Betreff: | [AISWorld] Journal of Information Privacy and Security (JIPS) | Call for Papers & Latest Issue Content - Vol.9 No.4 2013 |
---|---|
Datum: | Mon, 3 Feb 2014 18:17:50 +0000 |
Von: | Arslan, Faruk <farslan@utep.edu> |
An: | aisworld@lists.aisnet.org <aisworld@lists.aisnet.org> |
Journal of Information Privacy and Security
(JIPS)
http://jips.utep.edu
A.
CALL FOR PAPERS:
Mission
The mission of the Journal of Information
Privacy and Security (JIPS) is to serve both academics and
practitioners as a reliable source on issues of information
privacy and security. The Journal is a high quality refereed
journal that seeks support from academicians, industry experts
and specific government agencies. The JIPS focuses on
publishing articles that address the paradoxical nature of
privacy versus security amidst current global conditions. It
is increasingly important that various constituents of
information begin to understand their role in finding
solutions to achieve a delicate balance between security and
privacy.
The JIPS will facilitate understanding of
the information assurance technical framework as it pertains
to government agencies, companies and individuals. The topics
may include the information privacy and security issues
pertaining to initiatives on counter-terrorism efforts around
the world, the impact of U.S. federal regulation and
compliance issues facing global corporations, the impact of
privacy and security initiatives within small and medium
enterprises (SMEs), and e-gambling.
Article submissions are encouraged from
both academics and practitioners. Each issue will include high
quality articles from academics and practitioners, case
studies, book reviews, and industry interviews. The Journal
addresses issues of privacy and security from a global
perspective and will consider articles with a cross-functional
focus. The Journal will include articles in the following
areas:
- Information Assurance frameworks
- Network security and impact on corporate
infrastructure
- Privacy laws and impact on information
compliance issues
- The duality of privacy and security and
impact on corporate operations
- Governmental regulations and changes on
information security requirements
- Data transfer issues across nations,
states, and corporations
- Privacy and security requirements in B2B
and B2C information flows
- Cross-functional aspects of information
assurance and requirements faced by various business functions
within companies
- Web sites, portals and the issue of trust
- Information privacy and security as it
relates to end-users
- Applications and case studies in privacy
and security issues facing business organizations, government
agencies and individuals
- Emerging topics such as biometrics,
software utilities, and IT obligations and how they change the
business environment
We also welcome suggestions on special
issue covering a relevant topic.
Review Process
Each article will be blind-reviewed by
three members of the editorial review board. Reviewer
recommendation will be considered by the Editor-in-Chief or an
Associate Editor. For a revision and rewrite, a revised paper
will be sent to one of the Editors for final approval. The
final decision will be made by the Editor-in-Chief.
Interested authors should consult the
journal's manuscript submission guidelines at
http://jips.utep.edu
Journal of Information Privacy and Security
(JIPS)
will be published henceforth by the Taylor and Francis
group.
All inquiries and submissions should be
sent to:
Editor-in-Chief: Dr. Kallol Bagchi,
kbagchi@utep.edu
B.
JIPS - Latest Issue Content -
Vol.9 No.4 2013
Journal of Information Privacy and
Security, Vol. 9, No. 4, 2013.
Editorial Preface by the Editor-in-chief
Research Paper 1: Acquiring Subject
Participation for Information Security Survey Research: A
Content and Correspondence Analysis Approach by Alice M.
Johnson(Department of Business Administration, College of
Business and Economics, North Carolina A&T State
University) and Belinda P. Shipps (Department of Business
Administration, College of Business and Economics, North
Carolina A&T State University)
Abstract. Twenty-four business executives
and 22 security executives had previously participated in a
study about information security investment. The current
study asked participants to comment on their reasons for
participating in that research. A total of 1003 reasons were
submitted which were used to perform a content analysis of
information security survey research (ISSR) participation
factors. Security and business executives’ reasons for
participating differed. Reasons also differed by industry.
The findings will help researchers to properly communicate the
benefits of their studies and thus increase participation
rates for ISSR. Greater participation will perhaps contribute
to efforts to improve information security.
Research Paper 2: An Empirical
Investigation of Privacy Awareness and Concerns on Social
Networking Sites by Sunil Hazari (Richards College of
Business, University of West Georgia ) and Cheryl Brown
(Richards College of Business, University of West Georgia)
Abstract. Privacy affects every user who
exchanges information over the Internet. In the past few
years, the growth of information on social networks (such as
Facebook, Twitter, LinkedIn) has increased exponentially.
Companies are harvesting this information with and without the
knowledge of individuals. While the exchange of information
and seamless interaction between individuals and groups has
become an easy task, issues related to this exchange, such as
information privacy and security, have created new challenges.
This study investigated respondents’ attitudes towards privacy
on social networking sites. In addition, the study sought to
ascertain whether socio-demographic variables and knowledge of
privacy issues influence attitudes and privacy concerns
towards using social computing sites. Data analysis includes
descriptive profile analysis, and statistical validation of
attitudes and privacy concerns by means of correlation,
regression, and cluster analysis. There was a significant
relationship between privacy awareness and knowledge based on
information provided by respondents. Most socio-demographic
variables did not show significant effects on information
privacy concerns. Implications of the findings are discussed.
Further research is needed to investigate individual concerns
on specific information that is being collected, stored, and
shared on popular social networking sites.
Research Paper 3: Control-Related
Motivations and Information Security Policy Compliance: The
Role of Autonomy and Efficacy by Jeffrey Wall, (University of
North Carolina at Greensboro), Prashant Palvia (University of
North Carolina at Greensboro), and Paul Lowry (City University
of Hong Kong, Hong Kong)
Abstract. Employees’ failures to follow
information security policy (ISP) can be costly to
organizations, causing organizations to implement security
controls to motivate secure behavior. Information security
research has explored many control-related motivations (e.g.,
self-efficacy, response efficacy, and behavioral control) in
the context of ISP compliance; however, the behavioral effects
of perceptions of autonomous functioning are not well
understood in security contexts. This paper examines employee
autonomy as a control-related motivation from the lens of
self-determination theory and psychological reactance theory.
Self-determination theory is widely used in other disciplines
to explain intrinsically driven behavior, but has not been
applied to security research. Psychological reactance theory
is also widely used, but is only beginning to receive
attention in security research. Self-determination and
psychological reactance offer complementary yet opposite
conceptualizations of trait-based autonomy. This paper posits
that perceptions of trait-based autonomy influence
self-efficacy and response efficacy. Through a survey of
government employees, we provide support for several
hypotheses. We also discuss important directions for the use
of self-determination theory and psychological reactance
theory in future research.
The Expert Opinion Section. Interview with
an expert.
The Book Review Section. The book reviewed:
I Know Who You Are and I Saw What You Did, by Lori Andrews.
New York: Free Press, 2013. 253 pp. Reviewed by Sadaf Ashtari,
Eastern Michigan University. Mr. Ashtari observes that “the
author puts forth a set of regulations called the Social
Network Constitution to alleviate some of these difficulties,
and help people keep their data and information safe in a
public place and give them more means to protect themselves
against offenders” but also mentions that more concrete
examples are needed for a Social Network Constitution
Faruk
Arslan
Department
of Accounting and Information Systems | College of Business
| The University of Texas at El Paso
Mobile: 00 1 915 227 4889|
http://business.utep.edu/faculty/profiles/arslan/ |
www.linkedin.com/pub/faruk-arslan/6/1a1/913