[AISWorld] Journal of Information Privacy and Security (JIPS) | Call For Papers & Latest Issue Content - Vol. 11, Issue 1 and 2

Arslan, Faruk farslan at utep.edu
Tue Jun 2 17:34:11 EDT 2015


A.      CALL FOR PAPERS:

Journal of Information Privacy and Security http://www.tandfonline.com/uips

CALL FOR PAPERS:

Mission
The mission of the Journal of Information Privacy and Security (JIPS) is to serve both academics and practitioners as a reliable source on issues of information privacy and security. The Journal is a high quality refereed journal that seeks support from academicians, industry experts and specific government agencies. The JIPS focuses on publishing articles that address the paradoxical nature of privacy versus security amidst current global conditions. It is increasingly important that various constituents of information begin to understand their role in finding solutions to achieve a delicate balance between security and privacy.

The JIPS will facilitate understanding of the information assurance technical framework as it pertains to government agencies, companies and individuals. The topics may include the information privacy and security issues pertaining to initiatives on counter-terrorism efforts around the world, the impact of U.S. federal regulation and compliance issues facing global corporations, the impact of privacy and security initiatives within small and medium enterprises (SMEs), and e-gambling.

Article submissions are encouraged from both academics and practitioners. Each issue will include high quality articles from academics and practitioners, case studies, book reviews, and industry interviews. The Journal addresses issues of privacy and security from a global perspective and will consider articles with a cross-functional focus. The Journal will include articles in the following areas:

- Information Assurance frameworks
- Network security and impact on corporate infrastructure
- Privacy laws and impact on information compliance issues
- The duality of privacy and security and impact on corporate operations
- Governmental regulations and changes on information security requirements
- Data transfer issues across nations, states, and corporations
- Privacy and security requirements in B2B and B2C information flows
- Cross-functional aspects of information assurance and requirements faced by various business functions within companies
- Web sites, portals and related issues such as the issue of trust
- Information privacy and security as it relates to end-users
- Applications and case studies in privacy and security issues facing business organizations, government agencies and individuals
- Emerging topics such as biometrics, software utilities, and IT obligations and how they change the business environment

We also welcome suggestions on special issue covering a relevant topic.

Review Process
Each article will be blind-reviewed by three members of the editorial review board. Reviewer recommendation will be considered by the Editor-in-Chief or an Associate Editor. For a revision and rewrite, a revised paper will be sent to one of the Editors for final approval. The final decision will be made by the Editor-in-Chief.

JIPS is now published by Taylor and Francis Group. Interested authors should submit their manuscripts to the submission site:http://ijips.edmgr.com

All inquiries should be sent to:
Editor-in-Chief: Dr. Kallol Bagchi, kbagchi at utep.edu


B.      CONTENTS OF VOLUME 11, ISSUE  1, OF THE JOURNAL OF INFORMATION PRIVACY AND SECURITY (JIPS) (PUBLISHED 2-3 MONTHS AGO).

EDITORIAL PREFACE, by Editor of JIPS

INFORMATION DISCLOSURE ON A CHINESE SOCIAL MEDIA PLATFORM
Lixuan Zhang, Weber State University, USA
Clinton Amos,  Weber State University, USA
Iryna Pentina University of Toledo, USA

This paper examines drivers of information disclosure on a Chinese social media platform. It is a privacy-related research paper. A privacy calculus theory-based research model is first developed to simultaneously investigate the roles of perceived benefits vs. risks in users’ disclosure behavior. Analysis from data obtained from more than 200 Weibo (a chinese social media) users revealed that perception of benefits is related to information disclosure, while perceived risks do not affect the disclosure behavior. Additionally, while government intrusion concern is significantly related to perceived risk, identification with Weibo community is related to perceived benefits of information disclosure. Interesting questions could be how this model would behave when an U.S. based social media platform is used or a longitudinal study is undertaken.

HEALTHSHARK: USING TWITTER FOR SITUATIONAL AWARENESS IN PUBLIC HEALTH
Alana Platt, University of Wisconsin – Whitewater, USA
Levi Citrin and Cynthia Hood , Illinois Institute of Technology, USA

The paper discusses a prototype system, HealthShark, which monitors Twitter for mentions of contagious diseases and gathers relevant information that can be used for a disease outbreak situation. The authors outline the features of HealthShark, include a user study to assess its usefulness as a tool for monitoring disease outbreaks, and discuss among other things, the potential impact of privacy concerns on the design of such a system

A REVIEW OF THE INFORMATION SECURITY AND PRIVACY CHALLENGES IN BYOD ENVIRONMENTS
Abubakar Bello Garba, Murdoch University, Australia
Jocelyn Armarego, Murdoch University, Australia
David Murray Murdoch University, Australia  and
William Kenworthy Murdoch University, Australia

It is a review paper on the relatively recent concept of Bring Your Own Device or BYOD. BYODs have opened new opportunities for organizations and employees.  Security and privacy issues in BYOD environments are examined in this paper. The authors believe that the review will help people to understand matters relevant to the increasing demands of BYOD, as well as the security and privacy challenges it poses.

BOOK REVIEW: MAIWALD, E., & SIEGLEIN, W. (2002). SECURITY PLANNING & DISASTER RECOVERY. NEW YORK: MCGRAW-HILL/OSBORNE.
Reviewed by Adolfo S. Coronado, Indiana University – Purdue University Fort Wayne

Book Review Editor Adolfo observes that this is a book of value to those individuals with a background in information systems and technology and assist them in undertaking information security duties.


C.      CONTENTS OF VOLUME 11, ISSUE  2, OF THE JOURNAL OF INFORMATION PRIVACY AND SECURITY (JIPS). (IN PRESS).

SPECIAL ISSUE ON SECURED COMMUNICATION IN WIRELESS AND WIRED NETWORKS

EDITORIAL ON SPECIAL ISSUE ON SECURED COMMUNICATION IN WIRELESS AND WIRED NETWORKS,
D.P. Agrawal, University of Cincinnati, USA

CROSS-SITE SCRIPTING (XSS) ABUSE AND DEFENSE: EXPLOITATION ON SEVERAL TESTING BED ENVIRONMENTS AND ITS DEFENSE
S. Gangwar, P.K.Meena, M.Kumar, B.B.Gupta, S.Gupta
National Institute of Technology Kurukshetra, India

LOCATION PRIVACY PROTECTION FOR SMARTPHONE USERS USING QUADTREE ENTROPY MAPS
Xiaoen Ju and Kang G. Shin, University of Michigan, USA

INFORMATION THEORETIC AND STATISTICAL DRIVE SANITIZATION MODELS
Jeffrey Medsger, Avinash Srinivasan, and Jie Wu, Temple University, USA

THE HUMAN KEY: IDENTIFICATION AND AUTHENTICATION IN WEARABLE DEVICES USING GAIT
Pallavi Meharia and Dharma P. Agrawal, University of Cincinnati, USA

BOOK REVIEW: MINING THE SOCIAL WEB: DATA MINING FACEBOOK, TWITTER, LINKEDIN, GOOGLE+, GITHUB, AND MORE
Ali Dehghantanha,  University of Salford, UK.


Faruk Arslan
Department of Accounting and Information Systems | College of Business | The University of Texas at El Paso
Mobile: 00 1 915 227 4889| http://business.utep.edu/faculty/profiles/arslan/ | www.linkedin.com/pub/faruk-arslan/6/1a1/913<http://www.linkedin.com/pub/faruk-arslan/6/1a1/913>




More information about the AISWorld mailing list