International Journal of Information Security and Privacy (IJISP)
2007 - 2025
Current editor(s): Yassine Maleh From IGI Global Bibliographic data for series maintained by Journal Editor (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 5, issue 4, 2011
- A Privacy Agreement Negotiation Model in B2C E-Commerce Transactions pp. 1-7

- Murthy V. Rallapalli
- A Unified Use-Misuse Case Model for Capturing and Analysing Safety and Security Requirements pp. 8-30

- O. T. Arogundade, A. T. Akinwale, Z. Jin and X. G. Yang
- Evaluating the Quality and Usefulness of Data Breach Information Systems pp. 31-46

- Benjamin Ngugi, Jafar Mana and Lydia Segal
- Wild-Inspired Intrusion Detection System Framework for High Speed Networks (f|p) IDS Framework pp. 47-58

- Hassen Sallay, Mohsen Rouached, Adel Ammar, Ouissem Ben Fredj, Khalid Al-Shalfan and Majdi Ben Saad
Volume 5, issue 3, 2011
- Design and Implementation of a Zero-Knowledge Authentication Framework for Java Card pp. 1-18

- Ahmed Patel, Kenan Kalajdzic, Laleh Golafshan and Mona Taghavi
- E-Voting Risk Assessment: A Threat Tree for Direct Recording Electronic Systems pp. 19-35

- Harold Pardue, Jeffrey P. Landry and Alec Yasinsac
- Intrusion Detection Algorithm for MANET pp. 36-49

- S. Srinivasan and S. P. Alampalayam
- An Integrated Security Governance Framework for Effective PCI DSS Implementation pp. 50-67

- Mathew Nicho, Hussein Fakhry and Charles Haiber
Volume 5, issue 2, 2011
- User Perceptions of Security Technologies pp. 1-12

- Douglas M. Kline, Ling He and Ulku Yaylacicegi
- Secure Two-Party Association Rule Mining Based on One-Pass FP-Tree pp. 13-32

- Golam Kaosar and Xun Yi
- A Mark-Up Language for the Specification of Information Security Governance Requirements pp. 33-53

- Anirban Sengupta and Chandan Mazumdar
- On the Security of Self-Certified Public Keys pp. 54-60

- Cheng-Chi Lee, Min-Shiang Hwang and I-En Liao
Volume 5, issue 1, 2011
- A Secure Hybrid Network Solution to Enhance the Resilience of the UK Government National Critical Infrastructure TETRA Deployment pp. 1-13

- Devon Bennett, Hamid Jahankhani, Mohammad Dastbaz and Hossein Jahankhani
- A Self-Supervised Approach to Comment Spam Detection Based on Content Analysis pp. 14-32

- A. Bhattarai and D. Dasgupta
- A Mutual Authentication Protocol with Resynchronisation Capability for Mobile Satellite Communications pp. 33-49

- Ioana Lasc, Reiner Dojen and Tom Coffey
- Information Privacy: Implementation and Perception of Laws and Corporate Policies by CEOs and Managers pp. 50-66

- Garry L. White, Francis A. Méndez Mediavilla and Jaymeen R. Shah
Volume 4, issue 4, 2010
- A Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments pp. 1-20

- Feng W. Zhu, Sandra Carpenter, Wei Zhu and Matt Mutka
- Hiding Message in Map Along Pre-Hamiltonian Path pp. 21-34

- Sunil Kumar Muttoo and Vinay Kumar
- Probabilistic Inference Channel Detection and Restriction Applied to Patients’ Privacy Assurance pp. 35-59

- Bandar Alhaqbani and Colin Fidge
Volume 4, issue 3, 2010
- The Integrated Privacy Model: Building a Privacy Model in the Business Processes of the Enterprise pp. 1-21

- Munir Majdalawieh
- Policy Enforcement System for Inter-Organizational Data Sharing pp. 22-39

- Mamoun Awad, Latifur Khan and Bhavani Thuraisingham
- Goals and Practices in Maintaining Information Systems Security pp. 40-50

- Zippy Erlich and Moshe Zviran
- Factors Influencing College Students’ Use of Computer Security pp. 51-60

- Norman Pendegraft, Mark Rounds and Robert W. Stone
Volume 4, issue 2, 2010
- Protecting User Privacy Better with Query l-Diversity pp. 1-18

- Fuyu Liu and Kien A. Hua
- Globalization and Data Privacy: An Exploratory Study pp. 19-35

- Robert L. Totterdale
- Security Issues for Cloud Computing pp. 36-48

- Kevin Hamlen, Murat Kantarcioglu, Latifur Khan and Bhavani Thuraisingham
- Global Information Security Factors pp. 49-60

- Garry White and Ju Long
Volume 4, issue 1, 2010
- Provable Security for Outsourcing Database Operations pp. 1-17

- Sergei Evdokimov, Matthias Fischmann and Oliver Günther
- A Host-Based Intrusion Detection System Using Architectural Features to Improve Sophisticated Denial-of-Service Attack Detections pp. 18-31

- Ran Tao, Li Yang, Lu Peng and Bin Li
- A Keystroke Biometric Systemfor Long-Text Input pp. 32-60

- Charles C. Tappert, Sung-Hyuk Cha, Mary Villani and Robert S. Zack
- A Six-View Perspective Framework for System Security: Issues, Risks, and Requirements pp. 61-92

- Surya B. Yadav
- Are Online Privacy Policies Readable? pp. 93-116

- M. Sumeeth, R. I. Singh and J. Miller
Volume 3, issue 4, 2009
- Preserving Privacy in Mining Quantitative Associations Rules pp. 1-17

- Madhu V. Ahluwalia, Aryya Gangopadhyay and Zhiyuan Chen
- A New Soa Security Model to Protect Against Web Competitive Intelligence Attacks by Software Agents pp. 18-28

- Hamidreza Amouzegar, Mohammad Jafar Tarokh and Anahita Naghilouye Hidaji
- PAKE on the Web pp. 29-42

- Xunhua Wang and Hua Lin
- Three Models to Measure Information Security Compliance pp. 43-67

- Wasim A. Al-Hamdani
- Do You Know Where Your Data Is? A Study of the Effect of Enforcement Strategies on Privacy Policies pp. 68-95

- Ian Reay, Patricia Beatty, Scott Dick and James Miller
Volume 3, issue 3, 2009
- Security and Privacy Issues in Secure E-Mail Standards and Services pp. 1-13

- Lei Chen, Wen-Chen Hu, Ming Yang and Lei Zhang
- Applied Cryptography for Security and Privacy in Wireless Sensor Networks pp. 14-36

- Dulal C. Kar, Hung L. Ngo and Geetha Sanapala
- Cryptographic and Steganographic Approaches to Ensure Multimedia Information Security and Privacy pp. 37-54

- Ming Yang, Monica Trifas, Guillermo Francia and Lei Chen
- Cloak and Dagger: Man-In-The-Middle and Other Insidious Attacks pp. 55-75

- Ramakrishna Thurimella and William Mitchell
- Fair Electronic Exchange Based on Fingerprint Biometrics pp. 76-106

- Harkeerat Bedi and Li Yang
- Secure and Private Service Discovery in Pervasive Computing Environments pp. 107-122

- Feng Zhu and Wei Zhu
Volume 3, issue 2, 2009
- Information Systems Security Assurance Management at Municipal Software Solutions, Inc pp. 1-9

- Virginia Franke Kleist, Bonnie Morris and James W. Denton
- A Chronicle of a Journey: An E-Mail Bounce Back System pp. 10-41

- Alex Kosachev and Hamid R. Nemati
- Data Privacy and Security: HIPAA and Small Business Compliance pp. 42-53

- James Suleiman and Terry Huston
- PCI Compliance: Overcoming the Challenges pp. 54-67

- Benjamin Ngugi, Gina Vega and Glenn Dardick
- Information Technology Security Concerns in Global Financial Services Institutions: Do Socio-Economic Factors Differentiate Perceptions? pp. 68-83

- Princely Ifinedo
- Information Security by Words Alone: The Case for Strong Security Policies pp. 84-89

- Kirk P. Arnett, Gary F. Templeton and David A. Vance
- The Social Organization of a Criminal Hacker Network: A Case Study pp. 90-104

- Yong Lu
Volume 3, issue 1, 2009
- Re-Evaluation of On-Line Hot Topic Discovery Model pp. 1-10

- Hui-min Ye, Sushil K. Sharma and Huinan Xu
- Understanding User Behavior towards Passwords through Acceptance and Use Modelling pp. 11-29

- Lee Novakovic, Tanya McGill and Michael Dixon
- Without Permission: Privacy on the Line pp. 30-44

- Joanne H. Pratt and Sue Conger
- Do Privacy Statements Really Work? The Effect of Privacy Statements and Fair Information Practices on Trust and Perceived Risk in E-Commerce pp. 45-64

- Hamid R. Nemati and Thomas Van Dyke
- Large Key Sizes and the Security of Password-Based Cryptography pp. 65-72

- Kent D. Boklan
| |