-------- Original-Nachricht -------- Betreff: [isworld] Papers published in the new issue of JOCEC Datum: Wed, 26 Nov 2008 22:45:13 -0500 Von: Clyde W. Holsapple cwhols@uky.edu Antwort an: Clyde W. Holsapple cwhols@uky.edu An: AISWORLD Information Systems World Network isworld@lyris.isworld.org
I am pleased to announce publication of Volume 18, Issue 4 of the Journal of Organizational Computing and Electronic Commerce. This issue is comprised of the following articles:
************************ The state of risk assessment practices in information security
Jackie Rees Purdue University
Jonathan Allen University of San Francisco
Risk in Information Systems Security can be defined as a function of a given threat source�s exercising a particular vulnerability, and the resulting impact of that adverse event on the organization. Risk management is the process of identifying and assessing risk and taking steps to reduce it to an acceptable level, given the costs involved in doing so. The major activity within risk management is the risk assessment process. The objective of this research is to assess the current state of practice in conducting risk assessments for information security policy management. Results from an exploratory survey of U.S. headquartered firms indicate that increased frequency of conducting risk assessments, the use of quantitative measures of likelihood of loss, and more complete asset inventories correspond to higher levels of user satisfaction and perceived usefulness, although many companies choose not to do engage in this level of practice, or only go part way. Additionally, respondents reported substantial difficulty in identifying threats and estimating loss, indicating that much can be done to improve the current state of practice.
Keywords: information systems security, information technology management practices, information systems risk management, risk assessment
************************
Spam and beyond: An information-economic analysis of unwanted commercial messages
Robert K. Plice San Diego State University
Oleg Pavlov Worcester Polytechnic Institute
Nigel P. Melville University of Michigan
The phenomenon of unwanted commercial messages (UCM), including e-mail spam and emerging forms that target other internet communications facilities, is analyzed from an information-economics perspective. UCM traffic pays off for its senders when it is noticed and consumed by internet users, and the industry is, therefore, dependent on a common-pool resource that is accessed through an information asset. An analytical model of the industry is derived and solved computationally, and two dimensions of information quality held by the senders of UCM traffic are manipulated in the model. It is shown that such manipulations can moderate over time both the number of UCM campaigns undertaken and the amount of internet bandwidth consumed by UCM. Manipulations of the information quality dimensions affected by e-mail filtering reduce the amount of traffic that penetrates an internet user�s attention space but actually increase the amount of internet bandwidth consumed. This is consistent with data reported by e-mail security providers as filters have been deployed. It is also shown that both public and private entities have adopted policies and practices with unintentional informational side effects. These effects may have led to more, rather than less, spam e-mail traffic. It is concluded that the lessons learned from the case of e-mail spam can be applied to the development of policies and practices for mitigating newer, emerging forms of UCM, including versions targeting instant-messaging systems and web logs.
Keywords: internet communications, spam, common-pool resources, tragedy of the commons, economic models, simulations.
************************
Timing Movie Release on the Internet in the Context of Piracy
Sanjukta Das SUNY University at Buffalo
Many benefits have been professed in having personalized engines in a web site. Several kinds of architectures have evolved to support this kind of information system. Even though, a recent survey has shown that online shopping behavior is not altered by installing these systems in a web site, enormous money is being spent to use them in web sites. These commercial personalization engines are very expensive to buy and are proprietary in nature. One alternative advocated in this paper is to use a new architecture that follows an open source philosophy and uses a SPIN-based question-answering strategy to interact with the visitors. An implementation (called JESPER, a Jess-enabled Personalization system) of such an architecture using JESS (Java-based Expert System Shell) is also presented. Our experience shows that the personalization engines built this way for a web site can be quite cheap and rigorous.
Keywords: e-commerce, Web site, personalization, open source, on-line shopping
************************ The pulse of multiparticipant systems (Note)
Clyde W. Holsapple University of Kentucky
Multiparticipant systems comprise a major area of information systems research � a growth area of considerable vitality. Here, we examine the pulse of this research stream. This is done using the Journal of Organizational Computing and Electronic Commerce as a lens to develop a high-level perspective on the nature, progression, and diversity of research in the area of multiparticipant systems.
************************
Please consider the Journal of Organizational Computing and Electronic Commerce as a possible outlet for your own very best original research dealing with multiparticipant digital systems.
For further information about JOCEC, including prior issues and submission guidelines, please see:
http://www.tandf.co.uk/journals/journal.asp?issn=1091-9392&subcategory=C...
JOCEC is published by Taylor & Francis.
Clyde W. Holsapple Editor-in-Chief, Journal of Organizational Computing and Electronic Commerce Gatton College of Business and Economics University of Kentucky
The AISWorld LISTSERV is a service of the Association for Information Systems (http://www.aisnet.org). To unsubscribe, redirect, or change subscription options please go to http://lyris.isworld.org/. You are subscribed to AISworld as: neumann@wu-wien.ac.at. Each Sender assumes responsibility that his or her message conforms to the AISWorld LISTSERV policy and conditions of use available at http://lyris.isworld.org/isworldlist.htm.