[AISWorld] JIPS - Latest Issue Content - Vol.9 No.4 2013

Arslan, Faruk farslan at utep.edu
Mon Dec 30 20:31:20 EST 2013


Journal of Information Privacy and Security, Vol. 9, No. 4, 2013.
Editorial Preface by the Editor-in-chief

Research Paper 1: Acquiring Subject Participation for Information Security Survey Research:  A Content and Correspondence Analysis Approach by Alice M. Johnson(Department of Business Administration, College of Business and Economics, North Carolina A&T State University)  and Belinda P. Shipps (Department of Business Administration, College of Business and Economics, North Carolina A&T State University)

Abstract. Twenty-four business executives and 22 security executives had previously participated in a study about information security investment.  The current study asked participants to comment on their reasons for participating in that research.  A total of 1003 reasons were submitted which were used to perform a content analysis of information security survey research (ISSR) participation factors.  Security and business executives' reasons for participating differed.  Reasons also differed by industry.  The findings will help researchers to properly communicate the benefits of their studies and thus increase participation rates for ISSR.  Greater participation will perhaps contribute to efforts to improve information security.


Research Paper 2: An Empirical Investigation of Privacy Awareness  and Concerns on Social Networking Sites by Sunil Hazari (Richards College of Business, University of West Georgia ) and  Cheryl Brown (Richards College of Business, University of West Georgia)

Abstract. Privacy affects every user who exchanges information over the Internet. In the past few years, the growth of information on social networks (such as Facebook, Twitter, LinkedIn) has increased exponentially. Companies are harvesting this information with and without the knowledge of individuals. While the exchange of information and seamless interaction between individuals and groups has become an easy task, issues related to this exchange, such as information privacy and security, have created new challenges. This study investigated respondents' attitudes towards privacy on social networking sites. In addition, the study sought to ascertain whether socio-demographic variables and knowledge of privacy issues influence attitudes and privacy concerns towards using social computing sites. Data analysis includes descriptive profile analysis, and statistical validation of attitudes and privacy concerns by means of correlation, regression, and cluster analysis. There was a significant relationship between privacy awareness and knowledge based on information provided by respondents. Most socio-demographic variables did not show significant effects on information privacy concerns. Implications of the findings are discussed. Further research is needed to investigate individual concerns on specific information that is being collected, stored, and shared on popular social networking sites.


Research Paper 3: Control-Related Motivations and Information Security Policy Compliance: The Role of Autonomy and Efficacy by Jeffrey Wall, (University of North Carolina at Greensboro), Prashant Palvia (University of North Carolina at Greensboro), and Paul Lowry (City University of Hong Kong, Hong Kong)

Abstract. Employees' failures to follow information security policy (ISP) can be costly to organizations, causing organizations to implement security controls to motivate secure behavior. Information security research has explored many control-related motivations (e.g., self-efficacy, response efficacy, and behavioral control) in the context of ISP compliance; however, the behavioral effects of perceptions of autonomous functioning are not well understood in security contexts. This paper examines employee autonomy as a control-related motivation from the lens of self-determination theory and psychological reactance theory. Self-determination theory is widely used in other disciplines to explain intrinsically driven behavior, but has not been applied to security research. Psychological reactance theory is also widely used, but is only beginning to receive attention in security research. Self-determination and psychological reactance offer complementary yet opposite conceptualizations of trait-based autonomy. This paper posits that perceptions of trait-based autonomy influence self-efficacy and response efficacy. Through a survey of government employees, we provide support for several hypotheses. We also discuss important directions for the use of self-determination theory and psychological reactance theory in future research.


The Expert Opinion Section.  Interview with an expert.
The Book Review Section. The book reviewed: I Know Who You Are and I Saw What You Did, by  Lori Andrews. New York: Free Press, 2013. 253 pp. Reviewed by Sadaf Ashtari, Eastern Michigan University. Mr. Ashtari observes that "the author puts forth a set of regulations called the Social Network Constitution to alleviate some of these difficulties, and help people keep their data and information safe in a public place and give them more means to protect themselves against offenders" but also mentions that more concrete examples are needed for a Social Network Constitution.

Faruk Arslan
Department of Accounting and Information Systems | College of Business | The University of Texas at El Paso
Mobile: 00 1 915 227 4889| http://business.utep.edu/faculty/profiles/arslan/ | www.linkedin.com/pub/faruk-arslan/6/1a1/913<http://www.linkedin.com/pub/faruk-arslan/6/1a1/913>

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20131231/13524e27/attachment.htm>


More information about the AISWorld mailing list