EconPapers    
Economics at your fingertips  
 

International Journal of Information Security and Privacy (IJISP)

2007 - 2025

Current editor(s): Yassine Maleh

From IGI Global
Bibliographic data for series maintained by Journal Editor ().

Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.


Volume 2, issue 4, 2008

On Access-Unrestricted Data Anonymity and Privacy Inference Disclosure Control pp. 1-21 Downloads
Zude Li and Xiaojun Ye
A Decentralized Security Framework for Web-Based Social Networks pp. 22-53 Downloads
Barbara Carminati, Elena Ferrari and Andrea Perego
SecCMP: Enhancing Critical Secrets Protection in Chip-Multiprocessors pp. 54-66 Downloads
Li Yang, Lu Peng and Balachandran Ramadass
Design and Implementation of a Framework for Assured Information Sharing Across Organizational Boundaries pp. 67-90 Downloads
Bhavani Thuraisingham, Yashaswini Harsha Kumar and Latifur Khan
Will it be Disclosure or Fabrication of Personal Information? An Examination of Persuasion Strategies on Prospective Employees pp. 91-109 Downloads
Xun Li and Radhika Santhanam

Volume 2, issue 3, 2008

The Impact of Privacy Legislation on Patient Care pp. 1-17 Downloads
Jeff Barnett
Using Statistical Texture Analysis for Medical Image Tamper Proofing pp. 18-27 Downloads
Samia Boucherkha and Mohamed Benmohamed
A Privacy Protection Model for Patient Data with Multiple Sensitive Attributes pp. 28-44 Downloads
Tamas S. Gal, Zhiyuan Chen and Aryya Gangopadhyay
Electronic Medical Records, HIPAA, and Patient Privacy pp. 45-54 Downloads
Jingquan Li and Michael J. Shaw
Protecting Patient Information in Outsourced Telehealth Services: Bolting on Security when it cannot be Baked in pp. 55-70 Downloads
Patricia Y. Logan and Debra Noles
Analyzing the Vulnerability of U.S. Hospitals to Social Engineering Attacks: How Many of Your Employees Would Share Their Password? pp. 71-83 Downloads
B. Dawn Medlin, Joseph A. Cazier and Daniel P. Foulk
The Influence of Media Trust and Internet Trust on Privacy-Risking Uses of E-Health pp. 84-97 Downloads
E. Vance Wilson, David D. Dobrzykowski and Joseph A. Cazier

Volume 2, issue 2, 2008

Memory-Based Antiforensic Tools and Techniques pp. 1-13 Downloads
Hamid Jahankhani and Elidon Beqiri
A Secure and Trustful E-Ordering Architecture (TOES) for Small and Medium Size Enterprises (SEMs) pp. 14-30 Downloads
Spyridon Papastergiou and Despina Polemi
Trust-Based Usage Control in Collaborative Environment pp. 31-45 Downloads
Li Yang, Chang Phuong, Amy Novobilski and Raimund K. Ege
Spam Classification Based on E-Mail Path Analysis pp. 46-69 Downloads
Srikanth Palla, Ram Dantu and João W. Cangussu
Laws and Regulations Dealing with Information Security and Privacy: An Investigative Study pp. 70-82 Downloads
John A. Cassini, B.Dawn Medlin and Adriana Romaniello

Volume 2, issue 1, 2008

SEACON: An Integrated Approach to the Analysis and Design of Secure Enterprise Architecture-Based Computer Networks pp. 1-25 Downloads
Surya B. Yadav
Life Cycle Pattern Study of Malicious Codes pp. 26-41 Downloads
June Wei, Randall C. Reid and Hongmei Zhang
An Empirical Investigation of an Individual's Perceived Need for Privacy and Security pp. 42-53 Downloads
Taner Pirim, Tabitha James, Katherine Boswell, Brian Reithel and Reza Barkhi
VIPSEC: Virtualized and Pluggable Security Services Architecture for Grids pp. 54-79 Downloads
Syed Naqvi
Computer Security Practices and Perceptions of the Next Generation of Corporate Computer Use pp. 80-90 Downloads
S.E. Kruck and Faye P. Teer

Volume 1, issue 4, 2007

An Ontology of Information Security pp. 1-23 Downloads
Almut Herzog, Nahid Shahmehri and Claudiu Duma
Towards Autonomous User Privacy Control pp. 24-46 Downloads
Amr Ali Eldin and Rene Wagenaar
E-Mail Worm Detection Using Data Mining pp. 47-61 Downloads
Mohammad M. Masud, Latifur Khan and Bhavani Thuraisingham
A Simulation Model of Information Systems Security pp. 62-74 Downloads
Norman Pendegraft and Mark Rounds
Rootkits and What we Know: Assessing US and Korean Knowledge and Perceptions pp. 75-86 Downloads
Kirk P. Arnett, Mark B. Schmidt, Allen C. Johnston, Jongki Kim and Hajin Hwang

Volume 1, issue 3, 2007

A Projection of the Future Effects of Quantum Computation on Information Privacy pp. 1-12 Downloads
Geoff Skinner and Elizabeth Chang
Information Systems Security: Cases of Network Administrator Threats pp. 13-25 Downloads
Hamid Jahankhani, Shantha Fernando, Mathews Z. Nkhoma and Haralambos Mouratidis
A Rule-Based and Game-Theoretic Approach to Online Credit Card Fraud Detection pp. 26-46 Downloads
Vishal Vatsa, Shamik Sural and A. K. Majumdar
Defeating Active Phishing Attacks for Web-Based Transactions pp. 47-60 Downloads
Xin Luo and Tan Teik Guan
A Semi-fragile Image Watermarking using Wavelet Inter Coefficient Relations pp. 61-75 Downloads
Latha Parameswaran and K. Anbumani

Volume 1, issue 2, 2007

On the Design of an Authentication System Based on Keystroke Dynamics Using a Predefined Input Text pp. 1-12 Downloads
Dieter Bartmann, Idir Bakdi and Michael Achatz
Privacy-Preserving Clustering to Uphold Business Collaboration: A Dimensionality Reduction Based Transformation Approach pp. 13-36 Downloads
Stanley R.M. Oliveira and Osmar R. Zaïane
Information Security Effectiveness: Conceptualization and Validation of a Theory pp. 37-60 Downloads
Kenneth J. Knapp, Thomas E. Marshall, R. Kelly Rainer and F. Nelson Ford
The Role of Privacy Risk in IT Acceptance: An Empirical Study pp. 61-73 Downloads
Joseph A. Cazier, E. Vance Wilson and B. Dawn Medlin
Ignorance is Bliss: The Effect of Increased Knowledge on Privacy Concerns and Internet Shopping Site Personalization Preferences pp. 74-92 Downloads
Thomas P. Van Dyke

Volume 1, issue 1, 2007

Trustworthy Web Services: An Experience-Based Model for Trustworthiness Evaluation pp. 1-17 Downloads
Stephen J.H. Yang, Blue C.W. Lan, James S.F. Hsieh and Jen-Yao Chung
Administering the Semantic Web: Confidentiality, Privacy, and Trust Management pp. 18-34 Downloads
Bhavani Thuraisingham, Natasha Tsybulnik and Ashraful Alam
Privacy-Preserving Transactions Protocol Using Mobile Agents with Mutual Authentication pp. 35-46 Downloads
Song Han, Vidyasagar Potdar, Elizabeth Chang and Tharam Dillon
Privacy-Preserving Data Mining and the Need for Confluence of Research and Practice pp. 47-63 Downloads
Lixin Fu, Hamid Nemati and Fereidoon Sadri
Privacy and Security in the Age of Electronic Customer Relationship Management pp. 65-86 Downloads
Nicholas C. Romano and Jerry Fjermestad
Page updated 2025-04-17