EconPapers    
Economics at your fingertips  
 

Journal of Information Privacy and Security

2005 - 2017

Current editor(s): Chuleeporn Changchit

From Taylor & Francis Journals
Bibliographic data for series maintained by Chris Longhurst ().

Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.


Volume 10, issue 4, 2014

Guest Editorial pp. 157-159 Downloads
Wu He and Xiaohong Yuan
A Model of Information Security Awareness for Assessing Information Security Risk for Emerging Technologies pp. 160-185 Downloads
Roberto J. Mejias and Pierre A. Balthazard
Comparing the Mobile Device Security Behavior of College Students and Information Technology Professionals pp. 186-202 Downloads
Mark A. Harris, Steven Furnell and Karen Patten
Organizational Privacy Strategy: Four Quadrants of Strategic Responses to Information Privacy and Security Threats pp. 203-224 Downloads
Rachida F. Parks and Rolf T. Wigand
Altering Security Perceptions Through the Use of Geo-Authentication pp. 225-235 Downloads
Gongjun Yan, Kenneth Shemroske and Gary Black
Data Stewardship: An Actionable Guide to Effective Data Management and Data Governance, by David Plotkin pp. 236-238 Downloads
Adolfo S. Coronado

Volume 10, issue 3, 2014

Editorial Preface pp. 111-112 Downloads
Kallol Bagchi
Social Network Privacy: Trusting Friends pp. 113-137 Downloads
Gerald V. Post and Suzanne B. Walchli
Analysis and Estimation of Expected Cyber-Attack Scenarios and Consequences pp. 138-152 Downloads
Roberto Mugavero and Valentina Sabato
CCNP Security IPS 642-627 Official Cert Guide pp. 153-155 Downloads
Adolfo S. Coronado

Volume 10, issue 2, 2014

Guest Editorial pp. 57-58 Downloads
Humayun Zafar
The Enemy Within the Insider: Detecting the Insider Threat Through Addiction Theory pp. 59-70 Downloads
Michele Maasberg and Nicole L. Beebe
Factors for Measuring Password-Based Authentication Practices pp. 71-94 Downloads
Herbert J. Mattord, Yair Levy and Steven Furnell
Student Perceptions of Computer Use Ethics: A Decade in Comparison pp. 95-107 Downloads
Michael E. Whitman and Humayun Zafar
IT Auditing: Using Controls to Protect Information Assets (1st ed.), by Chris Davis, Mike Schiller, and Kevin Wheeler pp. 108-109 Downloads
Adolfo S. Coronado

Volume 10, issue 1, 2014

Editorial Preface pp. 1-2 Downloads
Kallol Bagchi
Brief Review of Software Security History with an Emphasis on Efforts Focused at Early Stages of the Software Lifecycle pp. 3-27 Downloads
Spyros T. Halkidis, Alexander Chatzigeorgiou and George Stephanides
Information Security in Higher Education: A Neo-Institutional Perspective pp. 28-43 Downloads
Hwee-Joo Kam and Pairin Katerattanakul
Privacy-Preserving Interest Group Formation in Online Social Networks (OSNs) Using Fully Homomorphic Encryption pp. 44-52 Downloads
Mohammed Kaosar and Quazi Mamun
Information Technology Control and Audit (4th ed.) by Sandra Senft,Frederick Gallegos, and Aleksandra Davis pp. 53-55 Downloads
Adolfo S. Coronado

Volume 9, issue 4, 2013

Editorial Preface pp. 1-2 Downloads
Kallol Bagchi
Acquiring Subject Participation for Information Security Survey Research: A Content and Correspondence Analysis Approach pp. 3-30 Downloads
Alice M. Johnson and Belinda P. Shipps
An Empirical Investigation of Privacy Awareness and Concerns on Social Networking Sites pp. 31-51 Downloads
Sunil Hazari and Cheryl Brown
Control-Related Motivations and Information Security Policy Compliance: The Role of Autonomy and Efficacy pp. 52-79 Downloads
Jeffrey D. Wall, Prashant Palvia and Paul Benjamin Lowry
I Know Who You Are and I Saw What You Did: Social Networks and the Death of Privacy pp. 80-82 Downloads
Sadaf Ashtari

Volume 9, issue 3, 2013

Editorial Preface pp. 1-3 Downloads
Indranil Bose
RFID-Based Attack Scenarios in Retailing, Healthcare and Sports pp. 4-17 Downloads
Wang Suk Suh, Eun Jung Yoon and Selwyn Piramuthu
A Framework for Addressing Data Privacy Issues in E-Governance Projects pp. 18-33 Downloads
Ashish Kumar Jha and Indranil Bose
Cybercrime Enforcement Around the Globe pp. 34-52 Downloads
Yuanrong Hu, Xi Chen and Indranil Bose
Expert Opinion Interview with: Edward B.Talbot, Independent Consultant pp. 53-55 Downloads
Kallol Bagchi
Computer Security Fundamentals, Second Edition pp. 56-58 Downloads
Adolfo S. Coronado

Volume 9, issue 2, 2013

Editorial Preface pp. 1-2 Downloads
Kallol Bagchi
Contemporary Threats Countermeasuresi pp. 3-20 Downloads
Joseph H. Schuessler
Crime Toolkits: The Current Threats to Web Applications pp. 21-39 Downloads
Ammar Alazab, Jemal Abawajy, Michael Hobbs and Ansam Khraisat
The Role of Privacy in the Adoption of Location-Based Services pp. 40-59 Downloads
En Mao and Jing Zhang
Expert Opinion Interview with: James Jackson President/COO Slipstream LLC pp. 60-61 Downloads
Choton Basu
Computer Security: Principles and Practice, Second Edition pp. 62-65 Downloads
Adolfo S. Coronado

Volume 9, issue 1, 2013

Editorial Preface pp. 1-2 Downloads
Peeter Kirs and Godwin Udo
Interval Responses for Queries on Confidential Attributes: A Security Evaluation pp. 3-16 Downloads
Krishnamurty Muralidhar and Rathindra Sarathy
Cloud Computing Security Announcements: Assessment of Investors' Reaction pp. 17-46 Downloads
Srikanth Parameswaran, Srikanth Venkatesan and Manish Gupta
Applying Protection Motivation Theory to Information Security Training for College Students pp. 47-67 Downloads
Peter Meso, Yi Ding and Shuting Xu
Expert Opinion Interview with: Satish Kumar Nampally, Senior Manager, Cognizant Technology Solutions pp. 68-69 Downloads
Choton Basu
Principles of Computer Security: CompTIA Security+™ pp. 70-72 Downloads
Adolfo S. Coronado

Volume 8, issue 4, 2012

Editorial Preface pp. 1-2 Downloads
Kallol Bagchi
Students Information Security Practices and Awareness pp. 3-26 Downloads
Ludwig Slusky and Parviz Partow-Navid
Stock Market Response to Information Security Breach: A Study Using Firm and Attack Characteristics pp. 27-55 Downloads
Saini Das, Arunabha Mukhopadhyay and Manoj Anand
Enhancing Information Privacy and Data Sharing in a Healthcare IT Firm: The Case of Ricerro Communications pp. 56-78 Downloads
Wingyan Chung and Lewis Hershey
Expert Opinion- Part 4 Interview with: Joseph Neuman CEO GotApps.com pp. 79-80 Downloads
Choton Basu
Corporate Computer and Network Security pp. 81-84 Downloads
Adolfo S. Coronado

Volume 8, issue 3, 2012

Editorial Preface pp. 1-3 Downloads
Kallol Bagchi
Passive Enumeration of Secret Information in LMAP and M2 AP RFID Authentication Protocols pp. 4-14 Downloads
Selwyn Piramuthu
A Model of End Users' Web Threats Information Processing pp. 15-36 Downloads
Lixuan Zhang and Clinton Amos
Analyzing Information Systems Security Research to Find Key Topics, Trends, and Opportunities pp. 37-67 Downloads
Roger Blake and Ramakrishna Ayyagari
Expert Opinion Interview with: Jack Vaughn, Technology Implementation Manager (TIM), College of Business Administration, The University of Texas at El Paso pp. 68-71 Downloads
Peeter Kirs
Business Data Networks and Telecommunications (8th Eds) pp. 72-73 Downloads
Aurelia Donald

Volume 8, issue 2, 2012

Editorial Preface pp. 1-2 Downloads
Chuleeporn Changchit
The Effectiveness of Data Shuffling for Privacy-Preserving Data Mining Applications pp. 3-17 Downloads
Han Li, Krishnamurty Muralidhar and Rathindra Sarathy
Using PRNG Generated Templates to Protect Fingerprint Database pp. 18-32 Downloads
Qinghai Gao and Kamal Shahrabi
An Exploratory Analysis of Data Breaches from 2005-2011: Trends and Insights pp. 33-56 Downloads
Ramakrishna Ayyagari
Expert Opinion – Part 2 Interview with pp. 57-60 Downloads
Sanjib Sahoo
Blind Spot a Leader's Guide to IT-Enabled Business Transformation pp. 61-64 Downloads
Richard G. Platt

Volume 8, issue 1, 2012

Special Issue: Data Privacy, Policies and Frameworks pp. 1-2 Downloads
Choton Basu
Disclosing Personal Data Socially — An Empirical Study on Facebook Users' Privacy Awareness pp. 3-29 Downloads
Olli Pitkänen and Virpi Kristiina Tuunainen
Security Auditing: The Need for Policies and Practices pp. 30-37 Downloads
Robert A. Robertson
Interpreting the Impact of Perceived Privacy and Security Concerns in Patients' Use of Online Health Information Systems pp. 38-50 Downloads
Paul Ambrose and Choton Basu
Expert Opinion — Part 1 pp. 51-55 Downloads
Choton Basu
Book Review pp. 56-58 Downloads
Roberto Vinaja
Page updated 2025-05-02