[AISWorld] Journal of Information Privacy and Security (JIPS) | Call For Papers & Latest Issue Content - Vol. 10, Issue 4, 2014

Arslan, Faruk farslan at utep.edu
Mon Nov 10 16:42:53 EST 2014


A.      Call For Papers:

Journal of Information Privacy and Security (JIPS) http://jips.utep.edu

Mission
The mission of the Journal of Information Privacy and Security (JIPS) is to serve both academics and practitioners as a reliable source on issues of information privacy and security. The Journal is a high quality refereed journal that seeks support from academicians, industry experts and specific government agencies. The JIPS focuses on publishing articles that address the paradoxical nature of privacy versus security amidst current global conditions. It is increasingly important that various constituents of information begin to understand their role in finding solutions to achieve a delicate balance between security and privacy.

The JIPS will facilitate understanding of the information assurance technical framework as it pertains to government agencies, companies and individuals. The topics may include the information privacy and security issues pertaining to initiatives on counter-terrorism efforts around the world, the impact of U.S. federal regulation and compliance issues facing global corporations, the impact of privacy and security initiatives within small and medium enterprises (SMEs), and e-gambling.

Article submissions are encouraged from both academics and practitioners. Each issue will include high quality articles from academics and practitioners, case studies, book reviews, and industry interviews. The Journal addresses issues of privacy and security from a global perspective and will consider articles with a cross-functional focus. The Journal will include articles in the following areas:

- Information Assurance frameworks
- Network security and impact on corporate infrastructure
- Privacy laws and impact on information compliance issues
- The duality of privacy and security and impact on corporate operations
- Governmental regulations and changes on information security requirements
- Data transfer issues across nations, states, and corporations
- Privacy and security requirements in B2B and B2C information flows
- Cross-functional aspects of information assurance and requirements faced by various business functions within companies
- Web sites, portals and the issue of trust
- Information privacy and security as it relates to end-users
- Applications and case studies in privacy and security issues facing business organizations, government agencies and individuals
- Emerging topics such as biometrics, software utilities, and IT obligations and how they change the business environment

We also welcome suggestions on special issue covering a relevant topic.

Review Process
Each article will be blind-reviewed by three members of the editorial review board. Reviewer recommendation will be considered by the Editor-in-Chief or an Associate Editor. For a revision and rewrite, a revised paper will be sent to one of the Editors for final approval. The final decision will be made by the Editor-in-Chief.

Interested authors should consult the journal's manuscript submission guidelines  at http://jips.utep.edu

All inquiries and submissions should be sent to:
Editor-in-Chief: Dr. Kallol Bagchi, kbagchi at utep.edu<mailto:kbagchi at utep.edu>


B.      Content of JIPS, Vol. 10, Issue 4, 2014

Special Issue on Behavioral Information Security Research with Emerging Technologies Editorial by Dr. Wu He and  Dr. Xiaohong Yuan

Paper No. 1. A Model of Information Security Awareness for Assessing  Information Security Risk for Emerging Technologies, By Roberto J. Mejias and Pierre A. Balthazard

Abstract: Information systems that interconnect emerging technologies have rendered organizations increasingly vulnerable to emerging IT threats. Drawing upon IS concepts from systems and cybernetic theory, Technological Threat Avoidance theory (TTAT) and General Deterrence Theory (GDT) we develop an integrated ISS-ISS Risk research model that contributes to our understanding of information security awareness (ISA) behavior and the assessment of IS security (ISS) risk. Our results indicate that technical knowledge, organizational impact and attacker assessment generate significant positive correlations with ISA. The constructs, organizational impact and attacker assessment generated stronger associations with ISA than technical knowledge.  Our research model results also indicate that ISA is strongly correlated with the assessment of ISS risk.


Paper No. 2 Comparing the Mobile Device Security Behavior of College Students and InformationTechnology Professionals, By Mark A. Harris, Steven Furnell and Karen Patten

Abstract: Mobile devices are now a standard part of both personal and workplace IT usage.  However, they introduce a variety of security concerns that users are failing to address.  This paper examines and compares the security preparedness of 227 IT and non-IT college students about to enter the workforce and 83 predominately non-security focused information technology professionals.  The results indicate that all groups fail to properly secure their personal mobile devices and put their data and connected networks at risk.  Author suggestions include organizational mobile device security policies and mobile device security awareness and training for both current and incoming employees.

Paper No. 3 Altering Security Perceptions Through The Use Of Geo-Authentication, By Gongjun Yan,  Kenneth Shemroske and Gary Black
Abstract: This paper proposes geo-authentication as part of a multi-level security solution to supplement and strengthen existing defenses (e.g., technical and behavioral approaches) against social engineering attacks.  The technology behind this tool is explained and several potential applications are discussed related to online banking and voting.  Further, data is collected regarding changes in perceptions of security when using specific applications common among young adults (Facebook and online banking).  It is found that geo-authentication is perceived as a useful tool which has a significant impact on perceptions of security in computer transactions and could have an impact on the decision to use such products.

Paper No. 4 Organizational Privacy Strategy: Four Quadrants of Strategic Responses to Information Privacy and Security Threats, By Rachida F. Parks  and Rolf T. Wigand

Abstract: How do organizations make strategic choices concerning their information privacy and security practices? To answer this question, we focus on organizational privacy strategy to describe patterns of organizational actions to respond to information privacy threats, actions that align with both a firm’s organizational strategy and its responses to institutional pressures. To do so, we present the convergence of two theoretical views – Oliver’s (1991) framework of strategic responses to institutional processes and Miles’ and Snow’s (1978) typology of organizational strategy, structure and processes. Drawing on a study of the U.S. healthcare industry, the authors provide variations, predictions and illustrations of four developed quadrants of conformist, entrepreneur, transformer, and defender privacy strategies.  The paper’s major contribution resides in its analysis and conceptualization of organizational privacy strategies which have been lacking in existing literature. Thus this approach provides an umbrella-like theoretical perspective of organizational privacy. The research has practical implications that extend beyond the exemplary setting of the healthcare industry.

Book Review of Data Stewardship: An Actionable Guide to Effective Data Management and Data Governance,  Plotkin, David.  Amsterdam ; Boston: Elsevier/Morgan Kaufman, 2014, Reviewed by Adolfo S. Coronado.

Faruk Arslan
Department of Accounting and Information Systems | College of Business | The University of Texas at El Paso
Mobile: 00 1 915 227 4889| http://business.utep.edu/faculty/profiles/arslan/ | www.linkedin.com/pub/faruk-arslan/6/1a1/913<http://www.linkedin.com/pub/faruk-arslan/6/1a1/913>


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20141110/d301ec52/attachment.html>


More information about the AISWorld mailing list