[AISWorld] JIPS Latest Issue and CFP

Bagchi, Kallol kbagchi at utep.edu
Sun Mar 31 16:35:11 EDT 2013


-------------------------------------------------------------------------------
Journal of Information Privacy and Security, Vol. 9, No. 1, 2013.
--------------------------------------------------------------------------------

Editorial Preface, Special Issue: Modeling of Information Privacy and Security, by Peeter Kirs (pkirs at utep.edu<mailto:pkirs at utep.edu>) and Godwin Udo (gudo at utep.edu<mailto:gudo at utep.edu>), The University of Texas at El Paso, USA.

Research Paper 1: Interval Responses for Queries on Confidential Attributes: A Security Evaluation using Dinur-Nissim Attack, Krish Muralidhar (University of Kentucky, USA) and Rathindra Sarathy (Oklahoma State University, USA)
Abstract: Dinur and Nissim (2003) show that perturbed responses to queries on confidential data that provide a fixed guarantee on the quality of the response, are subject to privacy compromise. In this study, we investigate the impact of the Dinur-Nissim results for masking mechanisms that provide interval responses to queries. The present research results indicate that when the width of the interval response is related to the magnitude of the query response, privacy compromise is even more likely than the fixed guarantee situation addressed in Dinur-Nissim.

Research Paper 2: Framing Effects for Cloud Security Announcements" by Srikanth Parameswaran, Srikanth Venkatesan, and Manish Gupta (SUNY, Buffalo, USA)
Abstract. Security and availability risks have become one of the biggest challenges for firms that are transitioning into the cloud and for firms offering the cloud services as well. Security issues have gained prominence in recent years due to the unprecedented growth in Cloud computing service offerings and their adoption. An event of a security breach may impact investors' perceptions of a firm's value. In fact, prior studies have shown that information security breaches and countermeasures have a significant impact on the firm's stock price. Thus, publicly announcing breach and countermeasures is one way by which firms manage these issues related to cloud security.  The focus of this paper is to use event study methodology to investigate how cloud security breach and countermeasures announcements affect the firm and its competitor's stock price. The present  research shows that cloud security breach announcements have significant negative impact on the firms and its competitor's stock value. Surprisingly, cloud security countermeasure announcements have significant negative impact on the firm and the competitor's stock value.

Research Paper 3: Applying Protection Motivation Theory to Information Security Training for College Students," by Peter Meso, Yi Ding, and Shuting Xu (Georgia Gwinnett College, USA)
Abstract. As Internet and Web technologies have been used in different fields by various organizations, cyber security has become a significant public concern for the society as a whole. There is a broad consensus on the need for broader and better training and education of the current and future workforce to be able to effectively deal with present, emergent and future cyber security challenges. However, cyber-security education tends to be constrained to computer and information science degree programs. Further, the courses within these programs tend to be offered via conventional instructional mechanisms that entail limited hands-on learning experiences due to the difficulty, cost, and potential risks of setting up real world like hands-on security training environments, which are often network-based.
Considering cyber security education is a necessary need across all disciplines and majors, we have been undertaking a research project at a public college to (a) construct a model to study the influence of knowledge from lectures and hands-on experience on security behavior using protection motivation theory (b) develop a series of laboratory based Information Security education modules as easy to tailor and scalable pedagogic tools for helping undergraduate students to comprehend information security at different levels , and (c) test the impact of these modules on students' post-training personal cyber security behavior. Our aim is to identify if indeed students do apply what they learn to confidently and intelligently address personal cyber security challenges, after they have completed these course modules. In this paper, we report (a) our theoretical model (b) the design of security pedagogy modules and, (c) the preliminary findings upon testing and surveying students' post-training knowledge and post-training behavior concerning the security topics covered in the training modules.

The Expert Opinion Section.  An Interview with Satish Kumar Nampally, Senior Manager, Cognizant Technology Solutions, Conducted by Choton Basu, (University of Wisconsin-Whitewater, USA).

The Book Review Section. The book reviewed: Principles of Computer Security: CompTIA Security+ and Beyond by WM. Arthur Conklin and Gregory White, McGraw Hill.  Reviewed by Adolfo S. Coronado (Indiana University - Purdue University Fort Wayne, USA).

--------------------------------------------------------------------------------------------
Journal of Information Privacy and Security (JIPS) http://jips.utep.edu
CALL FOR PAPERS:
----------------------------------------------------------------------------------------------------
Mission
The mission of the Journal of Information Privacy and Security (JIPS) is to serve both academics and practitioners as a reliable source on issues of information privacy and security. The Journal is a high quality refereed journal that seeks support from academicians, industry experts and specific government agencies. The JIPS focuses on publishing articles that address the paradoxical nature of privacy versus security amidst current global conditions. It is increasingly important that various constituents of information begin to understand their role in finding solutions to achieve a delicate balance between security and privacy.

The JIPS will facilitate understanding of the information assurance technical framework as it pertains to government agencies, companies and individuals. The topics may include the information privacy and security issues pertaining to initiatives on counter-terrorism efforts around the world, the impact of U.S. federal regulation and compliance issues facing global corporations, the impact of privacy and security initiatives within small and medium enterprises (SMEs), and e-gambling.

Article submissions are encouraged from both academics and practitioners. Each issue will include high quality articles from academics and practitioners, case studies, book reviews, and industry interviews. The Journal addresses issues of privacy and security from a global perspective and will consider articles with a cross-functional focus. The Journal will include articles in the following areas:

- Information Assurance frameworks
- Network security and impact on corporate infrastructure
- Privacy laws and impact on information compliance issues
- The duality of privacy and security and impact on corporate operations
- Governmental regulations and changes on information security requirements
- Data transfer issues across nations, states, and corporations
- Privacy and security requirements in B2B and B2C information flows
- Cross-functional aspects of information assurance and requirements faced by various business functions within companies
- Web sites, portals and the issue of trust
- Information privacy and security as it relates to end-users
- Applications and case studies in privacy and security issues facing business organizations, government agencies and individuals
- Emerging topics such as biometrics, software utilities, and IT obligations and how they change the business environment
We also welcome suggestions on special issue covering a relevant topic.
Review Process
Each article will be blind-reviewed by three members of the editorial review board. Reviewer recommendation will be considered by the Editor-in-Chief or an Associate Editor. For a revision and rewrite, a revised paper will be sent to one of the Editors for final approval. The final decision will be made by the Editor-in-Chief.

Interested authors should consult the journal's manuscript submission guidelines  at  http://jips.utep.edu
All inquiries and submissions should be sent to:
Editor-in-Chief: Dr. Kallol Bagchi, kbagchi at utep.edu<mailto:kbagchi at utep.edu>
**********************************************************************
Kallol Bagchi, Ph. D.                         Phone:  (915) 747-5376
Professor of MIS                              Fax:        (915) 747-5126
Room 204                                            E-mail: kbagchi at utep.edu<mailto:kbagchi at utep.edu>
College of Business
The University of Texas at El Paso
El Paso, TX 79968
************************************************************************


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20130331/5ffd29f0/attachment.html>


More information about the AISWorld mailing list