编辑前言

IF 0.5 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING International Journal of Information Security and Privacy Pub Date : 2015-07-03 DOI:10.1080/15536548.2015.1073505
K. Bagchi
{"title":"编辑前言","authors":"K. Bagchi","doi":"10.1080/15536548.2015.1073505","DOIUrl":null,"url":null,"abstract":"The third 2015 issue of JIPS contains three exciting research articles in addition to an interview with a leading business consultant and a review of a new “classic” book. Mobile malware detection is not an easy task. The first paper titled, “M0Droid, An Android Behavioral-Based Malware Detection Model” by Mohsen Damshenas, Ali Dehghantanha, KimKwang Raymond Choo and Ramlan Mahmud, deals with M0Droid, a behavioral-based Android malware detection technique. The authors propose a method to generate standardized mobile malware signatures and a method for comparing generated signatures. Running M0Droid against Genome dataset yields impressive detection rates. The second paper titled, “Investigating Factors Influencing Web-Browsing Safety Efficacy (WSE) Among Older Adults” by Victoria Kisekka, Rajarshi Chakraborty, Sharmistha BagchiSen, and H. Raghav Rao looks into the ability of older adults to anticipate online threats. Several factors that influence older adults’ ability to distinguish between safe and unsafe websites were investigated with partial least square (PLS) regression analysis using a set of older adults age 55 years and older. The authors find that factors such as risk aversion, security education, and perceived ability in finding information online were positively associated with web-browsing safety. The third paper titled, “Information Security: SETA Program Status at Jordanian Universities” by Mohammad S. Eyadat delves into the important issue of the information security education awareness training (SETA) program at universities in Jordan. The author found a high rate of unawareness of security with no education and training programs available in the surveyed universities. In the Expert Opinion section, Choton Basu interviews Allen Hsieh, a consultant from China who recently consulted with Accenture in China. Hsieh observes that a big percentage of the phones in China are either jail-broken or otherwise problematic, and thus they are easier targets for exploits. In the Book Review section, Adolfo Coronado reviews “Introduction to Computer Security” authored by M. Goodrich & R. Tamassia and published by Addison-Wesley. Adolfo observes that the selection of topics in this book is relevant to any introductory book in computer security,","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"25 1","pages":"139 - 140"},"PeriodicalIF":0.5000,"publicationDate":"2015-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Editorial Preface\",\"authors\":\"K. Bagchi\",\"doi\":\"10.1080/15536548.2015.1073505\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The third 2015 issue of JIPS contains three exciting research articles in addition to an interview with a leading business consultant and a review of a new “classic” book. Mobile malware detection is not an easy task. The first paper titled, “M0Droid, An Android Behavioral-Based Malware Detection Model” by Mohsen Damshenas, Ali Dehghantanha, KimKwang Raymond Choo and Ramlan Mahmud, deals with M0Droid, a behavioral-based Android malware detection technique. The authors propose a method to generate standardized mobile malware signatures and a method for comparing generated signatures. Running M0Droid against Genome dataset yields impressive detection rates. The second paper titled, “Investigating Factors Influencing Web-Browsing Safety Efficacy (WSE) Among Older Adults” by Victoria Kisekka, Rajarshi Chakraborty, Sharmistha BagchiSen, and H. Raghav Rao looks into the ability of older adults to anticipate online threats. Several factors that influence older adults’ ability to distinguish between safe and unsafe websites were investigated with partial least square (PLS) regression analysis using a set of older adults age 55 years and older. The authors find that factors such as risk aversion, security education, and perceived ability in finding information online were positively associated with web-browsing safety. The third paper titled, “Information Security: SETA Program Status at Jordanian Universities” by Mohammad S. Eyadat delves into the important issue of the information security education awareness training (SETA) program at universities in Jordan. The author found a high rate of unawareness of security with no education and training programs available in the surveyed universities. In the Expert Opinion section, Choton Basu interviews Allen Hsieh, a consultant from China who recently consulted with Accenture in China. Hsieh observes that a big percentage of the phones in China are either jail-broken or otherwise problematic, and thus they are easier targets for exploits. In the Book Review section, Adolfo Coronado reviews “Introduction to Computer Security” authored by M. Goodrich & R. Tamassia and published by Addison-Wesley. Adolfo observes that the selection of topics in this book is relevant to any introductory book in computer security,\",\"PeriodicalId\":44332,\"journal\":{\"name\":\"International Journal of Information Security and Privacy\",\"volume\":\"25 1\",\"pages\":\"139 - 140\"},\"PeriodicalIF\":0.5000,\"publicationDate\":\"2015-07-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Information Security and Privacy\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1080/15536548.2015.1073505\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"COMPUTER SCIENCE, SOFTWARE ENGINEERING\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Information Security and Privacy","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/15536548.2015.1073505","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, SOFTWARE ENGINEERING","Score":null,"Total":0}
引用次数: 0

摘要

2015年第三期《JIPS》包含三篇令人兴奋的研究文章,以及对一位领先商业顾问的采访和对一本新的“经典”书籍的评论。手机恶意软件检测不是一件容易的事。Mohsen Damshenas、Ali Dehghantanha、KimKwang Raymond Choo和Ramlan Mahmud撰写的第一篇论文《M0Droid,基于Android行为的恶意软件检测模型》讨论了基于行为的Android恶意软件检测技术M0Droid。提出了一种生成标准化移动恶意软件签名的方法和一种比较生成签名的方法。在基因组数据集上运行M0Droid产生了令人印象深刻的检测率。第二篇论文题为“调查影响老年人网络浏览安全效果的因素”,作者是Victoria Kisekka、Rajarshi Chakraborty、Sharmistha BagchiSen和H. Raghav Rao,研究了老年人预测网络威胁的能力。影响老年人区分安全与不安全网站能力的几个因素采用偏最小二乘(PLS)回归分析对一组年龄在55岁及以上的老年人进行了调查。作者发现,风险规避、安全教育和在线查找信息的感知能力等因素与网络浏览安全呈正相关。第三篇论文题为“信息安全:约旦大学的SETA计划现状”,作者Mohammad S. Eyadat深入研究了约旦大学信息安全教育意识培训(SETA)计划的重要问题。作者发现,在被调查的大学中,由于没有提供教育和培训计划,安全意识不强的比例很高。在专家意见部分,Choton Basu采访了来自中国的顾问Allen Hsieh,他最近在埃森哲中国咨询。Hsieh观察到,中国有很大比例的手机要么是越狱的,要么是有其他问题的,因此它们更容易成为攻击目标。在书评部分,Adolfo Coronado评论了由M. Goodrich和R. Tamassia撰写并由Addison-Wesley出版的《计算机安全导论》。Adolfo注意到,本书的主题选择与任何计算机安全入门书籍都是相关的,
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Editorial Preface
The third 2015 issue of JIPS contains three exciting research articles in addition to an interview with a leading business consultant and a review of a new “classic” book. Mobile malware detection is not an easy task. The first paper titled, “M0Droid, An Android Behavioral-Based Malware Detection Model” by Mohsen Damshenas, Ali Dehghantanha, KimKwang Raymond Choo and Ramlan Mahmud, deals with M0Droid, a behavioral-based Android malware detection technique. The authors propose a method to generate standardized mobile malware signatures and a method for comparing generated signatures. Running M0Droid against Genome dataset yields impressive detection rates. The second paper titled, “Investigating Factors Influencing Web-Browsing Safety Efficacy (WSE) Among Older Adults” by Victoria Kisekka, Rajarshi Chakraborty, Sharmistha BagchiSen, and H. Raghav Rao looks into the ability of older adults to anticipate online threats. Several factors that influence older adults’ ability to distinguish between safe and unsafe websites were investigated with partial least square (PLS) regression analysis using a set of older adults age 55 years and older. The authors find that factors such as risk aversion, security education, and perceived ability in finding information online were positively associated with web-browsing safety. The third paper titled, “Information Security: SETA Program Status at Jordanian Universities” by Mohammad S. Eyadat delves into the important issue of the information security education awareness training (SETA) program at universities in Jordan. The author found a high rate of unawareness of security with no education and training programs available in the surveyed universities. In the Expert Opinion section, Choton Basu interviews Allen Hsieh, a consultant from China who recently consulted with Accenture in China. Hsieh observes that a big percentage of the phones in China are either jail-broken or otherwise problematic, and thus they are easier targets for exploits. In the Book Review section, Adolfo Coronado reviews “Introduction to Computer Security” authored by M. Goodrich & R. Tamassia and published by Addison-Wesley. Adolfo observes that the selection of topics in this book is relevant to any introductory book in computer security,
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
International Journal of Information Security and Privacy
International Journal of Information Security and Privacy COMPUTER SCIENCE, SOFTWARE ENGINEERING-
CiteScore
2.50
自引率
0.00%
发文量
73
期刊介绍: As information technology and the Internet become more and more ubiquitous and pervasive in our daily lives, there is an essential need for a more thorough understanding of information security and privacy issues and concerns. The International Journal of Information Security and Privacy (IJISP) creates and fosters a forum where research in the theory and practice of information security and privacy is advanced. IJISP publishes high quality papers dealing with a wide range of issues, ranging from technical, legal, regulatory, organizational, managerial, cultural, ethical and human aspects of information security and privacy, through a balanced mix of theoretical and empirical research articles, case studies, book reviews, tutorials, and editorials. This journal encourages submission of manuscripts that present research frameworks, methods, methodologies, theory development and validation, case studies, simulation results and analysis, technological architectures, infrastructure issues in design, and implementation and maintenance of secure and privacy preserving initiatives.
期刊最新文献
Adaptive Personalized Randomized Response Method Based on Local Differential Privacy A Novel CNN-LSTM Fusion-Based Intrusion Detection Method for Industrial Internet A System Dynamics Approach to Evaluate Advanced Persistent Threat Vectors Trust and Voice Biometrics Authentication for Internet of Things “Every Dog Has His Day”
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1