Journal of Information Privacy and Security
2005 - 2017
Current editor(s): Chuleeporn Changchit From Taylor & Francis Journals Bibliographic data for series maintained by Chris Longhurst (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 13, issue 4, 2017
- Editorial Preface pp. 161-163

- Chuleeporn Changchit, Kallol Bagchi and Choton Basu
- Future of privacy and security – the Four Horsemen pp. 164-168

- Choton Basu
- A study of web privacy policies across industries pp. 169-185

- Razieh Nokhbeh Zaeem and K. Suzanne Barber
- Long-term market implications of data breaches, not pp. 186-206

- Russell Lange and Eric W. Burger
- Who uses mobile apps to meet strangers: The roles of core traits and surface characteristics pp. 207-225

- Lixuan Zhang, Iryna Pentina and Wendy Fox Kirk
- RSVP a temporal method for graphical authentication pp. 226-237

- Ashley A Cain and Jeremiah D Still
- Cultural and Generational Influences on Information Privacy Concerns within Online Social Networks: An Empirical Evaluation of the Miltgen and Peyrat-Guillard Model pp. 238-259

- Faruk Arslan and Niharika Dayyala
- Predicting information security policy compliance intentions and behavior for six employee-based risks pp. 260-281

- Tatyana Ryutov, Nicole Sintov, Mengtian Zhao and Richard S. John
- Development of Internet of Things-Related Monitoring Policies pp. 282-295

- Gundars Kaupins and Janet Stephens
- Utilizing normative theories to develop ethical actions for better privacy practices pp. 296-315

- Zareef A. Mohammed, Gurvirender P. Tejay and Joseph Squillace
- Bazzell, M., & Carroll, J. (2016). The Complete Privacy & Security Desk Reference-Volume I Digital. United States of America: CreateSpace Independent Publishing Platform, 478 pp pp. 316-318

- Faruk Arslan
Volume 13, issue 3, 2017
- Privacy protection and adding security strength pp. 103-103

- Chuleeporn Changchit and Kallol Bagchi
- Detecting and preventing inference attacks in online social networks: A data-driven and holistic framework pp. 104-119

- Xiaoyun He and Haibing Lu
- Invasion of privacy by smart meters: An analysis of consumer concerns pp. 120-136

- Ziyue Huang and Prashant Palvia
- Valuing Information Security: A Look at the Influence of User Engagement on Information Security Strength pp. 137-156

- Randall J. Boyle, Chandrashekar D. Challa and Jeffrey A. Clements
- Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy, by Cathy O’Neil pp. 157-159

- Faruk Arslan
Volume 13, issue 2, 2017
- Privacy and Security Concerns with Healthcare Data and Social Media Usage pp. 49-50

- Chuleeporn Changchit and Kallol Bagchi
- Handling confidentiality and privacy on cloud-based health information systems pp. 51-68

- Carlos Serrão and Elsa Cardoso
- The Effect of Procedural and Technological Security Countermeasures on the Propensity to Misuse Medical Data pp. 69-83

- Wachiraporn Arunothong and Derek L. Nazareth
- What Affects Users to Click on Display Ads on Social Media? The Roles of Message Values, Involvement, and Security pp. 84-96

- En Mao and Jing Zhang
- Interview With Lionel Cassin pp. 97-98

- Chuleeporn Changchit
- Security and Privacy in Social Networks, by Yaniv Altshuler, Yuval Elovici, Armin B. Cremers, Nadav Aharony, Alex Pentland pp. 99-102

- Faruk Arslan
Volume 13, issue 1, 2017
- Editorial pp. 1-1

- Kallol Bagchi and Chuleeporn Changchit
- An examination of an e-authentication service as an intervention in e-mail risk perception pp. 2-16

- Rui Chen, Jingguo Wang, Tejaswini Herath and H. R. Rao
- Does privacy matter to millennials? The case for personal cloud pp. 17-33

- Murad Moqbel, Valerie Bartelt, Mohammed Al-Suqri and Azzah Al-Maskari
- Record Re-Identification of Swapped Numerical Microdata pp. 34-45

- Krishnamurty Muralidhar
- Thinking with Data: How to Turn Information into Insights, by Max Shron pp. 46-47

- Faruk Arslan
Volume 12, issue 4, 2016
- Editorial preface pp. 165-165

- Kallol Bagchi, Editor in Chief
- Information privacy and the digital generation gap: An exploratory study pp. 166-180

- Ruth Halperin and Yuval Dror
- Ca-NIDS: A network intrusion detection system using combinatorial algorithm approach pp. 181-196

- Olusegun Folorunso, Femi Emmanuel Ayo and Y. E. Babalola
- Perceived deception: Evaluating source credibility and self-efficacy pp. 197-217

- Dustin Ormond, Merrill Warkentin, Allen C. Johnston and Samuel C. Thompson
- Social Physics: How Good Ideas Spread-The Lessons from a New Science, by Alex Pentland pp. 218-220

- Faruk Arslan
Volume 12, issue 3, 2016
- Social media analytics: Security and privacy issues pp. 105-106

- Wingyan Chung
- A simulation-based approach to predicting influence in social media communities: A case of U.S. border security pp. 107-122

- Wingyan Chung
- The role of personalized services and control: An empirical evaluation of privacy calculus and technology acceptance model in the mobile context pp. 123-144

- Zhan Liu, Jialu Shan and Yves Pigneur
- Personnel security and open source intelligence: Employing social media analytics in pre-employment screening and selection pp. 145-159

- Julian M. Montaquila and Cierra N. Godwin
- Proceedings of The 2015 NSF Workshop on Curricular Development for Computing in Context pp. 160-163

- Edgar Gutierrez-Franco, Mario Marin, Luis Rabelo and John Pastrana
Volume 12, issue 2, 2016
- Editorial preface pp. 55-55

- Kallol Bagchi
- The impact of exposure to news about electronic government surveillance on concerns about government intrusion, privacy self-efficacy, and privacy protective behavior pp. 56-67

- Stanislav Mamonov and Marios Koufaris
- The impact of attitudinal factors on intention to report workplace Internet abuse pp. 68-83

- Matt Campbell, Antonis C. Stylianou and Jordan Shropshire
- Twibel: A matter of Internet privacy pp. 84-92

- Raymond Placid and Judy Wynekoop
- Social media policies in the Department of Defense—Do they address the risk? pp. 93-102

- Katherine “Suzy” Cole-Miller, William “Doug” Ward, Ann Fruhling and Kathryn Dempsey Cooper
- Discovering Computers 2016: Tools, Apps, Devices, and the Impact of Technology, by Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Jennifer T. Campbell, and Mark Frydenburg pp. 103-104

- Faruk Arslan
Volume 12, issue 1, 2016
- Special Issue on Attacks and Distinct Features in Networks pp. 1-2

- Dharma P. Agrawal
- Recent survey of various defense mechanisms against phishing attacks pp. 3-13

- Aakanksha Tewari, A. K. Jain and B. B. Gupta
- Privacy-preserved data publishing of evolving online social networks pp. 14-31

- Wei Chang and Jie Wu
- Mechanism design for Data Replica Placement (DRP) problem in strategic settings pp. 32-54

- Minzhe Guo and Prabir Bhattacharya
Volume 11, issue 4, 2015
- Editorial Preface pp. 187-188

- Kallol Bagchi
- Job Quitters, Information Security Awareness, and Knowledge Management Strategies pp. 189-210

- Hongbo Lyu and Zuopeng (Justin) Zhang
- The Application of Keystroke Analysis for Physical Security: A Field Experiment pp. 211-227

- Christopher S. Leberknight and Michael L. Recce
- Research Essay Editorial pp. 228-229

- Gaurav Gupta and Indranil Bose
- Challenges of Multi-Source Data and Information New Era pp. 230-242

- Roberto Mugavero, Federico Benolli and Valentina Sabato
- Geospatial Intelligence, Technological Development, and Human Interaction pp. 243-261

- Roberto Mugavero, Federico Benolli and Valentina Sabato
- Bioterrorism: New Technologies for Global Emergencies and Public Health pp. 262-273

- Roberto Mugavero, Valentina Sabato, Matteo Basso, Wanda D’Amico and Federico Benolli
- Information Assurance for the Enterprise: A Roadmap to Information Security, by C. Schou and D. Shoemaker pp. 274-275

- Adolfo S. Coronado
Volume 11, issue 3, 2015
- Editorial Preface pp. 139-140

- Kallol Bagchi
- M0Droid: An Android Behavioral-Based Malware Detection Model pp. 141-157

- Mohsen Damshenas, Ali Dehghantanha, Kim-Kwang Raymond Choo and Ramlan Mahmud
- Investigating Factors Influencing Web-Browsing Safety Efficacy (WSE) Among Older Adults pp. 158-173

- Victoria Kisekka, Rajarshi Chakraborty, Sharmistha Bagchi-Sen and H. Raghav Rao
- Information Security: SETA Program Status at Jordanian Universities pp. 174-181

- Mohammad S. Eyadat
- Interview with Allen Hsieh, Business Consultant, China pp. 182-183

- Choton Basu
- Introduction to Computer Security, by M. T. Goodrich and R. Tamassia pp. 184-186

- Adolfo S. Coronado
Volume 11, issue 2, 2015
- Special Issue on Secured Communication in Wireless and Wired Networks pp. 59-61

- Dharma P. Agrawal
- Location Privacy Protection for Smartphone Users Using Quadtree Entropy Maps pp. 62-79

- Xiaoen Ju and Kang G. Shin
- The Human Key: Identification and Authentication in Wearable Devices Using Gait pp. 80-96

- Pallavi Meharia and Dharma P. Agrawal
- Information Theoretic and Statistical Drive Sanitization Models pp. 97-117

- Jeffrey Medsger, Avinash Srinivasan and Jie Wu
- Cross-Site Scripting (XSS) Abuse and Defense: Exploitation on Several Testing Bed Environments and Its Defense pp. 118-136

- B. B. Gupta, S. Gupta, S. Gangwar, M. Kumar and P. K. Meena
- Mining the Social Web: Data Mining Facebook, Twitter, LinkedIn, Google+, Github, and More, by Matthew A. Russell pp. 137-138

- Dehghantanha Ali
Volume 11, issue 1, 2015
- Editorial Preface pp. 1-2

- Kallol Bagchi
- Information Disclosure on a Chinese Social Media Platform pp. 3-18

- Lixuan Zhang, Clinton Amos and Iryna Pentina
- Healthshark: Using Twitter for Situational Awareness in Public Health pp. 19-37

- Alana Platt, Levi Citrin and Cynthia Hood
- Review of the Information Security and Privacy Challenges in Bring Your Own Device (BYOD) Environments pp. 38-54

- Abubakar Bello Garba, Jocelyn Armarego, David Murray and William Kenworthy
- Security Planning & Disaster Recovery, by Eric Maiwald and William Sieglein pp. 55-57

- Adolfo S. Coronado
| |