Pub Date : 2018-05-31DOI: 10.14257/IJSIA.2018.12.3.02
M. Sayegh, Karine Aoun Barakat
{"title":"Privacy and Disclosure: Customer Attitudes Towards the Use of Big Data by Retail Companies","authors":"M. Sayegh, Karine Aoun Barakat","doi":"10.14257/IJSIA.2018.12.3.02","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.3.02","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48346153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-31DOI: 10.14257/ijsia.2018.12.3.01
N. Thirupathi Rao, C. Sekhar, D. Bhattacharyya, Tai-hoon Kim
{"title":"Some Studies on the Security and Space Issues and Challenges in Cloud Computing based Data Centers","authors":"N. Thirupathi Rao, C. Sekhar, D. Bhattacharyya, Tai-hoon Kim","doi":"10.14257/ijsia.2018.12.3.01","DOIUrl":"https://doi.org/10.14257/ijsia.2018.12.3.01","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42691192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-31DOI: 10.14257/IJSIA.2018.12.2.01
Atheer Bassel, J. Nordin, Mohammed B. Abdulkareem
{"title":"An Invisible Image Watermarking Based On Modified Particle Swarm Optimization (PSO) Algorithm","authors":"Atheer Bassel, J. Nordin, Mohammed B. Abdulkareem","doi":"10.14257/IJSIA.2018.12.2.01","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.2.01","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.14257/IJSIA.2018.12.2.01","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41313745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-31DOI: 10.14257/IJSIA.2018.12.2.02
Nur Farhana Hordri, Noor Azurati Ahmad, S. Yuhaniz, S. Sahibuddin, A. Ariffin, Nur Afifah Mohd Saupi, N. Zamani, Yasmin Jeffry, Mohamad Firham Efendy Md. Senan
Context: Malware is a variety of forms of hostile or intrusive software that being thrown around online. Data analytics is the process of examining data sets in order to draw conclusions about information they contain, increasingly with the aid of specialized systems and software. Objectives: The aims of the study are to identify the types of malware analytics and identify the purpose of malware analytics. Method: A Systematic Literature Review (SLR) was carried out and reported based on the preferred reporting items for systematic reviews. 1114 papers were retrieved by manual search in six databases which are IEEE, Science Direct, Taylor and Francis, ACM, Wiley and Springer Link. 53 primary studies were finally included. Results: From these studies, 70% were conference papers and 30% were journal articles. Five classification of malware analytics techniques were identified and analysed. The classifications are (1) descriptive analytics, (2) diagnostic analytics, (3) predictive analytics, (4) prescriptive analytics and (5) visual analytics. Conclusion: This review delivers the evidence that malware analytics is an active research area. The review provides researchers with some guidelines for future research on this topic. It also provides broad information on malware analytics techniques which could be useful for practitioners.
背景:恶意软件是各种形式的恶意或侵入性软件,被扔在网上。数据分析是检查数据集的过程,目的是得出关于其中包含的信息的结论,越来越多地借助专门的系统和软件。目的:本研究的目的是确定恶意软件分析的类型和确定恶意软件分析的目的。方法:进行系统文献综述(SLR),并根据系统评价的首选报告项目进行报告。在IEEE、Science Direct、Taylor and Francis、ACM、Wiley和施普林格Link 6个数据库中人工检索论文1114篇,最终纳入53篇主要研究。结果:这些研究中,70%为会议论文,30%为期刊论文。识别并分析了五种类型的恶意软件分析技术。分类是(1)描述性分析,(2)诊断性分析,(3)预测性分析,(4)规定性分析和(5)可视化分析。结论:这篇综述提供了恶意软件分析是一个活跃的研究领域的证据。该综述为今后的研究提供了一些指导。它还提供了关于恶意软件分析技术的广泛信息,这可能对从业者有用。
{"title":"Classification of Malware Analytics Techniques: A Systematic Literature Review","authors":"Nur Farhana Hordri, Noor Azurati Ahmad, S. Yuhaniz, S. Sahibuddin, A. Ariffin, Nur Afifah Mohd Saupi, N. Zamani, Yasmin Jeffry, Mohamad Firham Efendy Md. Senan","doi":"10.14257/IJSIA.2018.12.2.02","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.2.02","url":null,"abstract":"Context: Malware is a variety of forms of hostile or intrusive software that being thrown around online. Data analytics is the process of examining data sets in order to draw conclusions about information they contain, increasingly with the aid of specialized systems and software. Objectives: The aims of the study are to identify the types of malware analytics and identify the purpose of malware analytics. Method: A Systematic Literature Review (SLR) was carried out and reported based on the preferred reporting items for systematic reviews. 1114 papers were retrieved by manual search in six databases which are IEEE, Science Direct, Taylor and Francis, ACM, Wiley and Springer Link. 53 primary studies were finally included. Results: From these studies, 70% were conference papers and 30% were journal articles. Five classification of malware analytics techniques were identified and analysed. The classifications are (1) descriptive analytics, (2) diagnostic analytics, (3) predictive analytics, (4) prescriptive analytics and (5) visual analytics. Conclusion: This review delivers the evidence that malware analytics is an active research area. The review provides researchers with some guidelines for future research on this topic. It also provides broad information on malware analytics techniques which could be useful for practitioners.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42472902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-31DOI: 10.14257/IJSIA.2018.12.2.06
A. Siahaan
{"title":"Rabin-Karp Elaboration in Comparing Pattern Based on Hash Data","authors":"A. Siahaan","doi":"10.14257/IJSIA.2018.12.2.06","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.2.06","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.14257/IJSIA.2018.12.2.06","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47273205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-31DOI: 10.14257/IJSIA.2018.12.2.05
Manal Al-Sharrah, Mohammad A. Alkandari
{"title":"Towards a More Secured Solution in RDP: On-Demand Desktop Local Admin Rights","authors":"Manal Al-Sharrah, Mohammad A. Alkandari","doi":"10.14257/IJSIA.2018.12.2.05","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.2.05","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43790756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-31DOI: 10.14257/IJSIA.2018.12.2.07
N. Thirupathi Rao, P. Srinivas, D. Bhattacharyya, Tai-hoon Kim
{"title":"A Detailed Review on Mobile Ad Hoc Networks: Protocols, Security Issues and Challenges","authors":"N. Thirupathi Rao, P. Srinivas, D. Bhattacharyya, Tai-hoon Kim","doi":"10.14257/IJSIA.2018.12.2.07","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.2.07","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47793399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-31DOI: 10.14257/IJSIA.2018.12.2.03
Anurag Singh Tomar, Sumit Kumar, S. K. Chaurasiya, Vanshika Shrivastava
{"title":"Novel Approach for E-passport Authentication using Elgamal Cryptosystem","authors":"Anurag Singh Tomar, Sumit Kumar, S. K. Chaurasiya, Vanshika Shrivastava","doi":"10.14257/IJSIA.2018.12.2.03","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.2.03","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43828571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-31DOI: 10.14257/ijsia.2018.12.2.04
Huiyun Chen, X. Qin
{"title":"Query-Dependency-Aware Location Privacy Protection for Road Networks","authors":"Huiyun Chen, X. Qin","doi":"10.14257/ijsia.2018.12.2.04","DOIUrl":"https://doi.org/10.14257/ijsia.2018.12.2.04","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46767341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-01-31DOI: 10.14257/IJSIA.2018.12.1.06
Fiza Abdul Rahim, Gopinath Muruti, Z. Ismail, Ganthan Narayana Samy
Healthcare organizationsprocess massive amount of electronic medical records (EMR) utilizedby their employees. Having given privileged access to sensitive and valuable patient information in the EMR, healthcare employees may cause privacy breaches, which may lead to detrimental consequences. Therefore, it is vital to impose particular attention to healthcare employees’ concerns on privacy in the use of EMR. The purpose of this paper is to indicate the results from quantitative analysis (phase 1) through qualitative analysis (phase 2). From phase 1, privacy awareness is the only factor that influences information privacy concerns (IPC) in the use of EMRamong healthcare employees, suggesting that healthcare employees do not think that privacy policy, privacy control, privacy risk, and privacy experience influence their IPC. To investigate why the respondents answered in this manner, the interviewees were asked to clarify why they think privacy awareness is veryimportant to ensure the IPC among healthcare employees. Indeed, the mediating relationship of privacy awareness between privacy policy and IPC were discussed by highlighting on the implementation practices regarding privacy policy enforcement and awareness programs in healthcare organization.
{"title":"A qualitative analysis of information privacy concerns among healthcare employees.","authors":"Fiza Abdul Rahim, Gopinath Muruti, Z. Ismail, Ganthan Narayana Samy","doi":"10.14257/IJSIA.2018.12.1.06","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.1.06","url":null,"abstract":"Healthcare organizationsprocess massive amount of electronic medical records (EMR) utilizedby their employees. Having given privileged access to sensitive and valuable patient information in the EMR, healthcare employees may cause privacy breaches, which may lead to detrimental consequences. Therefore, it is vital to impose particular attention to healthcare employees’ concerns on privacy in the use of EMR. The purpose of this paper is to indicate the results from quantitative analysis (phase 1) through qualitative analysis (phase 2). From phase 1, privacy awareness is the only factor that influences information privacy concerns (IPC) in the use of EMRamong healthcare employees, suggesting that healthcare employees do not think that privacy policy, privacy control, privacy risk, and privacy experience influence their IPC. To investigate why the respondents answered in this manner, the interviewees were asked to clarify why they think privacy awareness is veryimportant to ensure the IPC among healthcare employees. Indeed, the mediating relationship of privacy awareness between privacy policy and IPC were discussed by highlighting on the implementation practices regarding privacy policy enforcement and awareness programs in healthcare organization.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48623959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}