首页 > 最新文献

International Journal of Information Security and Privacy最新文献

英文 中文
Bazzell, M., & Carroll, J. (2016). The Complete Privacy & Security Desk Reference-Volume I Digital. United States of America: CreateSpace Independent Publishing Platform, 478 pp 巴泽尔,M.,卡罗尔,J.(2016)。完整的隐私和安全桌参考-卷1数字。美利坚合众国:CreateSpace独立出版平台,478页
IF 0.8 Q3 Computer Science Pub Date : 2017-10-02 DOI: 10.1080/15536548.2017.1394060
Faruk Arslan
As I was writing this book review, the announcement about Equifax’s data breach, which affected about 143 million people, was dominating the daily discussions within United States. Following this major event, many institutions such as banks and credit reporting agencies were reaching out to their customers providing guidance as to how they can address identity theft issues, which may be caused by this data breach. The effect of these snippets of guidance on individuals’ privacy and security behavior remains to be evaluated. However, it is no secret that developing the digital security and privacy literacy of individuals has become a necessity given the massive digitization, storage, and processing of personal data by organizations worldwide. Within this context, Bazzell and Carroll’s book The Complete Privacy & Security Desk Reference-Volume I Digital is a welcome resource for a wide variety of audience. Reading the biography of both authors, one can easily note their vast amount of practical experience related to computer security, forensics, digital intelligence, and privacy. The content of their book reflects the accumulation of this practical experience. The authors categorized the content of the book into four levels of difficulty: i) basic, ii) intermediate, iii) advanced, and iv) expert, to appeal to a wide range of audience with a diverse set of interests and skill sets. They organized the material into an introduction, followed by 27 chapters, a conclusion, and an index. In the following section, I will provide a brief summary of these sections.
在我写这篇书评的时候,有关Equifax数据泄露的消息,影响了大约1.43亿人,在美国每天都是讨论的焦点。在这一重大事件之后,许多机构,如银行和信用报告机构,都在联系他们的客户,向他们提供指导,告诉他们如何解决可能由这次数据泄露引起的身份盗窃问题。这些指导对个人隐私和安全行为的影响仍有待评估。然而,鉴于全球组织对个人数据的大规模数字化、存储和处理,发展个人的数字安全和隐私素养已成为必要,这已不是什么秘密。在这种背景下,Bazzell和Carroll的书《完整的隐私和安全桌面参考-第一卷数字版》是一个受广泛读者欢迎的资源。阅读两位作者的传记,人们可以很容易地注意到他们在计算机安全、取证、数字智能和隐私方面的大量实践经验。他们的书的内容反映了这种实践经验的积累。作者将本书的内容分为四个难度级别:i)基本,ii)中级,iii)高级和iv)专家,以吸引具有不同兴趣和技能的广泛受众。他们将材料组织成引言,接着是27章、结论和索引。在下一节中,我将简要总结这些部分。
{"title":"Bazzell, M., & Carroll, J. (2016). The Complete Privacy & Security Desk Reference-Volume I Digital. United States of America: CreateSpace Independent Publishing Platform, 478 pp","authors":"Faruk Arslan","doi":"10.1080/15536548.2017.1394060","DOIUrl":"https://doi.org/10.1080/15536548.2017.1394060","url":null,"abstract":"As I was writing this book review, the announcement about Equifax’s data breach, which affected about 143 million people, was dominating the daily discussions within United States. Following this major event, many institutions such as banks and credit reporting agencies were reaching out to their customers providing guidance as to how they can address identity theft issues, which may be caused by this data breach. The effect of these snippets of guidance on individuals’ privacy and security behavior remains to be evaluated. However, it is no secret that developing the digital security and privacy literacy of individuals has become a necessity given the massive digitization, storage, and processing of personal data by organizations worldwide. Within this context, Bazzell and Carroll’s book The Complete Privacy & Security Desk Reference-Volume I Digital is a welcome resource for a wide variety of audience. Reading the biography of both authors, one can easily note their vast amount of practical experience related to computer security, forensics, digital intelligence, and privacy. The content of their book reflects the accumulation of this practical experience. The authors categorized the content of the book into four levels of difficulty: i) basic, ii) intermediate, iii) advanced, and iv) expert, to appeal to a wide range of audience with a diverse set of interests and skill sets. They organized the material into an introduction, followed by 27 chapters, a conclusion, and an index. In the following section, I will provide a brief summary of these sections.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2017-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74397442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cultural and Generational Influences on Information Privacy Concerns within Online Social Networks: An Empirical Evaluation of the Miltgen and Peyrat-Guillard Model 在线社交网络中对信息隐私关注的文化和代际影响:对Miltgen和Peyrat-Guillard模型的实证评估
IF 0.8 Q3 Computer Science Pub Date : 2017-10-02 DOI: 10.1080/15536548.2017.1412114
Faruk Arslan, Niharika Dayyala
ABSTRACT Growing use of the data generated via online social networking sites (SNS) for big data analytics renders the topic of information privacy as a critical concern and calls for a deeper investigation of individuals’ information privacy beliefs and behaviors. The primary goal of our research is to empirically test the effectiveness of the Miltgen and Peyrat-Guillard model in explaining the information privacy behavior of social network site users using a large-N sample from the European Union (EU). Results from the factor-based partial least squares - structural equation modeling (PLS-SEM) analysis provide partial support to this model. We elaborate on enhancements and discuss possible extensions to the model.
越来越多地使用在线社交网站(SNS)生成的数据进行大数据分析,使得信息隐私成为一个关键问题,并要求对个人的信息隐私信念和行为进行更深入的研究。本研究的主要目的是利用来自欧盟(EU)的大n样本,实证检验Miltgen和Peyrat-Guillard模型在解释社交网站用户信息隐私行为方面的有效性。基于因子的偏最小二乘-结构方程模型(PLS-SEM)分析结果为该模型提供了部分支持。我们详细介绍了增强功能并讨论了模型的可能扩展。
{"title":"Cultural and Generational Influences on Information Privacy Concerns within Online Social Networks: An Empirical Evaluation of the Miltgen and Peyrat-Guillard Model","authors":"Faruk Arslan, Niharika Dayyala","doi":"10.1080/15536548.2017.1412114","DOIUrl":"https://doi.org/10.1080/15536548.2017.1412114","url":null,"abstract":"ABSTRACT Growing use of the data generated via online social networking sites (SNS) for big data analytics renders the topic of information privacy as a critical concern and calls for a deeper investigation of individuals’ information privacy beliefs and behaviors. The primary goal of our research is to empirically test the effectiveness of the Miltgen and Peyrat-Guillard model in explaining the information privacy behavior of social network site users using a large-N sample from the European Union (EU). Results from the factor-based partial least squares - structural equation modeling (PLS-SEM) analysis provide partial support to this model. We elaborate on enhancements and discuss possible extensions to the model.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2017-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80284987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Utilizing normative theories to develop ethical actions for better privacy practices 利用规范理论发展更好的隐私实践的道德行为
IF 0.8 Q3 Computer Science Pub Date : 2017-10-02 DOI: 10.1080/15536548.2017.1419018
Zareef A. Mohammed, G. Tejay, Joseph Squillace
ABSTRACT This study examines the privacy practices of organizations. We argue that successful deployment of privacy practices based on ethical actions will strengthen privacy protection measures to better protect clients’ PII. We propose a set of ethical actions based on six normative theories following multiple case study approach to study three prominent data breaches. Our analysis indicates that ethical actions based on normative theories can be effective in developing better privacy practices for organizations. The theory that has the strongest effect on privacy practices is the deontological approach, while the liberal-intuitive has the weakest effect on privacy practices.
本研究考察了组织的隐私实践。我们认为,基于道德行为的隐私实践的成功部署将加强隐私保护措施,以更好地保护客户的PII。我们提出了一套基于六个规范理论的道德行为,遵循多案例研究方法来研究三个突出的数据泄露。我们的分析表明,基于规范理论的道德行为可以有效地为组织制定更好的隐私实践。对隐私实践影响最大的理论是义务论方法,而自由直觉理论对隐私实践的影响最弱。
{"title":"Utilizing normative theories to develop ethical actions for better privacy practices","authors":"Zareef A. Mohammed, G. Tejay, Joseph Squillace","doi":"10.1080/15536548.2017.1419018","DOIUrl":"https://doi.org/10.1080/15536548.2017.1419018","url":null,"abstract":"ABSTRACT This study examines the privacy practices of organizations. We argue that successful deployment of privacy practices based on ethical actions will strengthen privacy protection measures to better protect clients’ PII. We propose a set of ethical actions based on six normative theories following multiple case study approach to study three prominent data breaches. Our analysis indicates that ethical actions based on normative theories can be effective in developing better privacy practices for organizations. The theory that has the strongest effect on privacy practices is the deontological approach, while the liberal-intuitive has the weakest effect on privacy practices.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2017-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79082392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
RSVP a temporal method for graphical authentication RSVP是图形身份验证的临时方法
IF 0.8 Q3 Computer Science Pub Date : 2017-10-02 DOI: 10.1080/15536548.2017.1397263
Ashley A. Cain, J. Still
ABSTRACT We present a Rapid, Serial, Visual Presentation method (RSVP) for recognition-based graphical authentication. It presents a stream of rapid, degraded images, which makes the object recognition process difficult for casual attackers. Three studies investigated success rates for authenticating, RSVP’s resistance to over-the-shoulder attacks (OSAs), approaches for facilitating learnability, and effects of resetting a passcode. We found that participants could successfully authenticate and could not complete OSAs. Learnability was promoted by the presentation of degraded versions of the images during the memorization phase. When a passcode was reset, participants successfully retrained themselves even when the previous passcode was recycled as distractors.
提出了一种快速、串行、可视化的基于识别的图形认证方法(RSVP)。它呈现出一系列快速的、退化的图像,这使得随机攻击者难以识别目标。三项研究调查了身份验证的成功率、RSVP对过肩攻击(osa)的抵抗力、促进易学性的方法以及重置密码的效果。我们发现参与者可以成功验证,但不能完成osa。在记忆阶段,通过呈现图像的降级版本来促进易学性。当重置密码时,参与者成功地重新训练了自己,即使之前的密码被作为干扰物循环使用。
{"title":"RSVP a temporal method for graphical authentication","authors":"Ashley A. Cain, J. Still","doi":"10.1080/15536548.2017.1397263","DOIUrl":"https://doi.org/10.1080/15536548.2017.1397263","url":null,"abstract":"ABSTRACT We present a Rapid, Serial, Visual Presentation method (RSVP) for recognition-based graphical authentication. It presents a stream of rapid, degraded images, which makes the object recognition process difficult for casual attackers. Three studies investigated success rates for authenticating, RSVP’s resistance to over-the-shoulder attacks (OSAs), approaches for facilitating learnability, and effects of resetting a passcode. We found that participants could successfully authenticate and could not complete OSAs. Learnability was promoted by the presentation of degraded versions of the images during the memorization phase. When a passcode was reset, participants successfully retrained themselves even when the previous passcode was recycled as distractors.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2017-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83097100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A study of web privacy policies across industries 跨行业网络隐私政策研究
IF 0.8 Q3 Computer Science Pub Date : 2017-10-02 DOI: 10.1080/15536548.2017.1394064
Razieh Nokhbeh Zaeem, Suzanne Barber
ABSTRACT Today, more than ever, companies collect their customers’ Personally Identifiable Information (PII) over the Internet. The alarming rate of PII misuse drives the need for improving companies’ privacy practices. We thoroughly study privacy policies of 600 companies (10% of all listings on NYSE, Nasdaq, and AMEX stock markets) across industries and investigate 10 different privacy pertinent factors in them. The study reveals interesting trends: for example, more than 30% of the companies still lack privacy policies, and the rest tend to collect users’ information but claim to use it only for the intended purpose. Furthermore, almost one out of every two companies provides the collected information to law enforcement without asking for a warrant or subpoena. We found that the majority of the companies do not collect children’s PII, one out of every three companies lets users correct their PII but does not allow complete deletion, and the majority post new policies online and expect the user to check the privacy policy frequently. The findings of this study can help companies improve their privacy policies, enable lawmakers to create better regulations and evaluate their effectiveness, and finally educate users with respect to the current state of privacy practices in an industry.
如今,越来越多的公司通过互联网收集客户的个人身份信息(PII)。个人身份信息滥用的惊人速度,促使企业有必要改善隐私保护措施。我们深入研究了600家公司(占纽约证券交易所、纳斯达克和美国证券交易所上市公司总数的10%)各行业的隐私政策,并调查了其中10种不同的隐私相关因素。这项研究揭示了一些有趣的趋势:例如,超过30%的公司仍然缺乏隐私政策,其余的公司倾向于收集用户信息,但声称只将其用于预期目的。此外,几乎每两家公司中就有一家在没有申请搜查令或传票的情况下向执法部门提供收集到的信息。我们发现,大多数公司不收集儿童的PII,三分之一的公司允许用户更正他们的PII,但不允许完全删除,大多数公司在网上发布新的政策,并希望用户经常检查隐私政策。本研究的发现可以帮助公司改进其隐私政策,使立法者能够制定更好的法规并评估其有效性,并最终教育用户尊重行业隐私实践的现状。
{"title":"A study of web privacy policies across industries","authors":"Razieh Nokhbeh Zaeem, Suzanne Barber","doi":"10.1080/15536548.2017.1394064","DOIUrl":"https://doi.org/10.1080/15536548.2017.1394064","url":null,"abstract":"ABSTRACT Today, more than ever, companies collect their customers’ Personally Identifiable Information (PII) over the Internet. The alarming rate of PII misuse drives the need for improving companies’ privacy practices. We thoroughly study privacy policies of 600 companies (10% of all listings on NYSE, Nasdaq, and AMEX stock markets) across industries and investigate 10 different privacy pertinent factors in them. The study reveals interesting trends: for example, more than 30% of the companies still lack privacy policies, and the rest tend to collect users’ information but claim to use it only for the intended purpose. Furthermore, almost one out of every two companies provides the collected information to law enforcement without asking for a warrant or subpoena. We found that the majority of the companies do not collect children’s PII, one out of every three companies lets users correct their PII but does not allow complete deletion, and the majority post new policies online and expect the user to check the privacy policy frequently. The findings of this study can help companies improve their privacy policies, enable lawmakers to create better regulations and evaluate their effectiveness, and finally educate users with respect to the current state of privacy practices in an industry.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2017-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84982831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Long-term market implications of data breaches, not 数据泄露的长期市场影响,不是
IF 0.8 Q3 Computer Science Pub Date : 2017-10-02 DOI: 10.1080/15536548.2017.1394070
Russell Lange, Eric W. Burger
ABSTRACT This report assesses the impact disclosure of data breaches has on the total returns and volatility of the affected companies’ stock, with a focus on the results relative to the performance of the firms’ peer industries, as represented through selected indices rather than the market as a whole. financial performance is considered over a range of dates from 3 days post-breach through 6 months post-breach, in order to provide a longer-term perspective on the impact of the breach announcement.
本报告评估了数据泄露披露对受影响公司股票的总回报和波动性的影响,重点关注与公司同行行业绩效相关的结果,通过选定的指数而不是整个市场来表示。财务表现是在违约后3天到6个月的一系列日期内考虑的,以便对违约公告的影响提供更长远的看法。
{"title":"Long-term market implications of data breaches, not","authors":"Russell Lange, Eric W. Burger","doi":"10.1080/15536548.2017.1394070","DOIUrl":"https://doi.org/10.1080/15536548.2017.1394070","url":null,"abstract":"ABSTRACT This report assesses the impact disclosure of data breaches has on the total returns and volatility of the affected companies’ stock, with a focus on the results relative to the performance of the firms’ peer industries, as represented through selected indices rather than the market as a whole. financial performance is considered over a range of dates from 3 days post-breach through 6 months post-breach, in order to provide a longer-term perspective on the impact of the breach announcement.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2017-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81518220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Detecting and preventing inference attacks in online social networks: A data-driven and holistic framework 在线社交网络中的推理攻击检测与预防:一个数据驱动的整体框架
IF 0.8 Q3 Computer Science Pub Date : 2017-07-03 DOI: 10.1080/15536548.2017.1357383
Xiaoyun He, Haibing Lu
ABSTRACT With increasing user involvement, social networks nowadays serve as a repository of all kinds of information. While there have been various studies demonstrating that private information can be inferred from social networks, few have taken a holistic view on designing mechanisms to detect and alleviate the inference attacks. In this study, we present a framework that leverages the social network data and data mining techniques to proactively detect and prevent possible inference attacks against users. A novel method is proposed to minimize the modifications to user profiles in order to prevent inference attacks while preserving the utility.
随着用户参与度的提高,社交网络如今成为了各种信息的储存库。虽然有各种各样的研究表明,私人信息可以从社交网络中推断出来,但很少有人从整体上看待设计检测和减轻推理攻击的机制。在这项研究中,我们提出了一个框架,利用社交网络数据和数据挖掘技术来主动检测和防止可能的针对用户的推理攻击。提出了一种最小化用户配置文件修改的新方法,以防止推理攻击,同时保持实用性。
{"title":"Detecting and preventing inference attacks in online social networks: A data-driven and holistic framework","authors":"Xiaoyun He, Haibing Lu","doi":"10.1080/15536548.2017.1357383","DOIUrl":"https://doi.org/10.1080/15536548.2017.1357383","url":null,"abstract":"ABSTRACT With increasing user involvement, social networks nowadays serve as a repository of all kinds of information. While there have been various studies demonstrating that private information can be inferred from social networks, few have taken a holistic view on designing mechanisms to detect and alleviate the inference attacks. In this study, we present a framework that leverages the social network data and data mining techniques to proactively detect and prevent possible inference attacks against users. A novel method is proposed to minimize the modifications to user profiles in order to prevent inference attacks while preserving the utility.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2017-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81957611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy protection and adding security strength 保护隐私,增加安全力度
IF 0.8 Q3 Computer Science Pub Date : 2017-07-03 DOI: 10.1080/15536548.2017.1357381
Chuleeporn Changchit, K. Bagchi
This is the third issue of 2017. I am glad to see that the journal continues to grow and we have begun to see articles submitted from many countries of the world as well as a variety of topics. The current issue includes a wide spectrum of articles. The main focus lies on the issues of protecting consumers’ privacy as well as strengthening the security by using a stronger password. The first article titled “Detecting and Preventing Inference Attacks in Online Social Networks: A DataDriven and Holistic Framework” by Xiaoyun He and Haibing Lu proposed a framework to alleviate the rule-based inference problem by detecting and breaking the inferences that are represented as rules of attributes and/or attribute values. The authors believed that the proposed framework should enable individual users to check their online profiles for satisfaction of their privacy preferences and allow them tomodify profiles to prevent the disclosure of private information. In this article, the authors also proposed a novel method to minimize the modifications to user profiles in order to prevent inference attacks while preserving the utility. In the second article titled “Invasion of Privacy by Smart Meters: An Analysis of Consumer Concerns,” the authors ZiyueHuang andPrashant Palvia developed an instrument tomeasure the consumers’ concerns for information privacy (CFIP) in adopting smart meters. They then proposed a conceptual model to examine the relationship between privacy concerns, trusting beliefs, risk beliefs, and intention to adopt smart meters. Based on the data collected from 217 survey respondents, the study findings revealed that consumers’ information privacy concerns about adopting smart meters can be measured by three dimensions: collection, secondary use, and improper access. In addition, the effect of information privacy concerns on behavioral intention is fully mediated by risk beliefs. The result also suggested that among the control variables, education has a positive effect on intention, while privacy experience has a negative effect. The third article titled “Valuing Information Security: A Look at the Influence of User Engagement on Information Security Strength” by Randall J. Boyle, Chandrashekar D. Challa, and Jeffrey A. Clements focused on the influence of user engagement on users’ information security practices. The study took a closer look at the passwords people are using. The authors pointed out that password strength is affected by some factors, such as the length of the password, the types of characters people used, the number of duplicate passwords, and the number of uncrackable passwords. The main focus of this study is to understand why some people choose better passwords than others. The findings generally support the view that higher levels of engagement are associated with stronger passwords. In the Book Review section, FarukArslan reviews the book titledWeapons ofMathDestruction: HowBig Data Increases Inequality and Threatens Demo
这是2017年的第三期。我很高兴看到杂志继续发展,我们已经开始看到来自世界许多国家的文章,以及各种各样的主题。这一期包括各种各样的文章。主要的焦点在于保护消费者的隐私以及通过使用更强的密码来加强安全性的问题。第一篇文章《在线社交网络中的推理攻击检测与预防:一个数据驱动的整体框架》由何晓云和陆海兵提出了一个框架,通过检测和破坏以属性和/或属性值规则表示的推理来缓解基于规则的推理问题。作者认为,建议的框架应该使个人用户能够检查他们的在线个人资料,以满足他们的隐私偏好,并允许他们修改个人资料,以防止私人信息泄露。在本文中,作者还提出了一种新的方法来减少对用户配置文件的修改,以防止推理攻击,同时保持实用性。在第二篇题为“智能电表对隐私的侵犯:消费者关注的分析”的文章中,作者ZiyueHuang和prashant Palvia开发了一种工具来衡量消费者在采用智能电表时对信息隐私的关注(CFIP)。然后,他们提出了一个概念模型来检验隐私问题、信任信念、风险信念和采用智能电表的意图之间的关系。根据217名调查对象的数据,研究结果显示,消费者对采用智能电表的信息隐私担忧可以从三个维度来衡量:收集、二次使用和不当访问。此外,信息隐私关注对行为意向的影响完全由风险信念介导。结果还表明,在控制变量中,教育程度对意向有正向影响,隐私体验对意向有负向影响。第三篇文章题为“重视信息安全:用户参与对信息安全强度的影响”,作者是Randall J. Boyle、Chandrashekar D. Challa和Jeffrey A. Clements,重点关注用户参与对用户信息安全实践的影响。这项研究仔细研究了人们使用的密码。作者指出,密码强度受到一些因素的影响,比如密码的长度、人们使用的字符类型、重复密码的数量以及不可破解密码的数量。这项研究的主要重点是了解为什么有些人比其他人选择更好的密码。研究结果普遍支持这样一种观点,即用户参与度越高,密码越强。在书评部分,FarukArslan评论了Cathy O 'Neil的《数学毁灭武器:大数据如何加剧不平等并威胁民主》一书。本书由10章组成,讨论了数据科学应用的不足。总的来说,Arslan博士发现这本书是一本有趣的,写得很好,书中包含了许多现实生活中的例子,对于研究人员和从业者来说都是一样的。在他看来,这本书应该被纳入任何专注于数据科学的严肃学术课程。
{"title":"Privacy protection and adding security strength","authors":"Chuleeporn Changchit, K. Bagchi","doi":"10.1080/15536548.2017.1357381","DOIUrl":"https://doi.org/10.1080/15536548.2017.1357381","url":null,"abstract":"This is the third issue of 2017. I am glad to see that the journal continues to grow and we have begun to see articles submitted from many countries of the world as well as a variety of topics. The current issue includes a wide spectrum of articles. The main focus lies on the issues of protecting consumers’ privacy as well as strengthening the security by using a stronger password. The first article titled “Detecting and Preventing Inference Attacks in Online Social Networks: A DataDriven and Holistic Framework” by Xiaoyun He and Haibing Lu proposed a framework to alleviate the rule-based inference problem by detecting and breaking the inferences that are represented as rules of attributes and/or attribute values. The authors believed that the proposed framework should enable individual users to check their online profiles for satisfaction of their privacy preferences and allow them tomodify profiles to prevent the disclosure of private information. In this article, the authors also proposed a novel method to minimize the modifications to user profiles in order to prevent inference attacks while preserving the utility. In the second article titled “Invasion of Privacy by Smart Meters: An Analysis of Consumer Concerns,” the authors ZiyueHuang andPrashant Palvia developed an instrument tomeasure the consumers’ concerns for information privacy (CFIP) in adopting smart meters. They then proposed a conceptual model to examine the relationship between privacy concerns, trusting beliefs, risk beliefs, and intention to adopt smart meters. Based on the data collected from 217 survey respondents, the study findings revealed that consumers’ information privacy concerns about adopting smart meters can be measured by three dimensions: collection, secondary use, and improper access. In addition, the effect of information privacy concerns on behavioral intention is fully mediated by risk beliefs. The result also suggested that among the control variables, education has a positive effect on intention, while privacy experience has a negative effect. The third article titled “Valuing Information Security: A Look at the Influence of User Engagement on Information Security Strength” by Randall J. Boyle, Chandrashekar D. Challa, and Jeffrey A. Clements focused on the influence of user engagement on users’ information security practices. The study took a closer look at the passwords people are using. The authors pointed out that password strength is affected by some factors, such as the length of the password, the types of characters people used, the number of duplicate passwords, and the number of uncrackable passwords. The main focus of this study is to understand why some people choose better passwords than others. The findings generally support the view that higher levels of engagement are associated with stronger passwords. In the Book Review section, FarukArslan reviews the book titledWeapons ofMathDestruction: HowBig Data Increases Inequality and Threatens Demo","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2017-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74660056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Invasion of privacy by smart meters: An analysis of consumer concerns 智能电表对隐私的侵犯:对消费者担忧的分析
IF 0.8 Q3 Computer Science Pub Date : 2017-07-03 DOI: 10.1080/15536548.2017.1357385
Ziyue Huang, Prashant C. Palvia
ABSTRACT While smart meters offer an innovative way to solve energy problems, they have also brought concerns regarding consumer privacy. In this study, we develop an instrument to measure the consumers’ concerns for information privacy (CFIP) in adopting smart meters, and propose a conceptual model to examine the relationship between privacy concerns, trusting beliefs, risk beliefs, and intention to adopt smart meters. Using both focus group study and survey methods, we show that CFIP can be measured by three dimensions: collection, secondary use, and improper access, and that the effect of CFIP on behavioral intention is fully mediated by risk beliefs.
智能电表为解决能源问题提供了一种创新的方式,但同时也带来了对消费者隐私的担忧。在本研究中,我们开发了一种测量消费者在采用智能电表时对信息隐私的关注(CFIP)的工具,并提出了一个概念模型来研究隐私关注、信任信念、风险信念和采用智能电表意愿之间的关系。采用焦点小组研究和问卷调查的方法,我们发现CFIP可以通过收集、二次使用和不正当获取三个维度进行测量,并且CFIP对行为意向的影响完全由风险信念介导。
{"title":"Invasion of privacy by smart meters: An analysis of consumer concerns","authors":"Ziyue Huang, Prashant C. Palvia","doi":"10.1080/15536548.2017.1357385","DOIUrl":"https://doi.org/10.1080/15536548.2017.1357385","url":null,"abstract":"ABSTRACT While smart meters offer an innovative way to solve energy problems, they have also brought concerns regarding consumer privacy. In this study, we develop an instrument to measure the consumers’ concerns for information privacy (CFIP) in adopting smart meters, and propose a conceptual model to examine the relationship between privacy concerns, trusting beliefs, risk beliefs, and intention to adopt smart meters. Using both focus group study and survey methods, we show that CFIP can be measured by three dimensions: collection, secondary use, and improper access, and that the effect of CFIP on behavioral intention is fully mediated by risk beliefs.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2017-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80868750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy, by Cathy O’Neil 《数学毁灭武器:大数据如何加剧不平等并威胁民主》,作者凯茜·奥尼尔
IF 0.8 Q3 Computer Science Pub Date : 2017-07-03 DOI: 10.1080/15536548.2017.1357388
Faruk Arslan
Data science has become one of the prominent topics both in academia and in industry in the recent years. With the growing capability of big data technologies coupled with many extant quantitative ...
近年来,数据科学已成为学术界和工业界的重要话题之一。随着大数据技术能力的不断增强,加上许多现有的定量…
{"title":"Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy, by Cathy O’Neil","authors":"Faruk Arslan","doi":"10.1080/15536548.2017.1357388","DOIUrl":"https://doi.org/10.1080/15536548.2017.1357388","url":null,"abstract":"Data science has become one of the prominent topics both in academia and in industry in the recent years. With the growing capability of big data technologies coupled with many extant quantitative ...","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2017-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78063633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
International Journal of Information Security and Privacy
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1