首页 > 最新文献

International Journal of Information Security and Privacy最新文献

英文 中文
Valuing Information Security: A Look at the Influence of User Engagement on Information Security Strength 重视信息安全:用户参与对信息安全强度的影响
IF 0.8 Q3 Computer Science Pub Date : 2017-07-03 DOI: 10.1080/15536548.2017.1357387
Randall J. Boyle, Chandrashekar D. Challa, Jeffrey A. Clements
ABSTRACT This study looks at the influence of user engagement on users’ information security practices. A model describing how user engagement (user posts) may influence a person’s decision to employ better security measures (stronger passwords) is tested. Password strength was determined by looking at password length, the types of characters used, the variety of character sequences used, the number of duplicate passwords, and the number of uncrackable passwords. Passwords were tested using a variety of cracking techniques. This study found that individuals from an online gaming site who made more posts to the user forum employed stronger passwords.
本研究着眼于用户参与对用户信息安全实践的影响。一个描述用户参与(用户帖子)如何影响一个人决定采用更好的安全措施(更强的密码)的模型进行了测试。密码强度是通过查看密码长度、使用的字符类型、使用的字符序列的种类、重复密码的数量和不可破解密码的数量来确定的。密码测试使用了各种破解技术。这项研究发现,在一个在线游戏网站上,在用户论坛上发表更多帖子的人使用的密码更强。
{"title":"Valuing Information Security: A Look at the Influence of User Engagement on Information Security Strength","authors":"Randall J. Boyle, Chandrashekar D. Challa, Jeffrey A. Clements","doi":"10.1080/15536548.2017.1357387","DOIUrl":"https://doi.org/10.1080/15536548.2017.1357387","url":null,"abstract":"ABSTRACT This study looks at the influence of user engagement on users’ information security practices. A model describing how user engagement (user posts) may influence a person’s decision to employ better security measures (stronger passwords) is tested. Password strength was determined by looking at password length, the types of characters used, the variety of character sequences used, the number of duplicate passwords, and the number of uncrackable passwords. Passwords were tested using a variety of cracking techniques. This study found that individuals from an online gaming site who made more posts to the user forum employed stronger passwords.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2017-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72593771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Handling confidentiality and privacy on cloud-based health information systems 处理基于云的医疗信息系统的机密性和隐私性
IF 0.8 Q3 Computer Science Pub Date : 2017-04-03 DOI: 10.1080/15536548.2017.1322415
C. Serrão, Elsa Cardoso
ABSTRACT Health-related data include not only the patient’s personal information, but also specific information about the patient health problems, supplementary diagnostic examination results, and much more. All this information is extremely sensitive and should only be accessed by the proper entities and actors, for special specific purposes. Described herein is an approach to address security and privacy of health-related data based on rights management technologies, with an architecture to minimize security risks and privacy conerns. This approach consists of the reutilisation of an open-source and open-specifications rights management system, and designing and adapting the necessary components to address the specific security and privacy requirements that must be faced when managing health and patient data.
健康相关数据不仅包括患者的个人信息,还包括患者健康问题的具体信息、辅助诊断检查结果等。所有这些信息都非常敏感,只能由适当的实体和行为者出于特殊目的访问。本文描述了一种解决基于权限管理技术的健康相关数据的安全和隐私问题的方法,其架构可最大限度地减少安全风险和隐私问题。该方法包括重用开源和开放规范的权限管理系统,并设计和调整必要的组件,以解决管理健康和患者数据时必须面对的特定安全和隐私要求。
{"title":"Handling confidentiality and privacy on cloud-based health information systems","authors":"C. Serrão, Elsa Cardoso","doi":"10.1080/15536548.2017.1322415","DOIUrl":"https://doi.org/10.1080/15536548.2017.1322415","url":null,"abstract":"ABSTRACT Health-related data include not only the patient’s personal information, but also specific information about the patient health problems, supplementary diagnostic examination results, and much more. All this information is extremely sensitive and should only be accessed by the proper entities and actors, for special specific purposes. Described herein is an approach to address security and privacy of health-related data based on rights management technologies, with an architecture to minimize security risks and privacy conerns. This approach consists of the reutilisation of an open-source and open-specifications rights management system, and designing and adapting the necessary components to address the specific security and privacy requirements that must be faced when managing health and patient data.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81410868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Interview With Lionel Cassin 采访莱昂内尔·卡辛
IF 0.8 Q3 Computer Science Pub Date : 2017-04-03 DOI: 10.1080/15536548.2017.1322437
Chuleeporn Changchit
{"title":"Interview With Lionel Cassin","authors":"Chuleeporn Changchit","doi":"10.1080/15536548.2017.1322437","DOIUrl":"https://doi.org/10.1080/15536548.2017.1322437","url":null,"abstract":"","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90896504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security and Privacy in Social Networks, by Yaniv Altshuler, Yuval Elovici, Armin B. Cremers, Nadav Aharony, Alex Pentland 《社交网络中的安全和隐私》,作者:Yaniv Altshuler, Yuval Elovici, Armin B. Cremers, Nadav Aharony, Alex Pentland
IF 0.8 Q3 Computer Science Pub Date : 2017-04-03 DOI: 10.1080/15536548.2017.1322439
Faruk Arslan
Security and Privacy in Social Networks is an edited collection of an introduction and 10 scholarly articles, which are partially based on the research work presented at the Workshop on Security and Privacy in Social Networks, in connection with the 2012 IEEE Social Computing Conference. Given the growing prominence of online social networks (OSN) and their corresponding security and privacy problems, this book aims to propose solutions as well as develop a common language for use between researchers and practitioners. The authors organized the book into 11 chapters, dedicating the first chapter to introduction and the remaining 10 to research articles. In the upcoming paragraphs, I will provide a review of the key ideas discussed in each chapter and then conclude my review.
《社交网络中的安全和隐私》是一本编辑过的介绍和10篇学术文章的合集,其中部分内容基于在社交网络安全和隐私研讨会上发表的研究工作,该研讨会与2012年IEEE社交计算会议有关。鉴于在线社交网络(OSN)及其相应的安全和隐私问题日益突出,本书旨在提出解决方案,并开发一种通用语言,供研究人员和从业人员使用。作者将该书分为11章,第一章是绪论,其余10章是研究文章。在接下来的段落中,我将对每章中讨论的关键思想进行回顾,然后总结我的回顾。
{"title":"Security and Privacy in Social Networks, by Yaniv Altshuler, Yuval Elovici, Armin B. Cremers, Nadav Aharony, Alex Pentland","authors":"Faruk Arslan","doi":"10.1080/15536548.2017.1322439","DOIUrl":"https://doi.org/10.1080/15536548.2017.1322439","url":null,"abstract":"Security and Privacy in Social Networks is an edited collection of an introduction and 10 scholarly articles, which are partially based on the research work presented at the Workshop on Security and Privacy in Social Networks, in connection with the 2012 IEEE Social Computing Conference. Given the growing prominence of online social networks (OSN) and their corresponding security and privacy problems, this book aims to propose solutions as well as develop a common language for use between researchers and practitioners. The authors organized the book into 11 chapters, dedicating the first chapter to introduction and the remaining 10 to research articles. In the upcoming paragraphs, I will provide a review of the key ideas discussed in each chapter and then conclude my review.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76347677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
What Affects Users to Click on Display Ads on Social Media? The Roles of Message Values, Involvement, and Security 是什么影响用户点击社交媒体上的展示广告?消息值、参与和安全性的角色
IF 0.8 Q3 Computer Science Pub Date : 2017-04-03 DOI: 10.1080/15536548.2017.1322434
E. Mao, Jing Zhang
ABSTRACT This project represents one of the few efforts in studying the effectiveness of social media advertising (ads). Specifically, the effects of three major communication components—message, channel/media, and receiver/audience—on ad clicks are examined. The message component includes perceived informativeness, entertainment, and intrusiveness of the ad; the media component focuses on social media security and the audience component focuses on their involvement. The effects of ad clicks on product evaluations and then on intentions to spread positive word-of-mouth are also investigated. A research model is developed and tested with online-survey data from 572 social media users. The contributions, practical implications, and future research directions are discussed in the context of social media.
本项目是研究社交媒体广告有效性的少数努力之一。具体来说,三个主要的通信组件——消息、渠道/媒体和接收者/受众——对广告点击的影响进行了研究。信息组件包括广告的感知信息性、娱乐性和侵入性;媒体部分侧重于社交媒体安全,受众部分侧重于他们的参与。广告点击对产品评价的影响,然后对传播积极口碑的意图也进行了调查。通过572名社交媒体用户的在线调查数据,建立了一个研究模型并进行了测试。本文以社交媒体为背景,讨论了本文的贡献、现实意义和未来的研究方向。
{"title":"What Affects Users to Click on Display Ads on Social Media? The Roles of Message Values, Involvement, and Security","authors":"E. Mao, Jing Zhang","doi":"10.1080/15536548.2017.1322434","DOIUrl":"https://doi.org/10.1080/15536548.2017.1322434","url":null,"abstract":"ABSTRACT This project represents one of the few efforts in studying the effectiveness of social media advertising (ads). Specifically, the effects of three major communication components—message, channel/media, and receiver/audience—on ad clicks are examined. The message component includes perceived informativeness, entertainment, and intrusiveness of the ad; the media component focuses on social media security and the audience component focuses on their involvement. The effects of ad clicks on product evaluations and then on intentions to spread positive word-of-mouth are also investigated. A research model is developed and tested with online-survey data from 572 social media users. The contributions, practical implications, and future research directions are discussed in the context of social media.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85172767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
The Effect of Procedural and Technological Security Countermeasures on the Propensity to Misuse Medical Data 程序和技术安全对策对医疗数据滥用倾向的影响
IF 0.8 Q3 Computer Science Pub Date : 2017-04-03 DOI: 10.1080/15536548.2017.1322421
W. Arunothong, D. Nazareth
ABSTRACT As healthcare providers seek to comply with HIPAA and endeavor to secure their data from external breaches, they also need to realize that another threat to misuse of this data is inappropriate internal use by employees. Not all instances of misuse constitute a HIPAA violation, but they have the potential to become one. Medical data misuse by employees can be alleviated and curbed through the appropriate use of procedural and technological countermeasures. This paper seeks to determine whether electronic health records (EHR) policy and auditing procedures play a role in the propensity of providers to misuse medical data. Through an on-line survey of US physicians, nurses, medical students, and nursing students, using four case vignettes representing various forms of misuse, this research found that providers who were more aware of institutional security policy were more likely to adhere to policies than their counterparts who were not similarly informed. Likewise, providers who believed that their organizations monitored their EHR usage were less likely to engage in misuse than their counterparts who believed they were not monitored. The findings underscore the need for healthcare organizations to emphasize the importance of HIPAA compliance, and inform employees about the steps that the institution takes to maintain compliance, both from a procedural as well as technological standpoint. This study suggests that increasing the awareness of security and policy measures among employees is a vital part of preventing misuse.
当医疗保健提供者寻求遵守HIPAA并努力保护其数据免受外部泄露时,他们也需要意识到员工内部不适当使用这些数据是滥用这些数据的另一个威胁。并不是所有的滥用行为都违反了HIPAA,但它们有可能成为违反HIPAA的行为。雇员滥用医疗数据可以通过适当使用程序和技术对策来减轻和遏制。本文旨在确定电子健康记录(EHR)政策和审计程序是否在提供者滥用医疗数据的倾向中发挥作用。通过对美国医生、护士、医学生和护理学生的在线调查,使用四个代表各种形式滥用的案例,本研究发现,更了解机构安全政策的提供者比不了解类似信息的同行更有可能遵守政策。同样地,那些认为他们的组织监控了他们的电子病历使用情况的供应商比那些认为他们没有被监控的同行更不可能滥用电子病历。调查结果强调了医疗保健组织需要强调HIPAA合规性的重要性,并从程序和技术的角度告知员工该机构为保持合规性所采取的步骤。这项研究表明,提高员工的安全意识和政策措施是防止滥用的重要组成部分。
{"title":"The Effect of Procedural and Technological Security Countermeasures on the Propensity to Misuse Medical Data","authors":"W. Arunothong, D. Nazareth","doi":"10.1080/15536548.2017.1322421","DOIUrl":"https://doi.org/10.1080/15536548.2017.1322421","url":null,"abstract":"ABSTRACT As healthcare providers seek to comply with HIPAA and endeavor to secure their data from external breaches, they also need to realize that another threat to misuse of this data is inappropriate internal use by employees. Not all instances of misuse constitute a HIPAA violation, but they have the potential to become one. Medical data misuse by employees can be alleviated and curbed through the appropriate use of procedural and technological countermeasures. This paper seeks to determine whether electronic health records (EHR) policy and auditing procedures play a role in the propensity of providers to misuse medical data. Through an on-line survey of US physicians, nurses, medical students, and nursing students, using four case vignettes representing various forms of misuse, this research found that providers who were more aware of institutional security policy were more likely to adhere to policies than their counterparts who were not similarly informed. Likewise, providers who believed that their organizations monitored their EHR usage were less likely to engage in misuse than their counterparts who believed they were not monitored. The findings underscore the need for healthcare organizations to emphasize the importance of HIPAA compliance, and inform employees about the steps that the institution takes to maintain compliance, both from a procedural as well as technological standpoint. This study suggests that increasing the awareness of security and policy measures among employees is a vital part of preventing misuse.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76303175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy and Security Concerns with Healthcare Data and Social Media Usage 医疗保健数据和社交媒体使用的隐私和安全问题
IF 0.8 Q3 Computer Science Pub Date : 2017-04-03 DOI: 10.1080/15536548.2017.1322413
Chuleeporn Changchit, K. Bagchi
First of all, I’m glad to be back on board and allow Dr. Bagchi to take a good break for a while. It is nice to be in touch with everyone again. The second issue of the Journal of Information Privacy & Security (JIPS) for 2017 contains three articles, one expert opinion, and one book review. The first two articles focus on the importance of protecting personal information and securing data in the healthcare industries. The third article discusses the influence of consumers’ security perception on their social advertising usage. In the Expert Opinion section, Mr. Lionel Cassin, an information security officer at Texas A&M University–Corpus Christi, discusses the major issues of security and privacy that the university is facing, and points out that it is crucial to improve awareness of information security and privacy on campus. In the Book Review section, Dr. Arslan reviews the book titled Security and Privacy in Social Networks by Yaniv Altshuler, Yuval Elovici, Armin B. Cremers, Nadav Aharony, and Alex Pentland. More details are as follows: The first article is titled “Handling Confidentiality and Privacy on Cloud-based Health Information Systems.” The authors Carlos Serrao and Elsa Cardoso propose an approach to minimize the security risks in health-related data based on rights management technologies. Based on a trend that the health-related data may be migrated into the cloud, opportunities are increasing for cybercriminals to commit fraud or other similar criminal schemes after directing their attacks towards health and medical data of patients. To prevent organizations from financial and reputational losses, several initiatives have been created to improve the confidentiality and privacy requirements of the health and medical information. In this article, the authors propose the usage of the rights management systems as this approach can offer a governed environment and enables critical privacy and security mechanism. Although the system will not solve all the problems, it can help reducing the impact of large data breaches, making it more difficult for potential attacker to access unprotected information. The second article, “The Effect of Procedural and Technological Security Countermeasures on the Propensity to Misuse Medical Data,” authored by Wachiraporn Arunothong and Derek L. Nazareth, discusses the healthcare providers’ concern about the threat to misuse of medical data by internal users such as their employees. Even though the use of electronic medical records (EMRs) and electronic health records (EHRs) can help increase the efficiency and effectiveness of healthcare services, it is crucial to cultivate the awareness of security and to ensure that the employees follow the policy measures to avoid misuse. The results from conducting an online survey with physicians, nurses, medical students, and nursing students revealed that the healthcare providers who have more conscious of institutional security policy were less likely to engag
首先,我很高兴能回到船上让巴奇博士好好休息一会儿。能和大家再次联系真是太好了。《信息隐私与安全杂志》2017年第二期包含三篇文章、一篇专家意见和一篇书评。前两篇文章重点介绍了在医疗保健行业中保护个人信息和保护数据的重要性。第三篇文章探讨了消费者安全感知对其社交广告使用的影响。在专家意见部分,德克萨斯A&M大学科珀斯克里斯蒂分校的信息安全官员Lionel Cassin先生讨论了该大学面临的主要安全和隐私问题,并指出提高校园信息安全和隐私意识至关重要。在书评部分,Arslan博士评论了Yaniv Altshuler、Yuval Elovici、Armin B. Cremers、Nadav Aharony和Alex Pentland合著的《社交网络中的安全和隐私》一书。更多细节如下:第一篇文章的标题是“处理基于云的医疗信息系统的机密性和隐私”。作者Carlos Serrao和Elsa Cardoso提出了一种基于权限管理技术的最小化健康相关数据安全风险的方法。基于与健康相关的数据可能迁移到云的趋势,网络犯罪分子在将攻击指向患者的健康和医疗数据后实施欺诈或其他类似犯罪计划的机会正在增加。为防止各组织遭受财务和声誉损失,已制定了若干举措,以改进对健康和医疗信息的保密和隐私要求。在本文中,作者建议使用权限管理系统,因为这种方法可以提供受治理的环境,并启用关键的隐私和安全机制。虽然该系统不会解决所有问题,但它可以帮助减少大型数据泄露的影响,使潜在的攻击者更难以访问未受保护的信息。第二篇文章,“程序和技术安全对策对滥用医疗数据倾向的影响”,由Wachiraporn Arunothong和Derek L. Nazareth撰写,讨论了医疗服务提供者对内部用户(如员工)滥用医疗数据威胁的担忧。尽管电子医疗记录(emr)和电子健康记录(EHRs)的使用有助于提高医疗保健服务的效率和有效性,但培养安全意识并确保员工遵守政策措施以避免滥用至关重要。对医生、护士、医学生和护理专业学生进行的在线调查结果显示,更了解机构安全政策的医疗保健提供者不太可能滥用。因此,医疗保健组织有必要提供一些培训,例如强大的培训,并定期进行进修培训,以教育员工了解HIPAA合规性的重要性,并从程序和技术的角度告知他们机构为保持合规性所采取的步骤。该研究的结论是,提高员工对安全和政策措施的认识是防止滥用的重要组成部分。本期最后一篇文章题为“是什么影响用户点击社交媒体上的展示广告?”《信息价值、参与和安全的角色》由毛恩和张静合著。这些作者研究了影响社交媒体广告效果的广告点击的三个主要传播成分——信息、渠道/媒体和接收者/受众。然后,他们提出了一个研究模型,并使用来自572社会杂志的在线调查数据进行了测试。2,49 - 50 https://doi.org/10.1080/15536548.2017.1322413
{"title":"Privacy and Security Concerns with Healthcare Data and Social Media Usage","authors":"Chuleeporn Changchit, K. Bagchi","doi":"10.1080/15536548.2017.1322413","DOIUrl":"https://doi.org/10.1080/15536548.2017.1322413","url":null,"abstract":"First of all, I’m glad to be back on board and allow Dr. Bagchi to take a good break for a while. It is nice to be in touch with everyone again. The second issue of the Journal of Information Privacy & Security (JIPS) for 2017 contains three articles, one expert opinion, and one book review. The first two articles focus on the importance of protecting personal information and securing data in the healthcare industries. The third article discusses the influence of consumers’ security perception on their social advertising usage. In the Expert Opinion section, Mr. Lionel Cassin, an information security officer at Texas A&M University–Corpus Christi, discusses the major issues of security and privacy that the university is facing, and points out that it is crucial to improve awareness of information security and privacy on campus. In the Book Review section, Dr. Arslan reviews the book titled Security and Privacy in Social Networks by Yaniv Altshuler, Yuval Elovici, Armin B. Cremers, Nadav Aharony, and Alex Pentland. More details are as follows: The first article is titled “Handling Confidentiality and Privacy on Cloud-based Health Information Systems.” The authors Carlos Serrao and Elsa Cardoso propose an approach to minimize the security risks in health-related data based on rights management technologies. Based on a trend that the health-related data may be migrated into the cloud, opportunities are increasing for cybercriminals to commit fraud or other similar criminal schemes after directing their attacks towards health and medical data of patients. To prevent organizations from financial and reputational losses, several initiatives have been created to improve the confidentiality and privacy requirements of the health and medical information. In this article, the authors propose the usage of the rights management systems as this approach can offer a governed environment and enables critical privacy and security mechanism. Although the system will not solve all the problems, it can help reducing the impact of large data breaches, making it more difficult for potential attacker to access unprotected information. The second article, “The Effect of Procedural and Technological Security Countermeasures on the Propensity to Misuse Medical Data,” authored by Wachiraporn Arunothong and Derek L. Nazareth, discusses the healthcare providers’ concern about the threat to misuse of medical data by internal users such as their employees. Even though the use of electronic medical records (EMRs) and electronic health records (EHRs) can help increase the efficiency and effectiveness of healthcare services, it is crucial to cultivate the awareness of security and to ensure that the employees follow the policy measures to avoid misuse. The results from conducting an online survey with physicians, nurses, medical students, and nursing students revealed that the healthcare providers who have more conscious of institutional security policy were less likely to engag","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88522801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Record Re-Identification of Swapped Numerical Microdata 交换数值微数据的记录再鉴定
IF 0.8 Q3 Computer Science Pub Date : 2017-01-02 DOI: 10.1080/15536548.2017.1281602
K. Muralidhar
ABSTRACT Government agencies, researchers, healthcare providers, and other organizations release data for public use. To protect the privacy of the data subjects, these organizations mask the data prior to release. One popular masking procedure is data swapping, by which values of records are exchanged before being released. Data swapping is one of the preferred techniques since it is simple, easy to implement, and---based on prior studies---provides a reasonable balance between disclosure risk and data utility. In this study, we investigate the ability of an adversary with limited knowledge (of just a single record) to re-identify a record in the swapped data by using a procedure that reverse engineers the data-swapping process. The study also provides the adversary with the ability to evaluate the effectiveness of the re-identification. We empirically evaluate the effectiveness of data swapping using a dataset that has been used previously to evaluate the effectiveness of masking techniques. Our results demonstrate that data swapping can be vulnerable to disclosure even against this limited knowledge adversary.
政府机构、研究人员、医疗保健提供者和其他组织发布数据供公众使用。为了保护数据主体的隐私,这些组织在发布数据之前掩盖数据。一种流行的屏蔽过程是数据交换,通过这种方法,记录的值在被释放之前被交换。数据交换是首选技术之一,因为它简单、易于实现,并且(基于先前的研究)在披露风险和数据效用之间提供了合理的平衡。在本研究中,我们研究了对手在有限的知识(只有一条记录)下通过使用反向工程数据交换过程的过程重新识别交换数据中的记录的能力。该研究还为对手提供了评估再识别有效性的能力。我们使用以前用于评估屏蔽技术有效性的数据集来经验性地评估数据交换的有效性。我们的研究结果表明,即使面对这个知识有限的对手,数据交换也容易被披露。
{"title":"Record Re-Identification of Swapped Numerical Microdata","authors":"K. Muralidhar","doi":"10.1080/15536548.2017.1281602","DOIUrl":"https://doi.org/10.1080/15536548.2017.1281602","url":null,"abstract":"ABSTRACT Government agencies, researchers, healthcare providers, and other organizations release data for public use. To protect the privacy of the data subjects, these organizations mask the data prior to release. One popular masking procedure is data swapping, by which values of records are exchanged before being released. Data swapping is one of the preferred techniques since it is simple, easy to implement, and---based on prior studies---provides a reasonable balance between disclosure risk and data utility. In this study, we investigate the ability of an adversary with limited knowledge (of just a single record) to re-identify a record in the swapped data by using a procedure that reverse engineers the data-swapping process. The study also provides the adversary with the ability to evaluate the effectiveness of the re-identification. We empirically evaluate the effectiveness of data swapping using a dataset that has been used previously to evaluate the effectiveness of masking techniques. Our results demonstrate that data swapping can be vulnerable to disclosure even against this limited knowledge adversary.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2017-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90984068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Does privacy matter to millennials? The case for personal cloud 隐私对千禧一代很重要吗?个人云的案例
IF 0.8 Q3 Computer Science Pub Date : 2017-01-02 DOI: 10.1080/15536548.2016.1243854
Murad A. Moqbel, Valerie L. Bartelt, M. Al-Suqri, A. Al-Maskari
ABSTRACT To date, there is little research on the extent to which privacy, security, and trust influence consumer technology-use decisions based on generation. We, therefore, examine, through the lens of the expectancy-valence theory, the extent to which privacy, security, and trust influence the decision to use personal cloud computing among millennials. We also examine the moderating effect of innovativeness on these relationships. Our structural equation modeling (SEM) analysis of 371 millennials shows that privacy is irrelevant for millennials when making decisions to use personal cloud and that individuals with high innovativeness tend to disregard security when making an adoption decision.
迄今为止,关于隐私、安全和信任在多大程度上影响基于世代的消费者技术使用决策的研究很少。因此,我们通过期望效价理论来研究隐私、安全和信任在多大程度上影响了千禧一代使用个人云计算的决定。我们还研究了创新对这些关系的调节作用。我们对371名千禧一代的结构方程模型(SEM)分析表明,在决定使用个人云时,隐私与千禧一代无关,具有高度创新能力的个人在做出采用决策时往往忽视安全性。
{"title":"Does privacy matter to millennials? The case for personal cloud","authors":"Murad A. Moqbel, Valerie L. Bartelt, M. Al-Suqri, A. Al-Maskari","doi":"10.1080/15536548.2016.1243854","DOIUrl":"https://doi.org/10.1080/15536548.2016.1243854","url":null,"abstract":"ABSTRACT To date, there is little research on the extent to which privacy, security, and trust influence consumer technology-use decisions based on generation. We, therefore, examine, through the lens of the expectancy-valence theory, the extent to which privacy, security, and trust influence the decision to use personal cloud computing among millennials. We also examine the moderating effect of innovativeness on these relationships. Our structural equation modeling (SEM) analysis of 371 millennials shows that privacy is irrelevant for millennials when making decisions to use personal cloud and that individuals with high innovativeness tend to disregard security when making an adoption decision.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2017-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75874888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
An examination of an e-authentication service as an intervention in e-mail risk perception 电子认证服务作为电子邮件风险感知干预的研究
IF 0.8 Q3 Computer Science Pub Date : 2017-01-02 DOI: 10.1080/15536548.2016.1257681
Rui Chen, Jingguo Wang, Tejaswini C. Herath, H. Rao
ABSTRACT In this article, we develop a three-stage study to examine the role of an e-mail authentication and identification service (eATS) intervention in affecting end-user e-mail risk perceptions. We deploy the eATS and find that it reduces users’ risk perception. Pre-intervention risk perception is found to be positively associated with user perception of the e-authentication service’s usefulness. Moreover, perceived usefulness of the service negatively relates to e-mail risk perception in the post-use stage. Finally, privacy concerns related to the e-authentication service dilute this relationship between usefulness of service and e-mail risk perception reduction.
在本文中,我们开展了一项分三个阶段的研究,以检验电子邮件认证和识别服务(eATS)干预在影响最终用户电子邮件风险感知方面的作用。我们部署了eATS,发现它降低了用户的风险感知。干预前风险感知与用户对电子认证服务有用性的感知呈正相关。此外,服务的感知有用性与使用后阶段的电子邮件风险感知负相关。最后,与电子认证服务相关的隐私问题削弱了服务有用性与降低电子邮件风险感知之间的关系。
{"title":"An examination of an e-authentication service as an intervention in e-mail risk perception","authors":"Rui Chen, Jingguo Wang, Tejaswini C. Herath, H. Rao","doi":"10.1080/15536548.2016.1257681","DOIUrl":"https://doi.org/10.1080/15536548.2016.1257681","url":null,"abstract":"ABSTRACT In this article, we develop a three-stage study to examine the role of an e-mail authentication and identification service (eATS) intervention in affecting end-user e-mail risk perceptions. We deploy the eATS and find that it reduces users’ risk perception. Pre-intervention risk perception is found to be positively associated with user perception of the e-authentication service’s usefulness. Moreover, perceived usefulness of the service negatively relates to e-mail risk perception in the post-use stage. Finally, privacy concerns related to the e-authentication service dilute this relationship between usefulness of service and e-mail risk perception reduction.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2017-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90050687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
International Journal of Information Security and Privacy
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1