International Journal of Information Security and Privacy (IJISP)
2007 - 2025
Current editor(s): Yassine Maleh From IGI Global Bibliographic data for series maintained by Journal Editor (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 2, issue 4, 2008
- On Access-Unrestricted Data Anonymity and Privacy Inference Disclosure Control pp. 1-21

- Zude Li and Xiaojun Ye
- A Decentralized Security Framework for Web-Based Social Networks pp. 22-53

- Barbara Carminati, Elena Ferrari and Andrea Perego
- SecCMP: Enhancing Critical Secrets Protection in Chip-Multiprocessors pp. 54-66

- Li Yang, Lu Peng and Balachandran Ramadass
- Design and Implementation of a Framework for Assured Information Sharing Across Organizational Boundaries pp. 67-90

- Bhavani Thuraisingham, Yashaswini Harsha Kumar and Latifur Khan
- Will it be Disclosure or Fabrication of Personal Information? An Examination of Persuasion Strategies on Prospective Employees pp. 91-109

- Xun Li and Radhika Santhanam
Volume 2, issue 3, 2008
- The Impact of Privacy Legislation on Patient Care pp. 1-17

- Jeff Barnett
- Using Statistical Texture Analysis for Medical Image Tamper Proofing pp. 18-27

- Samia Boucherkha and Mohamed Benmohamed
- A Privacy Protection Model for Patient Data with Multiple Sensitive Attributes pp. 28-44

- Tamas S. Gal, Zhiyuan Chen and Aryya Gangopadhyay
- Electronic Medical Records, HIPAA, and Patient Privacy pp. 45-54

- Jingquan Li and Michael J. Shaw
- Protecting Patient Information in Outsourced Telehealth Services: Bolting on Security when it cannot be Baked in pp. 55-70

- Patricia Y. Logan and Debra Noles
- Analyzing the Vulnerability of U.S. Hospitals to Social Engineering Attacks: How Many of Your Employees Would Share Their Password? pp. 71-83

- B. Dawn Medlin, Joseph A. Cazier and Daniel P. Foulk
- The Influence of Media Trust and Internet Trust on Privacy-Risking Uses of E-Health pp. 84-97

- E. Vance Wilson, David D. Dobrzykowski and Joseph A. Cazier
Volume 2, issue 2, 2008
- Memory-Based Antiforensic Tools and Techniques pp. 1-13

- Hamid Jahankhani and Elidon Beqiri
- A Secure and Trustful E-Ordering Architecture (TOES) for Small and Medium Size Enterprises (SEMs) pp. 14-30

- Spyridon Papastergiou and Despina Polemi
- Trust-Based Usage Control in Collaborative Environment pp. 31-45

- Li Yang, Chang Phuong, Amy Novobilski and Raimund K. Ege
- Spam Classification Based on E-Mail Path Analysis pp. 46-69

- Srikanth Palla, Ram Dantu and João W. Cangussu
- Laws and Regulations Dealing with Information Security and Privacy: An Investigative Study pp. 70-82

- John A. Cassini, B.Dawn Medlin and Adriana Romaniello
Volume 2, issue 1, 2008
- SEACON: An Integrated Approach to the Analysis and Design of Secure Enterprise Architecture-Based Computer Networks pp. 1-25

- Surya B. Yadav
- Life Cycle Pattern Study of Malicious Codes pp. 26-41

- June Wei, Randall C. Reid and Hongmei Zhang
- An Empirical Investigation of an Individual's Perceived Need for Privacy and Security pp. 42-53

- Taner Pirim, Tabitha James, Katherine Boswell, Brian Reithel and Reza Barkhi
- VIPSEC: Virtualized and Pluggable Security Services Architecture for Grids pp. 54-79

- Syed Naqvi
- Computer Security Practices and Perceptions of the Next Generation of Corporate Computer Use pp. 80-90

- S.E. Kruck and Faye P. Teer
Volume 1, issue 4, 2007
- An Ontology of Information Security pp. 1-23

- Almut Herzog, Nahid Shahmehri and Claudiu Duma
- Towards Autonomous User Privacy Control pp. 24-46

- Amr Ali Eldin and Rene Wagenaar
- E-Mail Worm Detection Using Data Mining pp. 47-61

- Mohammad M. Masud, Latifur Khan and Bhavani Thuraisingham
- A Simulation Model of Information Systems Security pp. 62-74

- Norman Pendegraft and Mark Rounds
- Rootkits and What we Know: Assessing US and Korean Knowledge and Perceptions pp. 75-86

- Kirk P. Arnett, Mark B. Schmidt, Allen C. Johnston, Jongki Kim and Hajin Hwang
Volume 1, issue 3, 2007
- A Projection of the Future Effects of Quantum Computation on Information Privacy pp. 1-12

- Geoff Skinner and Elizabeth Chang
- Information Systems Security: Cases of Network Administrator Threats pp. 13-25

- Hamid Jahankhani, Shantha Fernando, Mathews Z. Nkhoma and Haralambos Mouratidis
- A Rule-Based and Game-Theoretic Approach to Online Credit Card Fraud Detection pp. 26-46

- Vishal Vatsa, Shamik Sural and A. K. Majumdar
- Defeating Active Phishing Attacks for Web-Based Transactions pp. 47-60

- Xin Luo and Tan Teik Guan
- A Semi-fragile Image Watermarking using Wavelet Inter Coefficient Relations pp. 61-75

- Latha Parameswaran and K. Anbumani
Volume 1, issue 2, 2007
- On the Design of an Authentication System Based on Keystroke Dynamics Using a Predefined Input Text pp. 1-12

- Dieter Bartmann, Idir Bakdi and Michael Achatz
- Privacy-Preserving Clustering to Uphold Business Collaboration: A Dimensionality Reduction Based Transformation Approach pp. 13-36

- Stanley R.M. Oliveira and Osmar R. Zaïane
- Information Security Effectiveness: Conceptualization and Validation of a Theory pp. 37-60

- Kenneth J. Knapp, Thomas E. Marshall, R. Kelly Rainer and F. Nelson Ford
- The Role of Privacy Risk in IT Acceptance: An Empirical Study pp. 61-73

- Joseph A. Cazier, E. Vance Wilson and B. Dawn Medlin
- Ignorance is Bliss: The Effect of Increased Knowledge on Privacy Concerns and Internet Shopping Site Personalization Preferences pp. 74-92

- Thomas P. Van Dyke
Volume 1, issue 1, 2007
- Trustworthy Web Services: An Experience-Based Model for Trustworthiness Evaluation pp. 1-17

- Stephen J.H. Yang, Blue C.W. Lan, James S.F. Hsieh and Jen-Yao Chung
- Administering the Semantic Web: Confidentiality, Privacy, and Trust Management pp. 18-34

- Bhavani Thuraisingham, Natasha Tsybulnik and Ashraful Alam
- Privacy-Preserving Transactions Protocol Using Mobile Agents with Mutual Authentication pp. 35-46

- Song Han, Vidyasagar Potdar, Elizabeth Chang and Tharam Dillon
- Privacy-Preserving Data Mining and the Need for Confluence of Research and Practice pp. 47-63

- Lixin Fu, Hamid Nemati and Fereidoon Sadri
- Privacy and Security in the Age of Electronic Customer Relationship Management pp. 65-86

- Nicholas C. Romano and Jerry Fjermestad
| |