首页 > 最新文献

International Journal of Information Security and Privacy最新文献

英文 中文
The impact of attitudinal factors on intention to report workplace Internet abuse 态度因素对职场网络滥用举报意向的影响
IF 0.8 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2016-04-02 DOI: 10.1080/15536548.2016.1160677
Matt Campbell, Antonis C. Stylianou, Jordan Shropshire
ABSTRACT Why do employees actually report workplace Internet abuse? The prevailing theory is that employees make deliberate, calculated decisions only after weighing the pros and cons of reporting. This research proposes a behavioral model in which attitudinal factors are largely responsible for shaping employee intentions to report workplace Internet abuse. Theories of idealism, perceived organizational risk, social influence, and managerial position are synthesized to better understand workers’ motivations. A survey 315 American workers tested the proposed hypotheses and research model using structural equation modeling. Results confirm the validity of the proposed model. Each of the attitudinal factors had a significant impact on employee willingness to report Internet violations. This study underscores the importance of attitudinal factors in a space that primarily portrays employees as rational, unemotional actors.
为什么员工会举报工作场所的网络滥用行为?流行的理论是,员工只有在权衡报告的利弊后,才会做出深思熟虑的、经过深思熟虑的决定。本研究提出了一个行为模型,其中态度因素在很大程度上影响了员工报告工作场所网络滥用的意愿。理论的理想主义,感知组织风险,社会影响,和管理职位的综合,以更好地了解工人的动机。一项对315名美国工人的调查使用结构方程模型对提出的假设和研究模型进行了检验。结果证实了所提模型的有效性。各态度因素对员工举报网络违规行为的意愿均有显著影响。这项研究强调了态度因素在一个主要将员工描绘成理性、不情绪化的角色的空间中的重要性。
{"title":"The impact of attitudinal factors on intention to report workplace Internet abuse","authors":"Matt Campbell, Antonis C. Stylianou, Jordan Shropshire","doi":"10.1080/15536548.2016.1160677","DOIUrl":"https://doi.org/10.1080/15536548.2016.1160677","url":null,"abstract":"ABSTRACT Why do employees actually report workplace Internet abuse? The prevailing theory is that employees make deliberate, calculated decisions only after weighing the pros and cons of reporting. This research proposes a behavioral model in which attitudinal factors are largely responsible for shaping employee intentions to report workplace Internet abuse. Theories of idealism, perceived organizational risk, social influence, and managerial position are synthesized to better understand workers’ motivations. A survey 315 American workers tested the proposed hypotheses and research model using structural equation modeling. Results confirm the validity of the proposed model. Each of the attitudinal factors had a significant impact on employee willingness to report Internet violations. This study underscores the importance of attitudinal factors in a space that primarily portrays employees as rational, unemotional actors.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"37 1","pages":"68 - 83"},"PeriodicalIF":0.8,"publicationDate":"2016-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75400485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Discovering Computers 2016: Tools, Apps, Devices, and the Impact of Technology, by Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Jennifer T. Campbell, and Mark Frydenburg 《发现计算机2016:工具、应用程序、设备和技术的影响》,作者:Misty E. Vermaat、Susan L. Sebok、Steven M. Freund、Jennifer T. Campbell和Mark Frydenburg
IF 0.8 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2016-04-02 DOI: 10.1080/15536548.2016.1174492
Faruk Arslan
Discovering Computers 2016 is the 18th edition of an evolving textbook, which has been used widely in the introductory computer education. This textbook is geared towards introducing the students to the fundamental concepts of computers and computing, along with the discussion of the most up to date technologies and current computer trends. The authors assume that their audience has no prior experience with computers; thus this textbook is well suited for a one-semester undergraduate-level introduction to computer information systems course. The authors introduce several interesting features, which can enhance the students’ learning experience. These features include the use of rich visual drawings to explain many relatively complex concepts effectively, offering interactive capabilities using web-integrated content, and providing students with the practical knowledge relevant to their day-to-day activities. Within the context of information security and privacy, I find two features of this book very relevant and of significance: Secure IT and Ethics & Issues sections. These two sections exist in every chapter and enable the students to broaden their knowledge or challenge their understanding of the security and ethical issues surrounding the topic being discussed.
发现计算机2016是第18版不断发展的教科书,已广泛用于计算机入门教育。这本教科书旨在向学生介绍计算机和计算的基本概念,同时讨论最新的技术和当前的计算机趋势。作者假设他们的读者没有使用计算机的经验;因此,本教材非常适合一个学期的本科计算机信息系统导论课程。作者介绍了几个有趣的功能,可以提高学生的学习体验。这些功能包括使用丰富的视觉图形来有效地解释许多相对复杂的概念,提供使用网络集成内容的交互功能,并为学生提供与他们日常活动相关的实用知识。在信息安全和隐私的背景下,我发现这本书的两个特点非常相关和重要:安全IT和道德与问题部分。这两个部分存在于每一章,使学生拓宽他们的知识或挑战他们对安全和伦理问题的理解围绕正在讨论的主题。
{"title":"Discovering Computers 2016: Tools, Apps, Devices, and the Impact of Technology, by Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Jennifer T. Campbell, and Mark Frydenburg","authors":"Faruk Arslan","doi":"10.1080/15536548.2016.1174492","DOIUrl":"https://doi.org/10.1080/15536548.2016.1174492","url":null,"abstract":"Discovering Computers 2016 is the 18th edition of an evolving textbook, which has been used widely in the introductory computer education. This textbook is geared towards introducing the students to the fundamental concepts of computers and computing, along with the discussion of the most up to date technologies and current computer trends. The authors assume that their audience has no prior experience with computers; thus this textbook is well suited for a one-semester undergraduate-level introduction to computer information systems course. The authors introduce several interesting features, which can enhance the students’ learning experience. These features include the use of rich visual drawings to explain many relatively complex concepts effectively, offering interactive capabilities using web-integrated content, and providing students with the practical knowledge relevant to their day-to-day activities. Within the context of information security and privacy, I find two features of this book very relevant and of significance: Secure IT and Ethics & Issues sections. These two sections exist in every chapter and enable the students to broaden their knowledge or challenge their understanding of the security and ethical issues surrounding the topic being discussed.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"97 1","pages":"103 - 104"},"PeriodicalIF":0.8,"publicationDate":"2016-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82151750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Twibel: A matter of Internet privacy Twibel:一个网络隐私问题
IF 0.8 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2016-04-02 DOI: 10.1080/15536548.2016.1160678
Raymond L. Placid, J. Wynekoop
ABSTRACT Social media websites have become a powerful communication tool, where an individual can communicate with one person or millions of people at once. As a consequence, individuals are utilizing social media to report newsworthy events, as well as to post opinions, which may include posting negative information about another person or entity that can be harmful to such person’s or entity’s reputation (i.e., defamation), a phenomenon that is new to the legal system. This article reviews the legal precedent in the United States that addresses the legal impact of a defamatory statement sent through a social media website such as Twitter. Although the law in the United States is evolving, precedent indicates that the website’s nature is generally less important than the nature of the communication. However, the law is not settled for cases in which a private tweet is released into the public domain unintentionally or by an accidental cause, such as a software defect.
社交媒体网站已经成为一种强大的沟通工具,个人可以同时与一个人或数百万人进行沟通。因此,个人正在利用社交媒体报道有新闻价值的事件,以及发表意见,其中可能包括发布关于另一个人或实体的负面信息,这些信息可能会损害该人或实体的声誉(即诽谤),这是一种新的法律制度现象。本文回顾了美国的法律先例,这些先例解决了通过Twitter等社交媒体网站发送的诽谤声明的法律影响。尽管美国的法律在不断发展,但先例表明,网站的性质通常不如通讯的性质重要。然而,如果私人推特无意中或由于软件缺陷等意外原因被发布到公共领域,该法律就不会得到解决。
{"title":"Twibel: A matter of Internet privacy","authors":"Raymond L. Placid, J. Wynekoop","doi":"10.1080/15536548.2016.1160678","DOIUrl":"https://doi.org/10.1080/15536548.2016.1160678","url":null,"abstract":"ABSTRACT Social media websites have become a powerful communication tool, where an individual can communicate with one person or millions of people at once. As a consequence, individuals are utilizing social media to report newsworthy events, as well as to post opinions, which may include posting negative information about another person or entity that can be harmful to such person’s or entity’s reputation (i.e., defamation), a phenomenon that is new to the legal system. This article reviews the legal precedent in the United States that addresses the legal impact of a defamatory statement sent through a social media website such as Twitter. Although the law in the United States is evolving, precedent indicates that the website’s nature is generally less important than the nature of the communication. However, the law is not settled for cases in which a private tweet is released into the public domain unintentionally or by an accidental cause, such as a software defect.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"1 1","pages":"84 - 92"},"PeriodicalIF":0.8,"publicationDate":"2016-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89743173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Editorial preface 编辑前言
IF 0.8 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2016-04-02 DOI: 10.1080/15536548.2016.1174490
K. Bagchi
The second issue of JIPS, 2016 contains four interesting research articles. The first article titled, “The impact of exposure to news about electronic government surveillance on concerns about government intrusion, privacy self-efficacy, and privacy protective behavior” is authored by Stanislav Mamonov and Marios Koufaris. The authors observe that the exposure to news about government surveillance results in an increase in the level of concerns about government intrusion. They also find that this exposure has a negative impact on privacy self-efficacy. The second article titled, “The impact of attitudinal factors on intention to report workplace Internet abuse,” by Matt Campbell, Antonis Stylianou, and Jordan Shropshire found that employees are not always rational and unemotional, and that the importance of attitudinal factors matter. They developed a structured equation model (SEM) and tested it, finding that factors such as perceived organizational risk and social influence are highly significant in explaining intention to report workplace internet abuse. The third article titled, “Twibel: A matter of Internet privacy,” by Raymond Placid and Judy Wynekoop deals with the important issue of communications on a social media website. They observe that the legal precedent indicates that the nature of the website (i.e., Twitter) is generally less important than the nature of the communication. They also note that when a private tweet is released into the public domain unintentionally, the law is unclear. The fourth article titled, “Social media policies in the Department of Defense—Do they address the risk?,” by Katherine “Suzy” Cole-Miller, William “Doug” Ward, Ann Fruhling, and Kathryn Dempsey Cooper examines the social media policies of the U.S. Department of Defense. The study provides recommendations based on the analysis and review of the policies. In the Book Review section, Faruk Arslan reviews the book, Discovering Computers 2016: Tools, Apps, Devices, and the Impact of Technology, by Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Jennifer T. Campbell, and Mark Frydenburg. Faruk observes that the textbook is well suited for a one-semester undergraduate-level introduction to computer information systems course. We acknowledge services of Dr. Adolfo S. Coronado (Department of Computer Science, Indiana University-Purdue University Fort Wayne) as a book reviewer. We thank him all for his thoughtful book reviews. Thanks are also due to our Editorial Board members and Associate Editors for their untiring efforts to provide critical reviews in a timely manner.
2016年第2期《JIPS》收录了4篇有趣的研究文章。第一篇文章的标题是“曝光电子政府监控新闻对政府入侵、隐私自我效能和隐私保护行为的影响”,作者是斯坦尼斯拉夫·马莫诺夫和马里奥斯·库法里斯。作者观察到,有关政府监控的新闻曝光导致对政府入侵的担忧程度增加。他们还发现,这种暴露对隐私自我效能有负面影响。第二篇文章题为“态度因素对举报工作场所网络滥用的影响”,作者是Matt Campbell, Antonis Stylianou和Jordan Shropshire,他们发现员工并不总是理性和冷静的,态度因素的重要性很重要。他们开发了一个结构化方程模型(SEM)并对其进行了测试,发现诸如感知组织风险和社会影响等因素在解释报告工作场所网络虐待的意图方面非常重要。第三篇文章的标题是“微博:互联网隐私问题”,作者是雷蒙德·普莱西德和朱迪·温尼库普,讨论的是社交媒体网站上交流的重要问题。他们观察到,法律先例表明,网站(即Twitter)的性质通常不如通信的性质重要。他们还指出,当一条私人推文无意中被发布到公共领域时,法律是不明确的。第四篇文章题为“国防部的社交媒体政策——它们解决风险了吗?”,由凯瑟琳·“苏西”·科尔-米勒、威廉·“道格”·沃德、安·弗鲁林和凯瑟琳·邓普西·库珀合著,探讨了美国国防部的社交媒体政策。该研究在分析和审查政策的基础上提出建议。在书评部分,Faruk Arslan评论了《发现计算机2016:工具、应用程序、设备和技术的影响》一书,作者是Misty E. Vermaat、Susan L. Sebok、Steven M. Freund、Jennifer T. Campbell和Mark Frydenburg。Faruk观察到,这本教科书非常适合一个学期的本科水平的计算机信息系统入门课程。我们感谢Adolfo S. Coronado博士(印第安纳大学-普渡大学韦恩堡分校计算机科学系)为我们提供的书评服务。我们感谢他所有人深思熟虑的书评。我们也要感谢我们的编辑委员会成员和副编辑们的不懈努力,他们及时提供了重要的评论。
{"title":"Editorial preface","authors":"K. Bagchi","doi":"10.1080/15536548.2016.1174490","DOIUrl":"https://doi.org/10.1080/15536548.2016.1174490","url":null,"abstract":"The second issue of JIPS, 2016 contains four interesting research articles. The first article titled, “The impact of exposure to news about electronic government surveillance on concerns about government intrusion, privacy self-efficacy, and privacy protective behavior” is authored by Stanislav Mamonov and Marios Koufaris. The authors observe that the exposure to news about government surveillance results in an increase in the level of concerns about government intrusion. They also find that this exposure has a negative impact on privacy self-efficacy. The second article titled, “The impact of attitudinal factors on intention to report workplace Internet abuse,” by Matt Campbell, Antonis Stylianou, and Jordan Shropshire found that employees are not always rational and unemotional, and that the importance of attitudinal factors matter. They developed a structured equation model (SEM) and tested it, finding that factors such as perceived organizational risk and social influence are highly significant in explaining intention to report workplace internet abuse. The third article titled, “Twibel: A matter of Internet privacy,” by Raymond Placid and Judy Wynekoop deals with the important issue of communications on a social media website. They observe that the legal precedent indicates that the nature of the website (i.e., Twitter) is generally less important than the nature of the communication. They also note that when a private tweet is released into the public domain unintentionally, the law is unclear. The fourth article titled, “Social media policies in the Department of Defense—Do they address the risk?,” by Katherine “Suzy” Cole-Miller, William “Doug” Ward, Ann Fruhling, and Kathryn Dempsey Cooper examines the social media policies of the U.S. Department of Defense. The study provides recommendations based on the analysis and review of the policies. In the Book Review section, Faruk Arslan reviews the book, Discovering Computers 2016: Tools, Apps, Devices, and the Impact of Technology, by Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Jennifer T. Campbell, and Mark Frydenburg. Faruk observes that the textbook is well suited for a one-semester undergraduate-level introduction to computer information systems course. We acknowledge services of Dr. Adolfo S. Coronado (Department of Computer Science, Indiana University-Purdue University Fort Wayne) as a book reviewer. We thank him all for his thoughtful book reviews. Thanks are also due to our Editorial Board members and Associate Editors for their untiring efforts to provide critical reviews in a timely manner.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"35 1","pages":"55 - 55"},"PeriodicalIF":0.8,"publicationDate":"2016-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82519756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recent survey of various defense mechanisms against phishing attacks 针对网络钓鱼攻击的各种防御机制的最新调查
IF 0.8 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2016-01-02 DOI: 10.1080/15536548.2016.1139423
A. Tewari, A. Jain, B. Gupta
ABSTRACT In the recent years, the phishing attack has become one of the most serious threats faced by Internet users, organizations, and service providers. In a phishing attack, the attacker tries to defraud Internet users and steal their personal information either by using spoofed emails or by using fake websites or both. Several approaches have been proposed in the literature for the detection and filtering of phishing attacks; however, the Internet community is still looking for a complete solution to secure the Internet from these attacks. This article discusses recent developments and protection mechanisms (i.e., detection and filtering) against a variety of phishing attacks (e.g., email phishing, website phishing, zero-day attacks). In addition, the strengths and weaknesses of these approaches is discussed. This article provides a better understanding of the phishing attack problem in the current solution space and also addresses the scope of future research to deal with such attacks efficiently.
近年来,网络钓鱼攻击已经成为互联网用户、组织和服务提供商面临的最严重的威胁之一。在网络钓鱼攻击中,攻击者试图通过欺骗电子邮件或使用虚假网站或两者兼而有之来欺骗互联网用户并窃取他们的个人信息。文献中提出了几种检测和过滤网络钓鱼攻击的方法;然而,互联网社区仍在寻找一个完整的解决方案,以确保互联网免受这些攻击。本文讨论了针对各种网络钓鱼攻击(如电子邮件网络钓鱼、网站网络钓鱼、零日攻击)的最新发展和保护机制(即检测和过滤)。此外,还讨论了这些方法的优缺点。本文提供了对当前解决方案空间中的网络钓鱼攻击问题的更好理解,并讨论了有效处理此类攻击的未来研究范围。
{"title":"Recent survey of various defense mechanisms against phishing attacks","authors":"A. Tewari, A. Jain, B. Gupta","doi":"10.1080/15536548.2016.1139423","DOIUrl":"https://doi.org/10.1080/15536548.2016.1139423","url":null,"abstract":"ABSTRACT In the recent years, the phishing attack has become one of the most serious threats faced by Internet users, organizations, and service providers. In a phishing attack, the attacker tries to defraud Internet users and steal their personal information either by using spoofed emails or by using fake websites or both. Several approaches have been proposed in the literature for the detection and filtering of phishing attacks; however, the Internet community is still looking for a complete solution to secure the Internet from these attacks. This article discusses recent developments and protection mechanisms (i.e., detection and filtering) against a variety of phishing attacks (e.g., email phishing, website phishing, zero-day attacks). In addition, the strengths and weaknesses of these approaches is discussed. This article provides a better understanding of the phishing attack problem in the current solution space and also addresses the scope of future research to deal with such attacks efficiently.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"33 1","pages":"13 - 3"},"PeriodicalIF":0.8,"publicationDate":"2016-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84996877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Privacy-preserved data publishing of evolving online social networks 不断发展的在线社交网络的隐私保护数据发布
IF 0.8 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2016-01-02 DOI: 10.1080/15536548.2016.1143765
Wei Chang, Jie Wu
ABSTRACT The increasing growth of online social networks provides an unprecedented opportunity to study the complex interactions among human beings. Privacy-preserved network-data publishing is becoming increasingly popular in both industry and academia. This articles focuses on evolving social subscription networks (ESSN), which indicate social actors’ participation in certain media channels, such as Hollywood stars’ Twitter pages, during a series of time intervals. The discussion first introduces a new identity disclosure attack by exploring the subscribed channel sizes of a social actor and the actor’s frequency of joining/leaving the channels. For privacy protection, K-anonymity should be ensured for the whole evolving graph. However, unlike the conventional topology information, such as node degree, the ESSN data points are much more sparse. Moreover, during the construction of anonymous groups, the unpopular channel-related information is likely to be discarded. How to maximally preserve ESSN data utility during anonymization is an open problem. These authors propose an effective three-step framework to solve it: data space compression, anonymity construction, and realizable publishing. Also provided are comprehensive studies on the performance of this approach. Extensive results show that this approach is effective in terms of privacy, utility, and efficacy. To the best of the knowledge of these authors, this work is the first systematic study to the anonymization of time-evolving multi-relation graphs.
在线社交网络的日益增长为研究人类之间复杂的互动提供了前所未有的机会。保护隐私的网络数据发布在工业界和学术界都越来越受欢迎。本文关注的是不断发展的社会订阅网络(ESSN),它表明社会行动者在一定时间间隔内参与某些媒体渠道,如好莱坞明星的Twitter页面。该讨论首先介绍了一种新的身份披露攻击,通过探索一个社会参与者的订阅频道大小和参与者加入/离开频道的频率。为了保护隐私,需要保证整个演化图的k -匿名性。然而,与传统的拓扑信息(如节点度)不同,ESSN数据点更加稀疏。此外,在匿名群组的建设过程中,不受欢迎的频道相关信息很可能被丢弃。如何在匿名化期间最大限度地保留ESSN数据效用是一个悬而未决的问题。这些作者提出了一个有效的三步框架来解决这个问题:数据空间压缩、匿名构建和可实现发布。还提供了对该方法性能的全面研究。广泛的结果表明,这种方法在隐私、实用性和有效性方面是有效的。据这些作者所知,这项工作是第一次系统地研究时间演变的多关系图的匿名化。
{"title":"Privacy-preserved data publishing of evolving online social networks","authors":"Wei Chang, Jie Wu","doi":"10.1080/15536548.2016.1143765","DOIUrl":"https://doi.org/10.1080/15536548.2016.1143765","url":null,"abstract":"ABSTRACT The increasing growth of online social networks provides an unprecedented opportunity to study the complex interactions among human beings. Privacy-preserved network-data publishing is becoming increasingly popular in both industry and academia. This articles focuses on evolving social subscription networks (ESSN), which indicate social actors’ participation in certain media channels, such as Hollywood stars’ Twitter pages, during a series of time intervals. The discussion first introduces a new identity disclosure attack by exploring the subscribed channel sizes of a social actor and the actor’s frequency of joining/leaving the channels. For privacy protection, K-anonymity should be ensured for the whole evolving graph. However, unlike the conventional topology information, such as node degree, the ESSN data points are much more sparse. Moreover, during the construction of anonymous groups, the unpopular channel-related information is likely to be discarded. How to maximally preserve ESSN data utility during anonymization is an open problem. These authors propose an effective three-step framework to solve it: data space compression, anonymity construction, and realizable publishing. Also provided are comprehensive studies on the performance of this approach. Extensive results show that this approach is effective in terms of privacy, utility, and efficacy. To the best of the knowledge of these authors, this work is the first systematic study to the anonymization of time-evolving multi-relation graphs.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"15 12 1","pages":"14 - 31"},"PeriodicalIF":0.8,"publicationDate":"2016-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86921015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Mechanism design for Data Replica Placement (DRP) problem in strategic settings 战略环境下数据副本放置(DRP)问题的机制设计
IF 0.8 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2016-01-02 DOI: 10.1080/15536548.2016.1139425
Minzhe Guo, P. Bhattacharya
ABSTRACT This article addresses the problem of Data Replica Placement, an important technique used in storage-capable distributed networks to improve system availability, reliability, and fault-tolerance. The study focuses on the Data Replica Placement problem in strategic settings inspired by practical market-based data replication applications, such as content delivery networks. Multiple self-interested players with private preferences own data objects for replication. Players compete for storage space among replication servers for placing replicas with the objective to optimize their own profits. Using mechanism design approach, the authors consider the problem as a sequential composition of knapsack auctions and design an algorithmic mechanism DRPMECH to aggregate players’ preferences and approximate a social efficient allocation for the problem. This work analyzes both the economic and computational properties of DRPMECH, validates the properties using experiments, and compares its performance against related game-theoretical solutions.
本文讨论了数据副本放置问题,这是一种在具有存储能力的分布式网络中用于提高系统可用性、可靠性和容错性的重要技术。该研究主要关注基于市场的实际数据复制应用(如内容交付网络)所启发的战略设置中的数据副本放置问题。多个具有私有偏好的自利参与者拥有用于复制的数据对象。玩家在复制服务器之间争夺存储空间,以放置副本,以优化自己的利润。采用机制设计方法,将该问题视为背包拍卖的连续组合,并设计了一种算法机制DRPMECH来汇总参与者的偏好并近似求解该问题的社会有效分配。本文分析了DRPMECH的经济和计算特性,通过实验验证了其特性,并将其性能与相关博弈论解决方案进行了比较。
{"title":"Mechanism design for Data Replica Placement (DRP) problem in strategic settings","authors":"Minzhe Guo, P. Bhattacharya","doi":"10.1080/15536548.2016.1139425","DOIUrl":"https://doi.org/10.1080/15536548.2016.1139425","url":null,"abstract":"ABSTRACT This article addresses the problem of Data Replica Placement, an important technique used in storage-capable distributed networks to improve system availability, reliability, and fault-tolerance. The study focuses on the Data Replica Placement problem in strategic settings inspired by practical market-based data replication applications, such as content delivery networks. Multiple self-interested players with private preferences own data objects for replication. Players compete for storage space among replication servers for placing replicas with the objective to optimize their own profits. Using mechanism design approach, the authors consider the problem as a sequential composition of knapsack auctions and design an algorithmic mechanism DRPMECH to aggregate players’ preferences and approximate a social efficient allocation for the problem. This work analyzes both the economic and computational properties of DRPMECH, validates the properties using experiments, and compares its performance against related game-theoretical solutions.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"15 1","pages":"32 - 54"},"PeriodicalIF":0.8,"publicationDate":"2016-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79929156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Special Issue on Attacks and Distinct Features in Networks 网络攻击与特征特刊
IF 0.8 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2016-01-02 DOI: 10.1080/15536548.2016.1139422
D. Agrawal
Emergence of Internet of Things (IoT) has enlarged the scope of the network even in daily life, and today many household items are being served or connected together. Due to such infiltration of networking, the need for security and secured communication has become increasingly important. Security simply means protection from any potential harm to valuable assets (data and/or information) or deterrence of malicious behavior. In contrast, secured communication implies two communicating entities should not be heard or modified by any third person. That type of communication means the encrypted shared information between two entities cannot be interpreted by anyone else as information is encoded by the sender that can be easily decoded by the intended receiver. If transmission is achieved in multi-hop fashion, the paths should not be traceable by unauthorized entities. Other than spoken face-to-face interaction, it can be generalized that no communication is guaranteed to be secure; despite trying to provide all technical support, the sheer volume of communication could limit the amount of surveillance. This Special Issue addresses some of these issues in wired communication. This Special Issue contains three articles dealing with different aspects of attacks. These outbreaks are possible by intruders and phishing attacks sending an email to the victim that appears to be from a legitimate organization. The idea is to obtain the victim’s credentials at some false webpage or install some spyware on the victim’s machine. This type of attack has become one of the most serious threats to all Internet users. Several approaches have been considered in the literature. The first article deals with a comprehensive solution to detect and filter the various types of phishing attacks. These attacks include email phishing that an attacker can easily perform by copying any legitimate website, whereas detection of phishing attacks is not as easy as it appears. Such an attack can be initiated when an attacker sends a spoofed email with embedded malicious links to a user to update their account information that appears to be legitimate. More attention is being paid to the use of phishing links on the Internet in sending promotional and monetary e-mails to attract the users. Strengths and associated weakness of different approaches have been considered and recent developments have been included. The scope of future research has also been outlined in this article. The growth of on-line social networks has been explosive, even though maintaining privacy is becoming important both in Industry and Academia. Most of the existing works on the privacypreserved online social networks are based on static graphs. Users’ social interests are used to form “channel subscriptions”. Exploring a social actor’s subscribed channel sizes and the frequency of joining/leaving the channels can be used to indicate multiple relations among social actors that represent evolving social subscri
物联网(IoT)的出现扩大了网络的范围,甚至在日常生活中,今天许多家庭物品都被服务或连接在一起。由于网络的这种渗透,对安全和安全通信的需求变得越来越重要。安全仅仅意味着防止对有价值资产(数据和/或信息)的任何潜在损害,或阻止恶意行为。相比之下,安全通信意味着两个通信实体不应被任何第三方听到或修改。这种类型的通信意味着两个实体之间加密的共享信息不能被其他任何人解释,因为信息是由发送方编码的,可以很容易地被预期的接收方解码。如果传输是以多跳方式实现的,则未经授权的实体不应该跟踪路径。除了口头的面对面交流,可以概括地说,没有任何交流是保证安全的;尽管试图提供所有技术支持,但庞大的通信量可能会限制监控的数量。本期专题讨论了有线通信中的一些问题。本期特刊包含三篇文章,讨论攻击的不同方面。这些爆发可能是由入侵者和网络钓鱼攻击向受害者发送看似来自合法组织的电子邮件造成的。这个想法是在一些虚假的网页上获取受害者的凭据,或者在受害者的机器上安装一些间谍软件。这种类型的攻击已经成为对所有互联网用户最严重的威胁之一。文献中考虑了几种方法。第一篇文章讨论了一个全面的解决方案,用于检测和过滤各种类型的网络钓鱼攻击。这些攻击包括电子邮件网络钓鱼,攻击者可以通过复制任何合法网站轻松执行,而检测网络钓鱼攻击并不像看起来那么容易。当攻击者向用户发送带有嵌入恶意链接的欺骗电子邮件,以更新其看似合法的帐户信息时,就可以发起此类攻击。越来越多的人注意到利用互联网上的钓鱼链接发送促销和金钱电子邮件来吸引用户。已经考虑了不同方法的优点和相关缺点,并包括了最近的发展。本文还概述了未来的研究范围。在线社交网络呈爆炸式增长,尽管保护隐私在工业界和学术界都变得越来越重要。现有的大多数关于隐私保护的在线社交网络的研究都是基于静态图形的。用户的社会兴趣被用来形成“频道订阅”。探索一个社会参与者的订阅渠道规模和加入/离开渠道的频率可以用来表明社会参与者之间的多重关系,这些关系代表了一个超图的不断发展的社会订阅网络(ESSN)。但是,由于其独特的结构,ESSN容易受到空间和时间攻击。将稀疏数据划分为几个匿名组的方式确实会影响其效用。攻击者可能仍然能够识别一些节点,即使它们可能具有相同的节点秩序列。订阅不同通道的节点可能导致不适当的分组。为了避免这种情况,第二篇文章首先对数据空间进行压缩和粗略分区,然后采用等效通道的新概念,这有助于ESSN的匿名化。为了保护隐私,需要对整个网络进行k匿名化确认,使每个组的成员无法区分。第二篇文章题为“保护隐私”
{"title":"Special Issue on Attacks and Distinct Features in Networks","authors":"D. Agrawal","doi":"10.1080/15536548.2016.1139422","DOIUrl":"https://doi.org/10.1080/15536548.2016.1139422","url":null,"abstract":"Emergence of Internet of Things (IoT) has enlarged the scope of the network even in daily life, and today many household items are being served or connected together. Due to such infiltration of networking, the need for security and secured communication has become increasingly important. Security simply means protection from any potential harm to valuable assets (data and/or information) or deterrence of malicious behavior. In contrast, secured communication implies two communicating entities should not be heard or modified by any third person. That type of communication means the encrypted shared information between two entities cannot be interpreted by anyone else as information is encoded by the sender that can be easily decoded by the intended receiver. If transmission is achieved in multi-hop fashion, the paths should not be traceable by unauthorized entities. Other than spoken face-to-face interaction, it can be generalized that no communication is guaranteed to be secure; despite trying to provide all technical support, the sheer volume of communication could limit the amount of surveillance. This Special Issue addresses some of these issues in wired communication. This Special Issue contains three articles dealing with different aspects of attacks. These outbreaks are possible by intruders and phishing attacks sending an email to the victim that appears to be from a legitimate organization. The idea is to obtain the victim’s credentials at some false webpage or install some spyware on the victim’s machine. This type of attack has become one of the most serious threats to all Internet users. Several approaches have been considered in the literature. The first article deals with a comprehensive solution to detect and filter the various types of phishing attacks. These attacks include email phishing that an attacker can easily perform by copying any legitimate website, whereas detection of phishing attacks is not as easy as it appears. Such an attack can be initiated when an attacker sends a spoofed email with embedded malicious links to a user to update their account information that appears to be legitimate. More attention is being paid to the use of phishing links on the Internet in sending promotional and monetary e-mails to attract the users. Strengths and associated weakness of different approaches have been considered and recent developments have been included. The scope of future research has also been outlined in this article. The growth of on-line social networks has been explosive, even though maintaining privacy is becoming important both in Industry and Academia. Most of the existing works on the privacypreserved online social networks are based on static graphs. Users’ social interests are used to form “channel subscriptions”. Exploring a social actor’s subscribed channel sizes and the frequency of joining/leaving the channels can be used to indicate multiple relations among social actors that represent evolving social subscri","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"8 1","pages":"1 - 2"},"PeriodicalIF":0.8,"publicationDate":"2016-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74028833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information Security and Privacy: 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part I 信息安全和隐私:第21届澳大利亚会议,ACISP 2016,墨尔本,维多利亚州,澳大利亚,2016年7月4-6日,会议录,第一部分
IF 0.8 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2016-01-01 DOI: 10.1007/978-3-319-40253-6
Wei Chen, Xiapu Luo, Chengyu Yin, Bin Xiao, M. Au, Yajuan Tang
{"title":"Information Security and Privacy: 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part I","authors":"Wei Chen, Xiapu Luo, Chengyu Yin, Bin Xiao, M. Au, Yajuan Tang","doi":"10.1007/978-3-319-40253-6","DOIUrl":"https://doi.org/10.1007/978-3-319-40253-6","url":null,"abstract":"","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"37 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2016-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84232276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information Assurance for the Enterprise: A Roadmap to Information Security, by C. Schou and D. Shoemaker 《企业信息保障:信息安全路线图》,作者:C. Schou和D. Shoemaker
IF 0.8 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2015-10-02 DOI: 10.1080/15536548.2015.1105662
Adolfo S. Coronado
{"title":"Information Assurance for the Enterprise: A Roadmap to Information Security, by C. Schou and D. Shoemaker","authors":"Adolfo S. Coronado","doi":"10.1080/15536548.2015.1105662","DOIUrl":"https://doi.org/10.1080/15536548.2015.1105662","url":null,"abstract":"","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"32 1","pages":"274 - 275"},"PeriodicalIF":0.8,"publicationDate":"2015-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80653752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
International Journal of Information Security and Privacy
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1