[AISWorld] Journal of Information Privacy and Security (JIPS) | Call for Papers & Latest Issue Content - Vol.9 No.4 2013
farslan at utep.edu
Mon Feb 3 13:17:50 EST 2014
Journal of Information Privacy and Security (JIPS) http://jips.utep.edu
A. CALL FOR PAPERS:
The mission of the Journal of Information Privacy and Security (JIPS) is to serve both academics and practitioners as a reliable source on issues of information privacy and security. The Journal is a high quality refereed journal that seeks support from academicians, industry experts and specific government agencies. The JIPS focuses on publishing articles that address the paradoxical nature of privacy versus security amidst current global conditions. It is increasingly important that various constituents of information begin to understand their role in finding solutions to achieve a delicate balance between security and privacy.
The JIPS will facilitate understanding of the information assurance technical framework as it pertains to government agencies, companies and individuals. The topics may include the information privacy and security issues pertaining to initiatives on counter-terrorism efforts around the world, the impact of U.S. federal regulation and compliance issues facing global corporations, the impact of privacy and security initiatives within small and medium enterprises (SMEs), and e-gambling.
Article submissions are encouraged from both academics and practitioners. Each issue will include high quality articles from academics and practitioners, case studies, book reviews, and industry interviews. The Journal addresses issues of privacy and security from a global perspective and will consider articles with a cross-functional focus. The Journal will include articles in the following areas:
- Information Assurance frameworks
- Network security and impact on corporate infrastructure
- Privacy laws and impact on information compliance issues
- The duality of privacy and security and impact on corporate operations
- Governmental regulations and changes on information security requirements
- Data transfer issues across nations, states, and corporations
- Privacy and security requirements in B2B and B2C information flows
- Cross-functional aspects of information assurance and requirements faced by various business functions within companies
- Web sites, portals and the issue of trust
- Information privacy and security as it relates to end-users
- Applications and case studies in privacy and security issues facing business organizations, government agencies and individuals
- Emerging topics such as biometrics, software utilities, and IT obligations and how they change the business environment
We also welcome suggestions on special issue covering a relevant topic.
Each article will be blind-reviewed by three members of the editorial review board. Reviewer recommendation will be considered by the Editor-in-Chief or an Associate Editor. For a revision and rewrite, a revised paper will be sent to one of the Editors for final approval. The final decision will be made by the Editor-in-Chief.
Interested authors should consult the journal's manuscript submission guidelines at http://jips.utep.edu
Journal of Information Privacy and Security (JIPS) will be published henceforth by the Taylor and Francis group.
All inquiries and submissions should be sent to:
Editor-in-Chief: Dr. Kallol Bagchi, kbagchi at utep.edu<mailto:kbagchi at utep.edu>
B. JIPS - Latest Issue Content - Vol.9 No.4 2013
Journal of Information Privacy and Security, Vol. 9, No. 4, 2013.
Editorial Preface by the Editor-in-chief
Research Paper 1: Acquiring Subject Participation for Information Security Survey Research: A Content and Correspondence Analysis Approach by Alice M. Johnson(Department of Business Administration, College of Business and Economics, North Carolina A&T State University) and Belinda P. Shipps (Department of Business Administration, College of Business and Economics, North Carolina A&T State University)
Abstract. Twenty-four business executives and 22 security executives had previously participated in a study about information security investment. The current study asked participants to comment on their reasons for participating in that research. A total of 1003 reasons were submitted which were used to perform a content analysis of information security survey research (ISSR) participation factors. Security and business executives' reasons for participating differed. Reasons also differed by industry. The findings will help researchers to properly communicate the benefits of their studies and thus increase participation rates for ISSR. Greater participation will perhaps contribute to efforts to improve information security.
Research Paper 2: An Empirical Investigation of Privacy Awareness and Concerns on Social Networking Sites by Sunil Hazari (Richards College of Business, University of West Georgia ) and Cheryl Brown (Richards College of Business, University of West Georgia)
Abstract. Privacy affects every user who exchanges information over the Internet. In the past few years, the growth of information on social networks (such as Facebook, Twitter, LinkedIn) has increased exponentially. Companies are harvesting this information with and without the knowledge of individuals. While the exchange of information and seamless interaction between individuals and groups has become an easy task, issues related to this exchange, such as information privacy and security, have created new challenges. This study investigated respondents' attitudes towards privacy on social networking sites. In addition, the study sought to ascertain whether socio-demographic variables and knowledge of privacy issues influence attitudes and privacy concerns towards using social computing sites. Data analysis includes descriptive profile analysis, and statistical validation of attitudes and privacy concerns by means of correlation, regression, and cluster analysis. There was a significant relationship between privacy awareness and knowledge based on information provided by respondents. Most socio-demographic variables did not show significant effects on information privacy concerns. Implications of the findings are discussed. Further research is needed to investigate individual concerns on specific information that is being collected, stored, and shared on popular social networking sites.
Research Paper 3: Control-Related Motivations and Information Security Policy Compliance: The Role of Autonomy and Efficacy by Jeffrey Wall, (University of North Carolina at Greensboro), Prashant Palvia (University of North Carolina at Greensboro), and Paul Lowry (City University of Hong Kong, Hong Kong)
Abstract. Employees' failures to follow information security policy (ISP) can be costly to organizations, causing organizations to implement security controls to motivate secure behavior. Information security research has explored many control-related motivations (e.g., self-efficacy, response efficacy, and behavioral control) in the context of ISP compliance; however, the behavioral effects of perceptions of autonomous functioning are not well understood in security contexts. This paper examines employee autonomy as a control-related motivation from the lens of self-determination theory and psychological reactance theory. Self-determination theory is widely used in other disciplines to explain intrinsically driven behavior, but has not been applied to security research. Psychological reactance theory is also widely used, but is only beginning to receive attention in security research. Self-determination and psychological reactance offer complementary yet opposite conceptualizations of trait-based autonomy. This paper posits that perceptions of trait-based autonomy influence self-efficacy and response efficacy. Through a survey of government employees, we provide support for several hypotheses. We also discuss important directions for the use of self-determination theory and psychological reactance theory in future research.
The Expert Opinion Section. Interview with an expert.
The Book Review Section. The book reviewed: I Know Who You Are and I Saw What You Did, by Lori Andrews. New York: Free Press, 2013. 253 pp. Reviewed by Sadaf Ashtari, Eastern Michigan University. Mr. Ashtari observes that "the author puts forth a set of regulations called the Social Network Constitution to alleviate some of these difficulties, and help people keep their data and information safe in a public place and give them more means to protect themselves against offenders" but also mentions that more concrete examples are needed for a Social Network Constitution
Department of Accounting and Information Systems | College of Business | The University of Texas at El Paso
Mobile: 00 1 915 227 4889| http://business.utep.edu/faculty/profiles/arslan/ | www.linkedin.com/pub/faruk-arslan/6/1a1/913<http://www.linkedin.com/pub/faruk-arslan/6/1a1/913>
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the AISWorld