<div><font size="3" face="Times New Roman">

</font><p style="margin:0in 0in 0pt" class="MsoPlainText"><font size="3"><span style="font-family:"Times New Roman"">Ivy League Publishing is pleased to announce the contents of the 4th issue of 2012. If anyone has any further questions, please contact the editor-in-chief, Dr. Kallol Bagchi, at <a href="mailto:kbagchi@utep.edu">kbagchi@utep.edu</a> or Ivy League Publishing at  <a href="mailto:admin@ivylp.com">admin@ivylp.com</a>.</span></font></p>
<p style="margin:0in 0in 0pt" class="MsoPlainText"><font size="3"><span style="font-family:"Times New Roman"">Thanks,</span></font></p><p style="margin:0in 0in 0pt" class="MsoPlainText"><font size="3"><span style="font-family:"Times New Roman"">Pankaj Palvia</span></font></p>
<p style="margin:0in 0in 0pt" class="MsoPlainText"><font size="3"><span style="font-family:"Times New Roman""></span></font> </p><p style="margin:0in 0in 0pt" class="MsoPlainText"><font size="3"><span style="font-family:"Times New Roman""></span></font> </p>
<p style="margin:0in 0in 0pt" class="MsoPlainText"><font size="3"><span style="font-family:"Times New Roman"">CONTENTS
OF VOLUME 7, ISSUE<span style>  </span>4, OF THE JOURNAL OF
INFORMATION PRIVACY </span><span style="font-family:"Times New Roman"">AND</span><span style="font-family:"Times New Roman""> SECURITY
(JIPS).<span style>  </span></span></font><a href="http://jips.utep.edu/"><span style="font-family:"Times New Roman""><font color="#0000ff" size="3">http://jips.utep.edu/</font></span></a><span style="font-family:"Times New Roman""></span></p>
<font size="3" face="Times New Roman">

</font><p style="margin:0in 0in 0pt" class="MsoPlainText"><span style="font-family:"Times New Roman""><font size="3">Publisher:
Ivy League Publishing, </font></span><a href="http://www.ivylp.com/"><span style="font-family:"Times New Roman""><font color="#0000ff" size="3">http://www.ivylp.com</font></span></a><span style="font-family:"Times New Roman""><font size="3">, email: </font></span><a href="mailto:admin@ivylp.com"><span style="font-family:"Times New Roman""><font color="#0000ff" size="3">admin@ivylp.com</font></span></a><span style="font-family:"Times New Roman""></span></p>
<font size="3" face="Times New Roman">

</font><p style="margin:0in 0in 0pt" class="MsoPlainText"><span style="font-family:"Times New Roman""><font size="3"> </font></span></p><font size="3" face="Times New Roman">

</font><p style="margin:0in 0in 0pt" class="MsoPlainText"><span style="font-family:"Times New Roman""><font size="3">CONTENTS
OF THIS ISSUE OF JIPS:</font></span></p><font size="3" face="Times New Roman">

</font><p style="margin:0in 0in 0pt" class="MsoPlainText"><span style="font-family:"Times New Roman""><font size="3"> </font></span></p><font size="3" face="Times New Roman">

</font><p style="margin:0in 0in 10pt" class="MsoNormal"><font size="3"><span style="font-family:"Times New Roman"">EDITORIAL
PREFACE: </span><span style="line-height:115%;font-family:"Times New Roman";font-size:12pt">STUDIES ON SECURITY </span></font><span style="line-height:115%;font-family:"Times New Roman";font-size:12pt">AND</span><span style="line-height:115%;font-family:"Times New Roman";font-size:12pt">
PRIVACY ISSUES USING DIFFERENT RESEARCH METHODS, by the Editor-in-Chief</span></p><font size="3" face="Times New Roman">

</font><p style="margin:0in 0in 10pt" class="MsoNormal"><span style="line-height:115%;font-family:"Times New Roman";font-size:12pt">STUDENTS INFORMATION SECURITY PRACTICES </span><span style="line-height:115%;font-family:"Times New Roman";font-size:12pt">AND</span><span style="line-height:115%;font-family:"Times New Roman";font-size:12pt">
AWARENESS, Ludwig Slusky, California State University - Los Angeles, </span><a href="mailto:lslusky@calstatela.edu"><span style="line-height:115%;font-family:"Times New Roman";font-size:12pt"><font color="#0000ff">lslusky@calstatela.edu</font></span></a><span class="MsoHyperlink"><span style="color:windowtext;line-height:115%;font-size:12pt;text-decoration:none"><u><font face="Times New Roman"> and </font></u></span></span><span style="line-height:115%;font-family:"Times New Roman";font-size:12pt"><span style> </span>Parviz Partow-Navid, California State
University - Los Angeles, </span><a href="mailto:ppartow@calstatela.edu"><span style="line-height:115%;font-family:"Times New Roman";font-size:12pt"><font color="#0000ff">ppartow@calstatela.edu</font></span></a><span style="line-height:115%;font-family:"Times New Roman";font-size:12pt"></span></p>
<font size="3" face="Times New Roman">

</font><p style="background:white;margin:0in 0in 10pt;text-align:justify" class="MsoNormal"><span style="line-height:115%;font-family:"Times New Roman";font-size:12pt">As
cyber threats continue to grow at an exponential rate, the need for training in
information security awareness spreads far beyond the Information Technology
college curriculum. Information Security proliferates into various domains of
knowledge and becomes more context-aware. Consequently, the training in
information awareness at a college level must cater more specifically to
students’ practices. This paper presents the results of the Information
Security survey conducted among students of the College of Business and
Economics at California State University, Los Angeles in spring 2011. The
survey revealed several characteristics of students’ practices and their
awareness of risks and countermeasures related to computer skills, mobile
computing, loss and encryption of data, online social networking, awareness
training, correlation between practice and awareness, and others. The survey
also revealed that the major problem with security awareness is not due to a
lack of security knowledge, but in the way the students apply that knowledge in
real-world situations. Simply, the compliance with information security
awareness is lower than the understanding of it. The findings discussed in this
paper are provided to assist colleges in designing curriculum that includes
more context-based Information Security training.</span></p><font size="3" face="Times New Roman">

</font><p style="margin:0in 0in 10pt;line-height:normal" class="MsoNormal"><span style="font-family:"Times New Roman";font-size:12pt">STOCK MARKET RESPONSE TO INFORMATION SECURITY
BREACH: A STUDY USING </span><span style="font-family:"Times New Roman";font-size:12pt">FIRM</span><span style="font-family:"Times New Roman";font-size:12pt"> </span><span style="font-family:"Times New Roman";font-size:12pt">AND</span><span style="font-family:"Times New Roman";font-size:12pt"> ATTACK CHARACTERISTICS,
Saini Das, Indian Institute of Management, Lucknow, India, </span><a href="mailto:fpm9009@iiml.ac.in"><span style="font-family:"Times New Roman";font-size:12pt"><font color="#0000ff">fpm9009@iiml.ac.in</font></span></a><span style="font-family:"Times New Roman";font-size:12pt"> ; Arunabha Mukhopadhyay, Indian Institute of
Management, Lucknow, India, </span><a href="mailto:arunabha@iiml.ac.in"><span style="font-family:"Times New Roman";font-size:12pt"><font color="#0000ff">arunabha@iiml.ac.in</font></span></a><span style="font-family:"Times New Roman";font-size:12pt"> and Manoj Anand, Indian
Institute of Management, Lucknow, India, </span><a href="mailto:manand@iiml.ac.in"><span style="font-family:"Times New Roman";font-size:12pt"><font color="#0000ff">manand@iiml.ac.in</font></span></a><span style="font-family:"Times New Roman";font-size:12pt"></span></p>
<font size="3" face="Times New Roman">

</font><p style="margin:0in 0in 10pt;text-align:justify;line-height:normal" class="MsoNormal"><span style="font-family:"Times New Roman";font-size:12pt">Information security
breaches have increased manifold over the past few years.<span style>  </span>In this paper we use event study analysis to
determine the cumulative abnormal response (</span><span style="font-family:"Times New Roman";font-size:12pt">CAR</span><span style="font-family:"Times New Roman";font-size:12pt">) of the stock market to
publicly announced information security breaches on firms. We also use linear
regression and moderation analysis techniques to identify the causal factors
(i.e., firm and attack characters) that affect </span><span style="font-family:"Times New Roman";font-size:12pt">CAR</span><span style="font-family:"Times New Roman";font-size:12pt"> individually and in
combination. From regression analysis, firm type, firm size and damage potency
of the attack emerge as factors that individually impact </span><span style="font-family:"Times New Roman";font-size:12pt">CAR</span><span style="font-family:"Times New Roman";font-size:12pt">. Further, moderation
analysis reveals that the combination of DoS and <span style="color:rgb(35,31,32)">information
theft attacks on e-commerce and BFSI companies respectively generate
significant high negative </span></span><span style="color:rgb(35,31,32);font-family:"Times New Roman";font-size:12pt">CAR</span><span style="color:rgb(35,31,32);font-family:"Times New Roman";font-size:12pt">. It is
also observed that if a subsidiary company is breached, then the parent’s stock
market performance is not significantly negatively impacted. However, if a
vendor company suffers a breach, then the client is also significantly
negatively affected in the stock market.</span></p><font size="3" face="Times New Roman">

</font><p style="margin:0in 0in 10pt" class="MsoNormal"><span style="line-height:115%;font-family:"Times New Roman";font-size:12pt">RICERRO COMMUNICATIONS, INC.:
ENHANCING INFORMATION PRIVACY </span><span style="line-height:115%;font-family:"Times New Roman";font-size:12pt">AND</span><span style="line-height:115%;font-family:"Times New Roman";font-size:12pt"> </span><span style="line-height:115%;font-family:"Times New Roman";font-size:12pt">DATA</span><span style="line-height:115%;font-family:"Times New Roman";font-size:12pt"> SHARING IN A HEALTH-</span><span style="line-height:115%;font-family:"Times New Roman";font-size:12pt">CARE</span><span style="line-height:115%;font-family:"Times New Roman";font-size:12pt"> IT COMPANY, </span><span style="color:black;line-height:115%;font-family:"Times New Roman";font-size:12pt">Wingyan Chung, UNC
Fayetteville State University, </span><a href="mailto:wchung@uncfsu.edu"><span style="line-height:115%;font-family:"Times New Roman";font-size:12pt"><font color="#0000ff">wchung@uncfsu.edu</font></span></a><span style="color:black;line-height:115%;font-family:"Times New Roman";font-size:12pt">, and Lewis Hershey, UNC Fayetteville State University</span><font size="3" face="Calibri">,</font><span style="line-height:115%;font-family:"Times New Roman";font-size:10pt"> <a href="mailto:lhershey@uncfsu.edu">lhershey@uncfsu.edu</a></span></p>
<font size="3" face="Times New Roman">

</font><p style="background:white;margin:0in 0in 10pt;text-align:justify" class="MsoNormal"><font size="3"><span style="font-family:"Times New Roman"">Information
privacy and data sharing are two conflicting but important data management
concerns. As more data are shared among stakeholders, the design of information
systems (IS) often emphasizes on data sharing at the expense of information
privacy. Unfortunately, existing IS research on designing tools to enhance
information privacy is isolated from actual use of the tools. In this research,
we examined the design of a data sharing system in a real-world company. The
company, Ricerro Communications, Inc., produces and markets wearable
communications devices used mainly in healthcare organizations. Poor data
sharing in Ricerro</span><span style><font face="Calibri">’</font></span><span style="font-family:"Times New Roman"">s multiple
systems resulted in loss of information privacy and security and inefficiency,
seriously affecting customer relationship management. A consulting team has
analyzed Ricerro</span><span style><font face="Calibri">’</font></span><span style="font-family:"Times New Roman"">s needs,
gathered stakeholder requirements, and developed a privacy-enhancing data
integration solution, which consists of database schema integration and data migration
from various sources to a Web-based transaction processing system. Through this
industry case, we illustrate how our developed principles and guidelines for
designing IT artifacts</span><span style><font face="Calibri"> </font></span><span style="font-family:"Times New Roman"">incorporate
the benefits of information privacy and data sharing.</span></font></p><font size="3" face="Times New Roman">

</font><p style="margin:1em 0px" class="MsoNormalCxSpMiddle"><span style="line-height:115%;font-family:"Times New Roman";font-size:12pt">THE EXPERT OPINION: AN INTERVIEW WITH</span><b style><span style="line-height:115%;font-family:"Times New Roman";font-size:12pt"> </span></b><span style="line-height:115%;font-family:"Times New Roman";font-size:12pt">JOSEPH
NEUMAN<b style>, </b>CEO <a href="http://GOTAPPS.COM">GOTAPPS.COM</a> conducted by
Choton Basu<b style></b></span></p><font size="3" face="Times New Roman">

</font><p style="margin:0in 0in 10pt;text-align:justify" class="MsoNormal"><font size="3"><span style="font-family:"Times New Roman"">In GotApps.com, the primary focus is creating
apps for iOS, Android, and Windows Mobile. And the CEO mentions, </span><span style><font face="Calibri">“</font></span><span style="font-family:"Times New Roman"">My philosophy has always been
to go big or go home.</span><span style><font face="Calibri">”</font></span><span style="font-family:"Times New Roman""><span style>  </span></span></font></p><font size="3" face="Times New Roman">

</font><p style="margin:0in 0in 10pt;line-height:normal" class="MsoNormal"><span style="font-family:"Times New Roman";font-size:12pt">BOOK REVIEW: Corporate Computer and Network
Security, By Raymond R. Panko--Reviewed by Adolfo S. Coronado, Indiana
University – Purdue University Fort Wayne, </span><a href="mailto:coronado@ipfw.edu"><span style="font-family:"Times New Roman";font-size:12pt"><font color="#0000ff">coronado@ipfw.edu</font></span></a><span style="font-family:"Times New Roman";font-size:12pt"> </span></p>
<font size="3" face="Times New Roman">

</font><p style="margin:0in 0in 10pt;line-height:normal" class="MsoNormal"><span style="font-family:"Times New Roman""><font size="3">Adolfo
observes that the book is well suited for an introductory course in information
security and the book provides a good balance between the technical and
managerial aspects of IT security.<span style>  </span></font></span></p><font size="3" face="Times New Roman">

</font><p style="margin:0in 0in 10pt" class="MsoNormal"><span style="line-height:115%;font-family:"Times New Roman";font-size:12pt"> </span></p><font size="3" face="Times New Roman">

</font><p style="margin:0in 0in 0pt" class="MsoPlainText"><font size="3" face="Calibri"> </font></p><font size="3" face="Times New Roman">

</font><p style="margin:0in 0in 0pt" class="MsoPlainText"><span style="font-family:"Times New Roman""><font size="3">The 14th
GITMA World conference will be held in Kuala Lumpur, Malaysia on June 16-18,
2013.<span style>  </span></font></span><a href="http://www.gitma.org/"><span style="font-family:"Times New Roman""><font color="#0000ff" size="3">http://www.gitma.org</font></span></a><span style="font-family:"Times New Roman""><font size="3">.<span style> 
</span>The GITMA conference is designed to be an international conference
attracting participants from all continents.<span style> 
</span>It has a friendly cozy atmosphere leading to rewarding collaborations.</font></span></p><font size="3" face="Times New Roman">

</font></div>