrusion detection. In this article, a network intrusion detection system based on combinatorial algorithm (CA-NIDS) is proposed. The CA-NIDS uses additional databases to enable the SBS to act as an ABS for the purpose of detecting new attacks and to speed up network traffic during traffic analysis by the combinatorial algorithm. A suitable threshold of 12 was also set based on the study of past works to lower the false positive rate. The CA-NIDS was evaluated with similar online schemes and result shows a small false-positive rate of 3% and a better accuracy of 96.5% compared with related online algorithms.
基于签名的入侵检测系统(SBS)是一种常用的入侵检测方法,也是研究人员最青睐的入侵检测方法。尽管SBS很受欢迎,但与基于异常的系统(ABS)相比,它无法检测网络上的新攻击。SBS最具挑战性的问题是保持已知攻击签名的最新数据库,并为入侵检测设置合适的阈值水平。提出了一种基于组合算法的网络入侵检测系统(CA-NIDS)。CA-NIDS使用额外的数据库使SBS充当ABS,以检测新的攻击,并在组合算法进行流量分析时加快网络流量。在对以往工作的研究基础上,设定了一个合适的阈值为12,以降低误报率。用类似的在线方案对CA-NIDS进行评估,结果显示,与相关的在线算法相比,CA-NIDS的假阳性率较低,为3%,准确率为96.5%。
{"title":"Ca-NIDS: A network intrusion detection system using combinatorial algorithm approach","authors":"O. Folorunso, F. E. Ayo, Y. Babalola","doi":"10.1080/15536548.2016.1257680","DOIUrl":"https://doi.org/10.1080/15536548.2016.1257680","url":null,"abstract":"ABSTRACT A signature-based system (SBS) is a common approach for intrusion detection and the most preferable by researchers. In spite of the popularity of SBS, it cannot detect new attacks on the network compared to anomaly-based systems (ABS). The most challenging problem of SBS is keeping an up-to-date database of known attack signatures and the setting of a suitable threshold level for intrusion detection. In this article, a network intrusion detection system based on combinatorial algorithm (CA-NIDS) is proposed. The CA-NIDS uses additional databases to enable the SBS to act as an ABS for the purpose of detecting new attacks and to speed up network traffic during traffic analysis by the combinatorial algorithm. A suitable threshold of 12 was also set based on the study of past works to lower the false positive rate. The CA-NIDS was evaluated with similar online schemes and result shows a small false-positive rate of 3% and a better accuracy of 96.5% compared with related online algorithms.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"6 1","pages":"181 - 196"},"PeriodicalIF":0.8,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87582066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
期刊
International Journal of Information Security and Privacy
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1