EconPapers    
Economics at your fingertips  
 

Journal of Information Privacy and Security

2005 - 2017

Current editor(s): Chuleeporn Changchit

From Taylor & Francis Journals
Bibliographic data for series maintained by Chris Longhurst ().

Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.


Volume 13, issue 4, 2017

Editorial Preface pp. 161-163 Downloads
Chuleeporn Changchit, Kallol Bagchi and Choton Basu
Future of privacy and security – the Four Horsemen pp. 164-168 Downloads
Choton Basu
A study of web privacy policies across industries pp. 169-185 Downloads
Razieh Nokhbeh Zaeem and K. Suzanne Barber
Long-term market implications of data breaches, not pp. 186-206 Downloads
Russell Lange and Eric W. Burger
Who uses mobile apps to meet strangers: The roles of core traits and surface characteristics pp. 207-225 Downloads
Lixuan Zhang, Iryna Pentina and Wendy Fox Kirk
RSVP a temporal method for graphical authentication pp. 226-237 Downloads
Ashley A Cain and Jeremiah D Still
Cultural and Generational Influences on Information Privacy Concerns within Online Social Networks: An Empirical Evaluation of the Miltgen and Peyrat-Guillard Model pp. 238-259 Downloads
Faruk Arslan and Niharika Dayyala
Predicting information security policy compliance intentions and behavior for six employee-based risks pp. 260-281 Downloads
Tatyana Ryutov, Nicole Sintov, Mengtian Zhao and Richard S. John
Development of Internet of Things-Related Monitoring Policies pp. 282-295 Downloads
Gundars Kaupins and Janet Stephens
Utilizing normative theories to develop ethical actions for better privacy practices pp. 296-315 Downloads
Zareef A. Mohammed, Gurvirender P. Tejay and Joseph Squillace
Bazzell, M., & Carroll, J. (2016). The Complete Privacy & Security Desk Reference-Volume I Digital. United States of America: CreateSpace Independent Publishing Platform, 478 pp pp. 316-318 Downloads
Faruk Arslan

Volume 13, issue 3, 2017

Privacy protection and adding security strength pp. 103-103 Downloads
Chuleeporn Changchit and Kallol Bagchi
Detecting and preventing inference attacks in online social networks: A data-driven and holistic framework pp. 104-119 Downloads
Xiaoyun He and Haibing Lu
Invasion of privacy by smart meters: An analysis of consumer concerns pp. 120-136 Downloads
Ziyue Huang and Prashant Palvia
Valuing Information Security: A Look at the Influence of User Engagement on Information Security Strength pp. 137-156 Downloads
Randall J. Boyle, Chandrashekar D. Challa and Jeffrey A. Clements
Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy, by Cathy O’Neil pp. 157-159 Downloads
Faruk Arslan

Volume 13, issue 2, 2017

Privacy and Security Concerns with Healthcare Data and Social Media Usage pp. 49-50 Downloads
Chuleeporn Changchit and Kallol Bagchi
Handling confidentiality and privacy on cloud-based health information systems pp. 51-68 Downloads
Carlos Serrão and Elsa Cardoso
The Effect of Procedural and Technological Security Countermeasures on the Propensity to Misuse Medical Data pp. 69-83 Downloads
Wachiraporn Arunothong and Derek L. Nazareth
What Affects Users to Click on Display Ads on Social Media? The Roles of Message Values, Involvement, and Security pp. 84-96 Downloads
En Mao and Jing Zhang
Interview With Lionel Cassin pp. 97-98 Downloads
Chuleeporn Changchit
Security and Privacy in Social Networks, by Yaniv Altshuler, Yuval Elovici, Armin B. Cremers, Nadav Aharony, Alex Pentland pp. 99-102 Downloads
Faruk Arslan

Volume 13, issue 1, 2017

Editorial pp. 1-1 Downloads
Kallol Bagchi and Chuleeporn Changchit
An examination of an e-authentication service as an intervention in e-mail risk perception pp. 2-16 Downloads
Rui Chen, Jingguo Wang, Tejaswini Herath and H. R. Rao
Does privacy matter to millennials? The case for personal cloud pp. 17-33 Downloads
Murad Moqbel, Valerie Bartelt, Mohammed Al-Suqri and Azzah Al-Maskari
Record Re-Identification of Swapped Numerical Microdata pp. 34-45 Downloads
Krishnamurty Muralidhar
Thinking with Data: How to Turn Information into Insights, by Max Shron pp. 46-47 Downloads
Faruk Arslan

Volume 12, issue 4, 2016

Editorial preface pp. 165-165 Downloads
Kallol Bagchi, Editor in Chief
Information privacy and the digital generation gap: An exploratory study pp. 166-180 Downloads
Ruth Halperin and Yuval Dror
Ca-NIDS: A network intrusion detection system using combinatorial algorithm approach pp. 181-196 Downloads
Olusegun Folorunso, Femi Emmanuel Ayo and Y. E. Babalola
Perceived deception: Evaluating source credibility and self-efficacy pp. 197-217 Downloads
Dustin Ormond, Merrill Warkentin, Allen C. Johnston and Samuel C. Thompson
Social Physics: How Good Ideas Spread-The Lessons from a New Science, by Alex Pentland pp. 218-220 Downloads
Faruk Arslan

Volume 12, issue 3, 2016

Social media analytics: Security and privacy issues pp. 105-106 Downloads
Wingyan Chung
A simulation-based approach to predicting influence in social media communities: A case of U.S. border security pp. 107-122 Downloads
Wingyan Chung
The role of personalized services and control: An empirical evaluation of privacy calculus and technology acceptance model in the mobile context pp. 123-144 Downloads
Zhan Liu, Jialu Shan and Yves Pigneur
Personnel security and open source intelligence: Employing social media analytics in pre-employment screening and selection pp. 145-159 Downloads
Julian M. Montaquila and Cierra N. Godwin
Proceedings of The 2015 NSF Workshop on Curricular Development for Computing in Context pp. 160-163 Downloads
Edgar Gutierrez-Franco, Mario Marin, Luis Rabelo and John Pastrana

Volume 12, issue 2, 2016

Editorial preface pp. 55-55 Downloads
Kallol Bagchi
The impact of exposure to news about electronic government surveillance on concerns about government intrusion, privacy self-efficacy, and privacy protective behavior pp. 56-67 Downloads
Stanislav Mamonov and Marios Koufaris
The impact of attitudinal factors on intention to report workplace Internet abuse pp. 68-83 Downloads
Matt Campbell, Antonis C. Stylianou and Jordan Shropshire
Twibel: A matter of Internet privacy pp. 84-92 Downloads
Raymond Placid and Judy Wynekoop
Social media policies in the Department of Defense—Do they address the risk? pp. 93-102 Downloads
Katherine “Suzy” Cole-Miller, William “Doug” Ward, Ann Fruhling and Kathryn Dempsey Cooper
Discovering Computers 2016: Tools, Apps, Devices, and the Impact of Technology, by Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Jennifer T. Campbell, and Mark Frydenburg pp. 103-104 Downloads
Faruk Arslan

Volume 12, issue 1, 2016

Special Issue on Attacks and Distinct Features in Networks pp. 1-2 Downloads
Dharma P. Agrawal
Recent survey of various defense mechanisms against phishing attacks pp. 3-13 Downloads
Aakanksha Tewari, A. K. Jain and B. B. Gupta
Privacy-preserved data publishing of evolving online social networks pp. 14-31 Downloads
Wei Chang and Jie Wu
Mechanism design for Data Replica Placement (DRP) problem in strategic settings pp. 32-54 Downloads
Minzhe Guo and Prabir Bhattacharya

Volume 11, issue 4, 2015

Editorial Preface pp. 187-188 Downloads
Kallol Bagchi
Job Quitters, Information Security Awareness, and Knowledge Management Strategies pp. 189-210 Downloads
Hongbo Lyu and Zuopeng (Justin) Zhang
The Application of Keystroke Analysis for Physical Security: A Field Experiment pp. 211-227 Downloads
Christopher S. Leberknight and Michael L. Recce
Research Essay Editorial pp. 228-229 Downloads
Gaurav Gupta and Indranil Bose
Challenges of Multi-Source Data and Information New Era pp. 230-242 Downloads
Roberto Mugavero, Federico Benolli and Valentina Sabato
Geospatial Intelligence, Technological Development, and Human Interaction pp. 243-261 Downloads
Roberto Mugavero, Federico Benolli and Valentina Sabato
Bioterrorism: New Technologies for Global Emergencies and Public Health pp. 262-273 Downloads
Roberto Mugavero, Valentina Sabato, Matteo Basso, Wanda D’Amico and Federico Benolli
Information Assurance for the Enterprise: A Roadmap to Information Security, by C. Schou and D. Shoemaker pp. 274-275 Downloads
Adolfo S. Coronado

Volume 11, issue 3, 2015

Editorial Preface pp. 139-140 Downloads
Kallol Bagchi
M0Droid: An Android Behavioral-Based Malware Detection Model pp. 141-157 Downloads
Mohsen Damshenas, Ali Dehghantanha, Kim-Kwang Raymond Choo and Ramlan Mahmud
Investigating Factors Influencing Web-Browsing Safety Efficacy (WSE) Among Older Adults pp. 158-173 Downloads
Victoria Kisekka, Rajarshi Chakraborty, Sharmistha Bagchi-Sen and H. Raghav Rao
Information Security: SETA Program Status at Jordanian Universities pp. 174-181 Downloads
Mohammad S. Eyadat
Interview with Allen Hsieh, Business Consultant, China pp. 182-183 Downloads
Choton Basu
Introduction to Computer Security, by M. T. Goodrich and R. Tamassia pp. 184-186 Downloads
Adolfo S. Coronado

Volume 11, issue 2, 2015

Special Issue on Secured Communication in Wireless and Wired Networks pp. 59-61 Downloads
Dharma P. Agrawal
Location Privacy Protection for Smartphone Users Using Quadtree Entropy Maps pp. 62-79 Downloads
Xiaoen Ju and Kang G. Shin
The Human Key: Identification and Authentication in Wearable Devices Using Gait pp. 80-96 Downloads
Pallavi Meharia and Dharma P. Agrawal
Information Theoretic and Statistical Drive Sanitization Models pp. 97-117 Downloads
Jeffrey Medsger, Avinash Srinivasan and Jie Wu
Cross-Site Scripting (XSS) Abuse and Defense: Exploitation on Several Testing Bed Environments and Its Defense pp. 118-136 Downloads
B. B. Gupta, S. Gupta, S. Gangwar, M. Kumar and P. K. Meena
Mining the Social Web: Data Mining Facebook, Twitter, LinkedIn, Google+, Github, and More, by Matthew A. Russell pp. 137-138 Downloads
Dehghantanha Ali

Volume 11, issue 1, 2015

Editorial Preface pp. 1-2 Downloads
Kallol Bagchi
Information Disclosure on a Chinese Social Media Platform pp. 3-18 Downloads
Lixuan Zhang, Clinton Amos and Iryna Pentina
Healthshark: Using Twitter for Situational Awareness in Public Health pp. 19-37 Downloads
Alana Platt, Levi Citrin and Cynthia Hood
Review of the Information Security and Privacy Challenges in Bring Your Own Device (BYOD) Environments pp. 38-54 Downloads
Abubakar Bello Garba, Jocelyn Armarego, David Murray and William Kenworthy
Security Planning & Disaster Recovery, by Eric Maiwald and William Sieglein pp. 55-57 Downloads
Adolfo S. Coronado
Page updated 2025-04-06