[AISWorld] CONTENTS OF VOLUME 7, ISSUE 4, OF THE JOURNAL OF INFORMATION PRIVACY AND SECURITY (JIPS)
Pankaj Palvia
pankaj.palvia at gmail.com
Fri Dec 28 11:15:27 EST 2012
Ivy League Publishing is pleased to announce the contents of the 4th issue
of 2012. If anyone has any further questions, please contact the
editor-in-chief, Dr. Kallol Bagchi, at kbagchi at utep.edu or Ivy League
Publishing at admin at ivylp.com.
Thanks,
Pankaj Palvia
CONTENTS OF VOLUME 7, ISSUE 4, OF THE JOURNAL OF INFORMATION PRIVACY
ANDSECURITY (JIPS).
http://jips.utep.edu/
Publisher: Ivy League Publishing, http://www.ivylp.com, email:
admin at ivylp.com
CONTENTS OF THIS ISSUE OF JIPS:
EDITORIAL PREFACE: STUDIES ON SECURITY AND PRIVACY ISSUES USING DIFFERENT
RESEARCH METHODS, by the Editor-in-Chief
STUDENTS INFORMATION SECURITY PRACTICES AND AWARENESS, Ludwig Slusky,
California State University - Los Angeles, lslusky at calstatela.edu* and * Parviz
Partow-Navid, California State University - Los Angeles,
ppartow at calstatela.edu
As cyber threats continue to grow at an exponential rate, the need for
training in information security awareness spreads far beyond the
Information Technology college curriculum. Information Security
proliferates into various domains of knowledge and becomes more
context-aware. Consequently, the training in information awareness at a
college level must cater more specifically to students’ practices. This
paper presents the results of the Information Security survey conducted
among students of the College of Business and Economics at California State
University, Los Angeles in spring 2011. The survey revealed several
characteristics of students’ practices and their awareness of risks and
countermeasures related to computer skills, mobile computing, loss and
encryption of data, online social networking, awareness training,
correlation between practice and awareness, and others. The survey also
revealed that the major problem with security awareness is not due to a
lack of security knowledge, but in the way the students apply that
knowledge in real-world situations. Simply, the compliance with information
security awareness is lower than the understanding of it. The findings
discussed in this paper are provided to assist colleges in designing
curriculum that includes more context-based Information Security training.
STOCK MARKET RESPONSE TO INFORMATION SECURITY BREACH: A STUDY USING
FIRM ANDATTACK CHARACTERISTICS, Saini Das, Indian Institute of
Management, Lucknow,
India, fpm9009 at iiml.ac.in ; Arunabha Mukhopadhyay, Indian Institute of
Management, Lucknow, India, arunabha at iiml.ac.in and Manoj Anand, Indian
Institute of Management, Lucknow, India, manand at iiml.ac.in
Information security breaches have increased manifold over the past few
years. In this paper we use event study analysis to determine the
cumulative abnormal response (CAR) of the stock market to publicly
announced information security breaches on firms. We also use linear
regression and moderation analysis techniques to identify the causal
factors (i.e., firm and attack characters) that affect CAR individually and
in combination. From regression analysis, firm type, firm size and damage
potency of the attack emerge as factors that individually impact CAR.
Further, moderation analysis reveals that the combination of DoS and
information
theft attacks on e-commerce and BFSI companies respectively generate
significant high negative CAR. It is also observed that if a subsidiary
company is breached, then the parent’s stock market performance is not
significantly negatively impacted. However, if a vendor company suffers a
breach, then the client is also significantly negatively affected in the
stock market.
RICERRO COMMUNICATIONS, INC.: ENHANCING INFORMATION PRIVACY AND
DATASHARING IN A HEALTH-
CARE IT COMPANY, Wingyan Chung, UNC Fayetteville State University,
wchung at uncfsu.edu, and Lewis Hershey, UNC Fayetteville State University,
lhershey at uncfsu.edu
Information privacy and data sharing are two conflicting but important data
management concerns. As more data are shared among stakeholders, the design
of information systems (IS) often emphasizes on data sharing at the expense
of information privacy. Unfortunately, existing IS research on designing
tools to enhance information privacy is isolated from actual use of the
tools. In this research, we examined the design of a data sharing system in
a real-world company. The company, Ricerro Communications, Inc., produces
and markets wearable communications devices used mainly in healthcare
organizations. Poor data sharing in Ricerro’s multiple systems resulted in
loss of information privacy and security and inefficiency, seriously
affecting customer relationship management. A consulting team has analyzed
Ricerro’s needs, gathered stakeholder requirements, and developed a
privacy-enhancing data integration solution, which consists of database
schema integration and data migration from various sources to a Web-based
transaction processing system. Through this industry case, we illustrate
how our developed principles and guidelines for designing IT artifacts
incorporate
the benefits of information privacy and data sharing.
THE EXPERT OPINION: AN INTERVIEW WITH* *JOSEPH NEUMAN*, *CEO
GOTAPPS.COMconducted by Choton Basu
**
In GotApps.com, the primary focus is creating apps for iOS, Android, and
Windows Mobile. And the CEO mentions, “My philosophy has always been to go
big or go home.”
BOOK REVIEW: Corporate Computer and Network Security, By Raymond R.
Panko--Reviewed by Adolfo S. Coronado, Indiana University – Purdue
University Fort Wayne, coronado at ipfw.edu
Adolfo observes that the book is well suited for an introductory course in
information security and the book provides a good balance between the
technical and managerial aspects of IT security.
The 14th GITMA World conference will be held in Kuala Lumpur, Malaysia on
June 16-18, 2013. http://www.gitma.org. The GITMA conference is designed
to be an international conference attracting participants from all
continents. It has a friendly cozy atmosphere leading to rewarding
collaborations.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20121228/528b51a9/attachment.html>
More information about the AISWorld
mailing list