Forthcoming articles

 


International Journal of Information Privacy, Security and Integrity

 

These articles have been peer-reviewed and accepted for publication in IJIPSI, but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.

 

Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.

 

Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.

 

Articles marked with this Open Access icon are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.

 

Register for our alerting service, which notifies you by email when new issues of IJIPSI are published online.

 

We also offer RSS feeds which provide timely updates of tables of contents, newly published articles and calls for papers.

 

International Journal of Information Privacy, Security and Integrity (2 papers in press)

 

Regular Issues

 

  • TOWARDS AN INTERCULTURAL APPROACH TO INFORMATION SECURITY   Order a copy of this article
    by Miloslava Plachkinova, Steven Andres 
    Abstract: National culture plays an important role in the development and compliance with information security (InfoSec) policy and standards. A successful InfoSec policy must demonstrate understanding of the local workforces culture and not just blindly impose rules and regulations. We conducted a quantitative study of 177 professionals across 35 national cultures to investigate whether national culture influences InfoSec training and best practices using Hofstedes six cultural dimensions. Our findings indicate that training programs should more directly address the variances in perception of InfoSec across cultures. These training programs should also reflect the significance of the organisations InfoSec policies in the context of the local employee, while maintaining unified corporate governance. By increasing training comprehension, organisations can reduce security incidents resulting from unintentional policy violations and, in turn, avoid costly remediation efforts.
    Keywords: Information security; training; education; compliance; national culture; insider threat; corporate governance.

  • How the Modification of Personality Traits Leave One Vulnerable to Manipulation in Social Engineering   Order a copy of this article
    by James Stewart, Maurice Dawson 
    Abstract: Research on cyber security related to social engineering has expanded from its purely technological orientation into explaining the role of human behavior in detecting deception. In the broadest definition, social engineering, in the context of information security, is the manipulation of individuals to perform actions that cause harm or increase the probability of causing future harm. Human personality traits significantly contribute to the probability that an individual is susceptible to manipulation related to social engineering deception attacks and exploits (Maurya, 2013). The outcome of the attacks and objective is the alteration of normal and rational decision making as described in behavior decision theory (Kamis, 2011). This quantitative, non-experimental study determined what makes an individual based on personality traits predisposed to social engineering treats in the context of susceptibility to deception manipulation and exploitation.
    Keywords: deception susceptibility; social engineering personality traits; social engineering; behavior modification; cyber-attack; risk management; decision theory.