EconPapers    
Economics at your fingertips  
 

International Journal of Information Security and Privacy (IJISP)

2007 - 2025

Current editor(s): Yassine Maleh

From IGI Global
Bibliographic data for series maintained by Journal Editor ().

Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.


Volume 5, issue 4, 2011

A Privacy Agreement Negotiation Model in B2C E-Commerce Transactions pp. 1-7 Downloads
Murthy V. Rallapalli
A Unified Use-Misuse Case Model for Capturing and Analysing Safety and Security Requirements pp. 8-30 Downloads
O. T. Arogundade, A. T. Akinwale, Z. Jin and X. G. Yang
Evaluating the Quality and Usefulness of Data Breach Information Systems pp. 31-46 Downloads
Benjamin Ngugi, Jafar Mana and Lydia Segal
Wild-Inspired Intrusion Detection System Framework for High Speed Networks (f|p) IDS Framework pp. 47-58 Downloads
Hassen Sallay, Mohsen Rouached, Adel Ammar, Ouissem Ben Fredj, Khalid Al-Shalfan and Majdi Ben Saad

Volume 5, issue 3, 2011

Design and Implementation of a Zero-Knowledge Authentication Framework for Java Card pp. 1-18 Downloads
Ahmed Patel, Kenan Kalajdzic, Laleh Golafshan and Mona Taghavi
E-Voting Risk Assessment: A Threat Tree for Direct Recording Electronic Systems pp. 19-35 Downloads
Harold Pardue, Jeffrey P. Landry and Alec Yasinsac
Intrusion Detection Algorithm for MANET pp. 36-49 Downloads
S. Srinivasan and S. P. Alampalayam
An Integrated Security Governance Framework for Effective PCI DSS Implementation pp. 50-67 Downloads
Mathew Nicho, Hussein Fakhry and Charles Haiber

Volume 5, issue 2, 2011

User Perceptions of Security Technologies pp. 1-12 Downloads
Douglas M. Kline, Ling He and Ulku Yaylacicegi
Secure Two-Party Association Rule Mining Based on One-Pass FP-Tree pp. 13-32 Downloads
Golam Kaosar and Xun Yi
A Mark-Up Language for the Specification of Information Security Governance Requirements pp. 33-53 Downloads
Anirban Sengupta and Chandan Mazumdar
On the Security of Self-Certified Public Keys pp. 54-60 Downloads
Cheng-Chi Lee, Min-Shiang Hwang and I-En Liao

Volume 5, issue 1, 2011

A Secure Hybrid Network Solution to Enhance the Resilience of the UK Government National Critical Infrastructure TETRA Deployment pp. 1-13 Downloads
Devon Bennett, Hamid Jahankhani, Mohammad Dastbaz and Hossein Jahankhani
A Self-Supervised Approach to Comment Spam Detection Based on Content Analysis pp. 14-32 Downloads
A. Bhattarai and D. Dasgupta
A Mutual Authentication Protocol with Resynchronisation Capability for Mobile Satellite Communications pp. 33-49 Downloads
Ioana Lasc, Reiner Dojen and Tom Coffey
Information Privacy: Implementation and Perception of Laws and Corporate Policies by CEOs and Managers pp. 50-66 Downloads
Garry L. White, Francis A. Méndez Mediavilla and Jaymeen R. Shah

Volume 4, issue 4, 2010

A Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments pp. 1-20 Downloads
Feng W. Zhu, Sandra Carpenter, Wei Zhu and Matt Mutka
Hiding Message in Map Along Pre-Hamiltonian Path pp. 21-34 Downloads
Sunil Kumar Muttoo and Vinay Kumar
Probabilistic Inference Channel Detection and Restriction Applied to Patients’ Privacy Assurance pp. 35-59 Downloads
Bandar Alhaqbani and Colin Fidge

Volume 4, issue 3, 2010

The Integrated Privacy Model: Building a Privacy Model in the Business Processes of the Enterprise pp. 1-21 Downloads
Munir Majdalawieh
Policy Enforcement System for Inter-Organizational Data Sharing pp. 22-39 Downloads
Mamoun Awad, Latifur Khan and Bhavani Thuraisingham
Goals and Practices in Maintaining Information Systems Security pp. 40-50 Downloads
Zippy Erlich and Moshe Zviran
Factors Influencing College Students’ Use of Computer Security pp. 51-60 Downloads
Norman Pendegraft, Mark Rounds and Robert W. Stone

Volume 4, issue 2, 2010

Protecting User Privacy Better with Query l-Diversity pp. 1-18 Downloads
Fuyu Liu and Kien A. Hua
Globalization and Data Privacy: An Exploratory Study pp. 19-35 Downloads
Robert L. Totterdale
Security Issues for Cloud Computing pp. 36-48 Downloads
Kevin Hamlen, Murat Kantarcioglu, Latifur Khan and Bhavani Thuraisingham
Global Information Security Factors pp. 49-60 Downloads
Garry White and Ju Long

Volume 4, issue 1, 2010

Provable Security for Outsourcing Database Operations pp. 1-17 Downloads
Sergei Evdokimov, Matthias Fischmann and Oliver Günther
A Host-Based Intrusion Detection System Using Architectural Features to Improve Sophisticated Denial-of-Service Attack Detections pp. 18-31 Downloads
Ran Tao, Li Yang, Lu Peng and Bin Li
A Keystroke Biometric Systemfor Long-Text Input pp. 32-60 Downloads
Charles C. Tappert, Sung-Hyuk Cha, Mary Villani and Robert S. Zack
A Six-View Perspective Framework for System Security: Issues, Risks, and Requirements pp. 61-92 Downloads
Surya B. Yadav
Are Online Privacy Policies Readable? pp. 93-116 Downloads
M. Sumeeth, R. I. Singh and J. Miller

Volume 3, issue 4, 2009

Preserving Privacy in Mining Quantitative Associations Rules pp. 1-17 Downloads
Madhu V. Ahluwalia, Aryya Gangopadhyay and Zhiyuan Chen
A New Soa Security Model to Protect Against Web Competitive Intelligence Attacks by Software Agents pp. 18-28 Downloads
Hamidreza Amouzegar, Mohammad Jafar Tarokh and Anahita Naghilouye Hidaji
PAKE on the Web pp. 29-42 Downloads
Xunhua Wang and Hua Lin
Three Models to Measure Information Security Compliance pp. 43-67 Downloads
Wasim A. Al-Hamdani
Do You Know Where Your Data Is? A Study of the Effect of Enforcement Strategies on Privacy Policies pp. 68-95 Downloads
Ian Reay, Patricia Beatty, Scott Dick and James Miller

Volume 3, issue 3, 2009

Security and Privacy Issues in Secure E-Mail Standards and Services pp. 1-13 Downloads
Lei Chen, Wen-Chen Hu, Ming Yang and Lei Zhang
Applied Cryptography for Security and Privacy in Wireless Sensor Networks pp. 14-36 Downloads
Dulal C. Kar, Hung L. Ngo and Geetha Sanapala
Cryptographic and Steganographic Approaches to Ensure Multimedia Information Security and Privacy pp. 37-54 Downloads
Ming Yang, Monica Trifas, Guillermo Francia and Lei Chen
Cloak and Dagger: Man-In-The-Middle and Other Insidious Attacks pp. 55-75 Downloads
Ramakrishna Thurimella and William Mitchell
Fair Electronic Exchange Based on Fingerprint Biometrics pp. 76-106 Downloads
Harkeerat Bedi and Li Yang
Secure and Private Service Discovery in Pervasive Computing Environments pp. 107-122 Downloads
Feng Zhu and Wei Zhu

Volume 3, issue 2, 2009

Information Systems Security Assurance Management at Municipal Software Solutions, Inc pp. 1-9 Downloads
Virginia Franke Kleist, Bonnie Morris and James W. Denton
A Chronicle of a Journey: An E-Mail Bounce Back System pp. 10-41 Downloads
Alex Kosachev and Hamid R. Nemati
Data Privacy and Security: HIPAA and Small Business Compliance pp. 42-53 Downloads
James Suleiman and Terry Huston
PCI Compliance: Overcoming the Challenges pp. 54-67 Downloads
Benjamin Ngugi, Gina Vega and Glenn Dardick
Information Technology Security Concerns in Global Financial Services Institutions: Do Socio-Economic Factors Differentiate Perceptions? pp. 68-83 Downloads
Princely Ifinedo
Information Security by Words Alone: The Case for Strong Security Policies pp. 84-89 Downloads
Kirk P. Arnett, Gary F. Templeton and David A. Vance
The Social Organization of a Criminal Hacker Network: A Case Study pp. 90-104 Downloads
Yong Lu

Volume 3, issue 1, 2009

Re-Evaluation of On-Line Hot Topic Discovery Model pp. 1-10 Downloads
Hui-min Ye, Sushil K. Sharma and Huinan Xu
Understanding User Behavior towards Passwords through Acceptance and Use Modelling pp. 11-29 Downloads
Lee Novakovic, Tanya McGill and Michael Dixon
Without Permission: Privacy on the Line pp. 30-44 Downloads
Joanne H. Pratt and Sue Conger
Do Privacy Statements Really Work? The Effect of Privacy Statements and Fair Information Practices on Trust and Perceived Risk in E-Commerce pp. 45-64 Downloads
Hamid R. Nemati and Thomas Van Dyke
Large Key Sizes and the Security of Password-Based Cryptography pp. 65-72 Downloads
Kent D. Boklan
Page updated 2025-04-17