-------- Original-Nachricht -------- Betreff: [isworld] TOC: Journal of Information Privacy and Security (JIPS) - Volume 4 Issue 1 Datum: Thu, 16 Oct 2008 16:51:12 -0500 Von: Changchit, Chuleeporn, Ph.D. Chuleeporn.Changchit@tamucc.edu Antwort an: Changchit, Chuleeporn, Ph.D. Chuleeporn.Changchit@tamucc.edu An: AISWORLD Information Systems World Network isworld@lyris.isworld.org CC: Changchit, Chuleeporn, Ph.D. Chuleeporn.Changchit@tamucc.edu
In this announcement:
Table of contents of the Current Issue Editorial Preface from the Current Issue
Please distribute to colleagues, authors and relevant lists. ---------------------------------------------------------------------------------------- Journal of Information Privacy and Security (JIPS) Volume 4, Issue 1
Editor-in-Chief: Chuleeporn Changchit, Texas A&M University - Corpus Christi Journal website: http://jips.cob.tamucc.edu Publisher: Ivy League Publishing; Website: http://www.ivylp.com ; Email: admin@ivylp.com
Table of contents
Editorial Preface Chuleeporn Changchit
Responding to Critical Infrastructure Threats of Reliability and Security: Economic, Organizational and Technical Perspectives for a Next Generation US Electric Grid Elizabeth White Baker
Managing Anti-Circumvention Technology for Digital Content Taeha Kim, Youngshin Kim, and Alex Talalayevsky
An Empirical Investigation on Customer’s Privacy Perceptions, Trust and Security Awareness in E-commerce Environment Anil Gurung, Xin Luo, and M. K. Raja
Expert Opinion: Interview with Peter B. McCarthy, United States Department of the Treasury Nathaniel J. Melby
Book Review: Management of Information Security by Michael E. Whitman and Herbert J. Mattord Joseph Mollick
********************************************************************************************************************************************************* Editorial Preface from the current Issue:
This is the first issue of the Journal of Information Privacy & Security (JIPS) for 2008. This issue includes three articles, one interview, and one book review. The sensitivity associated with the protection of information and data systems continues to point to the importance of privacy and security. An organization needs to define necessary elements that can guarantee the continuance of operations in both private and governmental entities. Each article in this issue discusses this main concern from different perspectives.
The first article, “Responding to Critical Infrastructure Threats of Reliability and Security: Economic, Organizational and Technical Perspectives for a Next Generation US Electric Grid” by Elizabeth White Baker, discusses the existing vulnerability of the US electricity grid with regard to exogenous attacks and analyzes the current and future economic, regulatory and organizational factors that would ensure its reliability in the case of an emergency situation. Since a reliable power supply through an integrated electric grid keeps the nation secure, the US electricity grid is considered a critical fundamental infrastructure with a major role in the cyber security of the US. The author exalts that the issue with the protection of the US electric grid demands for better monitoring and management of the grid itself through focusing on improvements to both technical and organizational elements surrounding the grid. The author, therefore, proposes improving efficiency by changing the existing assessment and avoidance architecture to a cybernetic command and control architecture. The technical features of information systems to improve the emergency preparedness and daily operational functionality of the US electric grid are described, along with the economic, organizational, and regulatory initiatives necessary for such a system to be implemented.
The second article, “Managing Anti-Circumvention Technology for Digital Content” by Taeha Kim, Youngshin Kim, and Alex Talalayevsky, develops a framework for anti-circumvention technology for digital content based on a model that demonstrates how anti-circumvention technologies interact with a firm’s pricing strategy with respect to varying anti-circumvention rules and market parameters. The economic approach taken in this article focuses on how the combination strategies of implementing anti-circumvention technologies and pricing of digital content influences a firm’s profitability under varying market conditions, parameters and consumer attributes. The authors identify that optimal levels are reached under certain conditions at lower levels of technological protection and prices may possibly need downward adjustments in order to stimulate consumption. Furthermore it is enhanced that consumer’s behaviors toward anti-circumvention technologies may be a setting point for firms to define the technological protection to use, tolerance and sensitivity to any disutility will define the profit maximizing for firms. .
The third article, “An Empirical Investigation on Customer’s Privacy Perceptions, Trust and Security Awareness in E-commerce Environment” by Anil Gurung, Xin, Luo, and M. K. Raja, develops a model to study how users can use privacy protection strategies to relieve privacy concerns and take part in ecommerce. The authors conduct the study by empirically testing the relationships between privacy and Internet security measures using the theory of planned behavior to gauge and predict consumers’ behavioral intention to engage in e-commerce transactions. The findings of this study reveal that consumers enhance their online experience by using privacy protection strategies. The results also indicate that to a significant extent, trust may lower the risk beliefs induced by privacy concerns, therefore influencing consumers to engage in e-commerce transactions.
In the Expert Opinion section conducted by Nathaniel J. Melby, Peter B. McCarthy, Assistant Secretary for Management and CFO, United States Department of the Treasury, provides an insight to the core functions of the key government entity in alliance with the role that information technology management plays within it; furthermore defining the future challenges for the protection of privacy and security in government organizations. This interview highlights the importance of the efforts in privacy and security matters in order to protect vast amounts of personal data and direct sensitive communications through secure channels.
In the Book Review section, Joseph S. Mollick reviews the book entitled Management of Information Security by Michael E.Whitman and Herbert J. Mattord. According to Mollick, this is a helpful book for students and professionals in the area of information security management. He comments that since the book does not adequately reference some of the leading research articles in the security area, better academic balance may be achieved when combining this book with academically rigorous articles.
Chuleeporn Changchit 2008
The AISWorld LISTSERV is a service of the Association for Information Systems (http://www.aisnet.org). To unsubscribe, redirect, or change subscription options please go to http://lyris.isworld.org/. You are subscribed to AISworld as: neumann@wu-wien.ac.at. Each Sender assumes responsibility that his or her message conforms to the AISWorld LISTSERV policy and conditions of use available at http://lyris.isworld.org/isworldlist.htm.