-------- Original Message --------
Subject: [AISWorld] Contents of JIPS Volume 7, Issue 3
Date: Tue, 18 Dec 2012 17:21:58 -0700
From: Bagchi, Kallol <kbagchi@utep.edu>
To: 'aisworld@lists.aisnet.org' <aisworld@lists.aisnet.org>


CONTENTS OF VOLUME 7, ISSUE  3, OF THE JOURNAL OF INFORMATION PRIVACY AND SECURITY (JIPS).  http://jips.utep.edu/

Publisher: Ivy League Publishing, http://www.ivylp.com, email: admin@ivylp.com

 

CONTENTS OF THIS ISSUE OF JIPS:

 

EDITORIAL PREFACE: SECURITY RESEARCH IN RFID, END-USER ENVIRONMENTS AND KEY TOPICS AND TRENDS

PASSIVE ENUMERATION OF SECRET INFORMATION IN LMAP AND M2AP RFID AUTHENTICATION PROTOCOLS, Selwyn Piramuthu, RFID European Lab, Paris, France & Information Systems and Operations Management University of Florida, selwyn@ufl.edu .

 

As RFID tags gain popularity for everyday use, issues related to privacy and security of RFID-tagged objects become important. However, the memory and processing power constraints in low-cost RFID tags make securing these tags difficult, if not impossible. Light- weight protocols have been proposed to address this issue. Li and Wang (2007) report security vulnerabilities in two recently proposed ultra-lightweight RFID mutual authentication protocols - LMAP and M2AP. Fairly similar in structure, these two protocols use among other things, sum mod m operations. We use m as 2 in sum mod m operation which is realistic in low-cost tags and, using a passive observer adversary, enumerate the entire set of secret information in two consecutive rounds of authentication.

 

A MODEL OF END USERS’ WEB THREATS INFORMATION PROCESSING, Lixuan Zhang, Augusta State University – Augusta, gzhang@aug.edu and Clinton Amos, Augusta State University- Augusta, clamos@aug.edu

Many threats have appeared with an increasingly sophisticated web platform. To cope with these threats, end users have to gather and process relevant information. There are two modes of information processing: systematic processing and heuristic processing. Using the heuristic-systematic model, the study shows the influence of involvement and information insufficiency on the processing mode. The study finds that high involvement is positively related to systematic processing, while low involvement is negatively related to heuristic processing. Information insufficiency has a significant negative relationship with heuristic processing but no significant relationship is found between information insufficiency and systematic processing.  The study also shows that systematic processing has a positive relationship with the intention of following recommended protective actions while heuristic processing has a negative relationship with this intention. The results shed light on the role of processing mode related to web threat information.

 

ANALYZING INFORMATION SYSTEMS SECURITY RESEARCH TO FIND KEY TOPICS, TRENDS, AND OPPORTUNITIES, Roger Blake, University of Massachusetts – Boston, roger.blake@umb.edu and Ramakrishna Ayyagari, University of Massachusetts – Boston, r.ayyagari@umb.edu

What are the key topics for Information Systems (IS) security researchers? How have these topics been changing, and what topics are emerging to offer new opportunities for research? We address these questions by analyzing the abstracts of 261 articles focusing on IS security that have appeared in leading IS journals and journals devoted to this area. Using Latent Semantic Analysis (LSA) to analyze the text of these abstracts uncovers five primary research topics: Security Design & Management, Business Operations Security, Behavioral Aspects, Authentication & Integrity Controls, and Prevention & Detection. These five primary topics are aggregates of more granular topics that are utilized to find trends to understand the changing complexion of IS security research. Our study contributes by developing the key topics and their trends in this area using an analytical and replicable method to synthesize the existing research.

 

THE EXPERT OPINION: AN INTERVIEW WITH JACK VAUGHN, TECHNOLOGY IMPLEMENTATION MANAGER (TIM), COLLEGE OF BUSINESS ADMINISTRATION,  THE UNIVERSITY OF TEXAS AT EL PASO. Conducted by Peeter Kirs, University of Texas, El Paso, pkirs@utep.edu

Issues like managing information and communication technology in an educational environment small/medium businesses or in the Government, security and privacy related issues in an educational environment is discussed. Mr. Vaughn observes that doing more with less is becoming a real challenge in an educational setting.

 

BOOK REVIEW: BUSINESS DATA NETWORKS AND TELECOMMUNICATIONS (8TH EDS) BY RAYMOND R. PANKO AND JULIA L. PANKO, PRENTICE HALL. Reviewed by Aurelia Donald, University of Texas at El Paso, adonald@utep.edu Aurelia observes that understanding networks can be a difficult task.  This book provides a comprehensive explanation of networking concepts along with real life examples of networking use and diagrams that reinforce the discussed topics.  In particular, chapter three outlines security issues, types of attacks, common attackers as well as provide an explanation of security management responsibilities.

 

Note. The 14th GITMA World conference will be held in Kuala Lumpur, Malaysia on June 16-18, 2013.  http://www.gitma.org.  The GITMA conference is designed to be an international conference attracting participants from all continents.  It has a friendly cozy atmosphere leading to rewarding collaborations.