Forthcoming articles

International Journal of Information Privacy, Security and Integrity

International Journal of Information Privacy, Security and Integrity (IJIPSI)

These articles have been peer-reviewed and accepted for publication but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.

Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.

Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.

Register for our alerting service, which notifies you by email when new issues are published online.

Open AccessArticles marked with this Open Access icon are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.
We also offer which provide timely updates of tables of contents, newly published articles and calls for papers.

International Journal of Information Privacy, Security and Integrity (5 papers in press)

Regular Issues

  • Proposition of a dynamic steganography system based on the chaos properties and image registration for distributing an encryption key   Order a copy of this article
    by Rachid RIMANI, Naima Hadj Said, Adda Ali Pacha 
    Abstract: Cryptography has been used as an instrument for securing confidential data, especially with the globalization of exchanges (internet, messaging and e-commerce), based on various mediums (sound, image, video). Keys have a crucial role in the security of cryptosystems and their distribution is an important primitive in cryptography. This article presents a new dynamic system of steganography (data hiding) for concealing data in a particular sequence of images intended to regulate in an unlimited time the secure transfer of the key between the different correspondents; the proposed key exchange protocol using an image registration system and a chaotic sequence is comparable to the Diffie-Hellman key exchange protocol. The use of chaos makes it possible to increase the level of confidentiality by sending to the receiver a register which contains parameters of a chaotic sequence; knowing these parameters, the receiver can extract the chaotic sequence. The purpose of using the image registration is to find the transformation between two or several images; these transformations become a tool with the chaotic sequence calculated to recover the key on the receiver side.
    Keywords: chaotic sequence; Diffie-Hellman key exchange; image registration; secure transfer; steganography.

  • The Study of Acceptance Thai LGBTQs in Bangkok: Analysis of Attitudes from Gen-Z People   Order a copy of this article
    by Jirayut Monjagapate, Nakorn Rungkittanasan 
    Abstract: This study is intentionally created to make an awareness about being third genders in the society. We interviewed 300 interviewees who were born from 1995 to 2012, or they are called as generation-z people. Those interviewees are living in Bangkok, Thailand. The interviewees were asked about their opinions in terms of acknowledgement and perceiving on LGBTQs. There are 2 main parts that the study tries to figure them out. In the first part, interviewees are asked to define the definition of being third genders. As a result, the majority of interviewees believes that being third gender refers to a man who wants to be a woman, and being third gender highly refers to men rather than women. However, the term third gender is wider than that. Therefore, people should understand more about gender diversity. Secondly, they are asked about acceptance of third genders. The results are illustrated that male and female (referred to heterosexuality) interviewees accept third genders more than third genders accept themselves (this is based on scores that interviewees answered in terms of numerical documents only). In the same direction, in Thai society, third genders are still in limitation of regulations and official acceptance. The majority of interviewees gave a high rate of acceptance of LGBTQs. However, they still believe that nowadays, third genders are still not totally treated equally. The scores that interviewees gave and authors observed from the interview are in different level between Family and Mentality section with high variations.
    Keywords: LGBTQ; Third Genders; Generation-Z.

  • Live event creation and management : case of King Bhumibol Adulyadej mourning event   Order a copy of this article
    by Chonlathip Aswakan 
    Abstract: On the 13th of October 2016, Thailand and the world lost a great man, King Bhumibol Adulyadej. Thailand has mourning period following his death. This research studies the creation of a live event designed to express loyalty towards the late King. The areas of study are: idea generation, interpretation, and communication of the message of appreciation for the king. Even though we are in sorrow and tears are in our faces, our beloved Thailand and the monarchy must continue, noted the Thai Prime Minister during an appearance broadcast on all Thai television channels. Do not let the death derail his majestys determination to see his kingdom prosper, the people live in blessedness, and be kind to each other he continued. This research is divided into three parts: production and management, creative and performance communication, and design production. As the sender, the creators a of a live event about the King and the mourning period have many factors to consider including the appropriate modes of expression in Thai ceremony, culture, and tradition, and also the fact that people were sad and it was a sensitive time. The main message of the event was thankfulness, respect, and deep gratitude toward King Rama IX. The results show that audiences, made up of both Thais and foreigners, felt part of the live event, demonstrated their appreciation with tears, and showed their respect toward the King.
    Keywords: Communication Studied; Event creation; Event management.

  • BiSign: Pairing-Based Anonymity in Bitcoin Cryptocurrency   Order a copy of this article
    by Albert Kofi Kwansah Ansah, Daniel Adu-Gyamfi, Stephen Anokye 
    Abstract: The field of cybersecurity and its applications are still under discovery, despite the existing advances in research and education. New technologies keep evolving. Bitcoin as cryptocurrency cyber application has recently evolved which records cryptocurrency transactions on a Blockchain network. Bitcoin is arguably the most popular peer-to-peer electronic payment system but its anonymity is not fully explored. Users information and identity leakage vulnerabilities possibly exist due to Bitcoins public address system and decentralised nature of the blockchain network which invariably attracts privacy issues. Practical and compatible anonymity requirements for users are still not satisfactory despite several attempts provided in existing techniques. In this paper, we propose a privacy-preservation scheme that ensures users carry out anonymous bitcoin transactions based on bilinear pairing, elliptic curve cryptography, and other cryptographic primitives. We theoretically analyse and evaluate our proposed scheme which is proven secure to implement for preserving users privacy in bitcoin transactions without any modification to the Bitcoin blockchain. Simulation performed proved the correctness of our scheme and show average performance time of 6musec and 11musec respectively for 80-bits and 128-bits with PBC Type A pairing internal. Effectively, the analysis and evaluation suggest the proposed scheme as secure and robust to implement for preserving users privacy in bitcoin transactions.
    Keywords: Bitcoin; Blockchain; Anonymity; Cryptocurrency; Bilinear pairing; User privacy.

  • Privacy-Preservation in Data Pre-processing for Web Usage Mining   Order a copy of this article
    by Michael Mireku Kwakye 
    Abstract: Many online systems offer recommendation of varied aspects to web users to provide enough utility and the right kind of user preference data. Most of these recommendations arise out of well-processed underlying data from data mining procedures. The data mining procedures tend to expose seemingly private data item values to unintended analysts, especially that of demographic data. In this paper, the research study proposes a privacy-preserving framework architecture that enforces privacy on the data item values of web log and demographic data of users. The privacy issues are addressed by introducing a privacy-preserving database that stores a privacy commitment tuple; composed of the data item value and the privacy-preservation property values. This methodology approach proposes to offer merits in ensuring the protection of web users privacy information during data mining tasks. Additionally, the approach offers different levels of protection; where on the user-centric level, users personal privacy preferences are enabled, as part of subscribing to the laid down privacy policy on the web system. On the other hand, general privacy protection is enforced at the system-level by Service Providers (SPs).
    Keywords: Web Usage Mining; Data Privacy; Privacy Taxonomy; Privacy-Preservation; Privacy Policies.