{"title":"编辑前言","authors":"K. Bagchi","doi":"10.1080/15536548.2016.1174490","DOIUrl":null,"url":null,"abstract":"The second issue of JIPS, 2016 contains four interesting research articles. The first article titled, “The impact of exposure to news about electronic government surveillance on concerns about government intrusion, privacy self-efficacy, and privacy protective behavior” is authored by Stanislav Mamonov and Marios Koufaris. The authors observe that the exposure to news about government surveillance results in an increase in the level of concerns about government intrusion. They also find that this exposure has a negative impact on privacy self-efficacy. The second article titled, “The impact of attitudinal factors on intention to report workplace Internet abuse,” by Matt Campbell, Antonis Stylianou, and Jordan Shropshire found that employees are not always rational and unemotional, and that the importance of attitudinal factors matter. They developed a structured equation model (SEM) and tested it, finding that factors such as perceived organizational risk and social influence are highly significant in explaining intention to report workplace internet abuse. The third article titled, “Twibel: A matter of Internet privacy,” by Raymond Placid and Judy Wynekoop deals with the important issue of communications on a social media website. They observe that the legal precedent indicates that the nature of the website (i.e., Twitter) is generally less important than the nature of the communication. They also note that when a private tweet is released into the public domain unintentionally, the law is unclear. The fourth article titled, “Social media policies in the Department of Defense—Do they address the risk?,” by Katherine “Suzy” Cole-Miller, William “Doug” Ward, Ann Fruhling, and Kathryn Dempsey Cooper examines the social media policies of the U.S. Department of Defense. The study provides recommendations based on the analysis and review of the policies. In the Book Review section, Faruk Arslan reviews the book, Discovering Computers 2016: Tools, Apps, Devices, and the Impact of Technology, by Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Jennifer T. Campbell, and Mark Frydenburg. Faruk observes that the textbook is well suited for a one-semester undergraduate-level introduction to computer information systems course. We acknowledge services of Dr. Adolfo S. Coronado (Department of Computer Science, Indiana University-Purdue University Fort Wayne) as a book reviewer. We thank him all for his thoughtful book reviews. Thanks are also due to our Editorial Board members and Associate Editors for their untiring efforts to provide critical reviews in a timely manner.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"35 1","pages":"55 - 55"},"PeriodicalIF":0.5000,"publicationDate":"2016-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Editorial preface\",\"authors\":\"K. Bagchi\",\"doi\":\"10.1080/15536548.2016.1174490\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The second issue of JIPS, 2016 contains four interesting research articles. The first article titled, “The impact of exposure to news about electronic government surveillance on concerns about government intrusion, privacy self-efficacy, and privacy protective behavior” is authored by Stanislav Mamonov and Marios Koufaris. The authors observe that the exposure to news about government surveillance results in an increase in the level of concerns about government intrusion. They also find that this exposure has a negative impact on privacy self-efficacy. The second article titled, “The impact of attitudinal factors on intention to report workplace Internet abuse,” by Matt Campbell, Antonis Stylianou, and Jordan Shropshire found that employees are not always rational and unemotional, and that the importance of attitudinal factors matter. They developed a structured equation model (SEM) and tested it, finding that factors such as perceived organizational risk and social influence are highly significant in explaining intention to report workplace internet abuse. The third article titled, “Twibel: A matter of Internet privacy,” by Raymond Placid and Judy Wynekoop deals with the important issue of communications on a social media website. They observe that the legal precedent indicates that the nature of the website (i.e., Twitter) is generally less important than the nature of the communication. They also note that when a private tweet is released into the public domain unintentionally, the law is unclear. The fourth article titled, “Social media policies in the Department of Defense—Do they address the risk?,” by Katherine “Suzy” Cole-Miller, William “Doug” Ward, Ann Fruhling, and Kathryn Dempsey Cooper examines the social media policies of the U.S. Department of Defense. The study provides recommendations based on the analysis and review of the policies. In the Book Review section, Faruk Arslan reviews the book, Discovering Computers 2016: Tools, Apps, Devices, and the Impact of Technology, by Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Jennifer T. Campbell, and Mark Frydenburg. Faruk observes that the textbook is well suited for a one-semester undergraduate-level introduction to computer information systems course. We acknowledge services of Dr. Adolfo S. Coronado (Department of Computer Science, Indiana University-Purdue University Fort Wayne) as a book reviewer. We thank him all for his thoughtful book reviews. Thanks are also due to our Editorial Board members and Associate Editors for their untiring efforts to provide critical reviews in a timely manner.\",\"PeriodicalId\":44332,\"journal\":{\"name\":\"International Journal of Information Security and Privacy\",\"volume\":\"35 1\",\"pages\":\"55 - 55\"},\"PeriodicalIF\":0.5000,\"publicationDate\":\"2016-04-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Information Security and Privacy\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1080/15536548.2016.1174490\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"COMPUTER SCIENCE, SOFTWARE ENGINEERING\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Information Security and Privacy","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/15536548.2016.1174490","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, SOFTWARE ENGINEERING","Score":null,"Total":0}
引用次数: 0
摘要
2016年第2期《JIPS》收录了4篇有趣的研究文章。第一篇文章的标题是“曝光电子政府监控新闻对政府入侵、隐私自我效能和隐私保护行为的影响”,作者是斯坦尼斯拉夫·马莫诺夫和马里奥斯·库法里斯。作者观察到,有关政府监控的新闻曝光导致对政府入侵的担忧程度增加。他们还发现,这种暴露对隐私自我效能有负面影响。第二篇文章题为“态度因素对举报工作场所网络滥用的影响”,作者是Matt Campbell, Antonis Stylianou和Jordan Shropshire,他们发现员工并不总是理性和冷静的,态度因素的重要性很重要。他们开发了一个结构化方程模型(SEM)并对其进行了测试,发现诸如感知组织风险和社会影响等因素在解释报告工作场所网络虐待的意图方面非常重要。第三篇文章的标题是“微博:互联网隐私问题”,作者是雷蒙德·普莱西德和朱迪·温尼库普,讨论的是社交媒体网站上交流的重要问题。他们观察到,法律先例表明,网站(即Twitter)的性质通常不如通信的性质重要。他们还指出,当一条私人推文无意中被发布到公共领域时,法律是不明确的。第四篇文章题为“国防部的社交媒体政策——它们解决风险了吗?”,由凯瑟琳·“苏西”·科尔-米勒、威廉·“道格”·沃德、安·弗鲁林和凯瑟琳·邓普西·库珀合著,探讨了美国国防部的社交媒体政策。该研究在分析和审查政策的基础上提出建议。在书评部分,Faruk Arslan评论了《发现计算机2016:工具、应用程序、设备和技术的影响》一书,作者是Misty E. Vermaat、Susan L. Sebok、Steven M. Freund、Jennifer T. Campbell和Mark Frydenburg。Faruk观察到,这本教科书非常适合一个学期的本科水平的计算机信息系统入门课程。我们感谢Adolfo S. Coronado博士(印第安纳大学-普渡大学韦恩堡分校计算机科学系)为我们提供的书评服务。我们感谢他所有人深思熟虑的书评。我们也要感谢我们的编辑委员会成员和副编辑们的不懈努力,他们及时提供了重要的评论。
The second issue of JIPS, 2016 contains four interesting research articles. The first article titled, “The impact of exposure to news about electronic government surveillance on concerns about government intrusion, privacy self-efficacy, and privacy protective behavior” is authored by Stanislav Mamonov and Marios Koufaris. The authors observe that the exposure to news about government surveillance results in an increase in the level of concerns about government intrusion. They also find that this exposure has a negative impact on privacy self-efficacy. The second article titled, “The impact of attitudinal factors on intention to report workplace Internet abuse,” by Matt Campbell, Antonis Stylianou, and Jordan Shropshire found that employees are not always rational and unemotional, and that the importance of attitudinal factors matter. They developed a structured equation model (SEM) and tested it, finding that factors such as perceived organizational risk and social influence are highly significant in explaining intention to report workplace internet abuse. The third article titled, “Twibel: A matter of Internet privacy,” by Raymond Placid and Judy Wynekoop deals with the important issue of communications on a social media website. They observe that the legal precedent indicates that the nature of the website (i.e., Twitter) is generally less important than the nature of the communication. They also note that when a private tweet is released into the public domain unintentionally, the law is unclear. The fourth article titled, “Social media policies in the Department of Defense—Do they address the risk?,” by Katherine “Suzy” Cole-Miller, William “Doug” Ward, Ann Fruhling, and Kathryn Dempsey Cooper examines the social media policies of the U.S. Department of Defense. The study provides recommendations based on the analysis and review of the policies. In the Book Review section, Faruk Arslan reviews the book, Discovering Computers 2016: Tools, Apps, Devices, and the Impact of Technology, by Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Jennifer T. Campbell, and Mark Frydenburg. Faruk observes that the textbook is well suited for a one-semester undergraduate-level introduction to computer information systems course. We acknowledge services of Dr. Adolfo S. Coronado (Department of Computer Science, Indiana University-Purdue University Fort Wayne) as a book reviewer. We thank him all for his thoughtful book reviews. Thanks are also due to our Editorial Board members and Associate Editors for their untiring efforts to provide critical reviews in a timely manner.
期刊介绍:
As information technology and the Internet become more and more ubiquitous and pervasive in our daily lives, there is an essential need for a more thorough understanding of information security and privacy issues and concerns. The International Journal of Information Security and Privacy (IJISP) creates and fosters a forum where research in the theory and practice of information security and privacy is advanced. IJISP publishes high quality papers dealing with a wide range of issues, ranging from technical, legal, regulatory, organizational, managerial, cultural, ethical and human aspects of information security and privacy, through a balanced mix of theoretical and empirical research articles, case studies, book reviews, tutorials, and editorials. This journal encourages submission of manuscripts that present research frameworks, methods, methodologies, theory development and validation, case studies, simulation results and analysis, technological architectures, infrastructure issues in design, and implementation and maintenance of secure and privacy preserving initiatives.