-------- Original-Nachricht -------- Betreff: [isworld] TOC: Journal of Information Privacy and Security (JIPS) - Volume 4 Issue 3 Datum: Thu, 2 Apr 2009 12:01:19 -0500 Von: Changchit, Chuleeporn Chuleeporn.Changchit@tamucc.edu Antwort an: Changchit, Chuleeporn Chuleeporn.Changchit@tamucc.edu An: AISWORLD Information Systems World Network isworld@lyris.isworld.org CC: Changchit, Chuleeporn Chuleeporn.Changchit@tamucc.edu
In this announcement:
Table of contents of the Current Issue Editorial Preface from the Current Issue
Please distribute to colleagues, authors and relevant lists. ---------------------------------------------------------------------------------------- Journal of Information Privacy and Security (JIPS) Volume 4, Issue 3
Editor-in-Chief: Chuleeporn Changchit, Texas A&M University - Corpus Christi Journal website: http://jips.cob.tamucc.edu Publisher: Ivy League Publishing; Website: http://www.ivylp.com ; Email: admin@ivylp.com
Table of contents
Editorial Preface Chuleeporn Changchit
Consumer's PCs: A Study of Hard Drive Forensics, Data Recovery, and Exploitation B. Dawn Medlin, Joseph A. Cazier, and Robert M. Weaver
Prime III: Defense-in-Depth Approach to Electronic Voting Juan E. Gilbert, Jonathan MacDonald, Raquel Hill, Derek T. Sanders, Idongesit Mkpong-Ruffin, E. Vincent Cross, II, Ken Rouse, Jerome McClendon, and Gregory Rogers
The Role of Emotions in Shaping Consumers' Privacy Beliefs about Unfamiliar Online Vendors Han Li, Rathindra Sarathy, and Jie Zhang
Expert Opinion: Interview with Andrew Colarik, Information Security Consultant, Speaker, Author and Inventor Choton Basu
Book Review: Born Digital - Understanding the First Generation of Digital Natives by John Palfrey and Urs Gasser Choton Basu
********************************************************************************************************************************************************* Editorial Preface from the current Issue:
This is the third issue of the Journal of Information Privacy & Security (JIPS) for 2008. This issue includes three articles, one interview, and one book review. In the digital age of today, we are concerned with many security and privacy issues. As this digital age continues to affect our daily personal, financial, and corporate activities; confidentiality, usability and safeguarding our information play an ever increasing role in our everyday lives. The concern for privacy and security will continue to be a topic of many discussions from data security, to the risks of cyber crime, to the development of electronic voting systems that can assure voters privacy and security. In this issue, each article discusses privacy and security related concerns from different perspectives.
The first paper titled "Consumer's PCs: A Study of Hard Drive Forensics, Data Recovery, and Exploitation" by B. Dawn Medlin, Joseph A. Cazier, and Robert M. Weaver discusses the existing issues of unsecured data in disposed hard drives and the security risks implied when the process of erasure of data is not completed successfully. The authors describe how traces of personal information such as names, social security numbers, pin numbers/passwords, and personal address as well as potentially embarrassing information can expose an individual to the devastating effects of violations and other security risks. The authors expose the types of information that may still be found and, in some cases, recovered from disposed hard disk drives, explain the risks involved, and provide recommendations how to protect sensitive data.
The second paper titled "Prime III: Defense-in-Depth Approach to Electronic Voting" by Juan E. Gilbert, Jonathan MacDonald, Raquel Hill, Derek T. Sanders, Idongesit Mkpong-Ruffin, E. Vincent Cross, II, Ken Rouse, Jerome McClendon, and Gregory Rogers, reviews the technical and security issues surrounding the Prime III electronic voting system in order to propose a solution, based on existing information security research. The study starts with an introduction to the Prime III electronic voting system, outlining the system's architecture to further discuss the electronic voting risk assessment, and then identify four classes of electoral threats: Disclosure, Deception, Disruption, and Usurpation. To prevent these risks and increase voter trust, the authors suggest the use of a software independent system, where the voter-verified video audit trail and encryption technology were implemented to ensure voter privacy and security.
The third paper titled "The Role of Emotions in Shaping Consumers' Privacy Beliefs about Unfamiliar Online Vendors" by Han Li, Rathindra Sarathy, and Jie Zhang, extends the investigations within the privacy of information in the electronic field. Using the Theory of Reasoned Action, the authors attempt to explain the perceived privacy beliefs (privacy protection) from a vendor's point of view, in the specific case where the user is unfamiliar with the vendor site. This belief is generated as an emotional response of the customer's interaction with the given vendor's web-page, stating that both the beliefs and the emotions together can have an influential impact on the customer's decision to make a purchase. The authors then suggest that online vendors should increase their attention toward customer emotion when interacting with their web-site, especially when it is a first time interaction.
In the Expert Opinion section, Andrew Colarik, Information Security Consultant, Speaker, Author and Inventor, describes the relationship between the concepts of security and privacy. The security matrix demonstrating four factors involving privacy and security issues is presented and discussed. He then provides his opinion on the future direction for privacy issue.
In the Book Review section, Choton Basu reviews the book entitled Born Digital - Understanding the First Generation of Digital Natives by John Palfrey and Urs Gasser. Basu highly recommended this book for teachers and parents. In his opinion, this is an excellent, must-read book. He also states that although the book does not present a detailed look at the Born Digital phenomena, it certainly covers every relevant facet.
Chuleeporn Changchit February 2009
The AISWorld LISTSERV is a service of the Association for Information Systems (http://www.aisnet.org). To unsubscribe, redirect, or change subscription options please go to http://lyris.isworld.org/. You are subscribed to AISworld as: neumann@wu-wien.ac.at. Each Sender assumes responsibility that his or her message conforms to the AISWorld LISTSERV policy and conditions of use available at http://lyris.isworld.org/isworldlist.htm.