Journal of Information Privacy and Security
2005 - 2017
Current editor(s): Chuleeporn Changchit From Taylor & Francis Journals Bibliographic data for series maintained by Chris Longhurst (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 10, issue 4, 2014
- Guest Editorial pp. 157-159

- Wu He and Xiaohong Yuan
- A Model of Information Security Awareness for Assessing Information Security Risk for Emerging Technologies pp. 160-185

- Roberto J. Mejias and Pierre A. Balthazard
- Comparing the Mobile Device Security Behavior of College Students and Information Technology Professionals pp. 186-202

- Mark A. Harris, Steven Furnell and Karen Patten
- Organizational Privacy Strategy: Four Quadrants of Strategic Responses to Information Privacy and Security Threats pp. 203-224

- Rachida F. Parks and Rolf T. Wigand
- Altering Security Perceptions Through the Use of Geo-Authentication pp. 225-235

- Gongjun Yan, Kenneth Shemroske and Gary Black
- Data Stewardship: An Actionable Guide to Effective Data Management and Data Governance, by David Plotkin pp. 236-238

- Adolfo S. Coronado
Volume 10, issue 3, 2014
- Editorial Preface pp. 111-112

- Kallol Bagchi
- Social Network Privacy: Trusting Friends pp. 113-137

- Gerald V. Post and Suzanne B. Walchli
- Analysis and Estimation of Expected Cyber-Attack Scenarios and Consequences pp. 138-152

- Roberto Mugavero and Valentina Sabato
- CCNP Security IPS 642-627 Official Cert Guide pp. 153-155

- Adolfo S. Coronado
Volume 10, issue 2, 2014
- Guest Editorial pp. 57-58

- Humayun Zafar
- The Enemy Within the Insider: Detecting the Insider Threat Through Addiction Theory pp. 59-70

- Michele Maasberg and Nicole L. Beebe
- Factors for Measuring Password-Based Authentication Practices pp. 71-94

- Herbert J. Mattord, Yair Levy and Steven Furnell
- Student Perceptions of Computer Use Ethics: A Decade in Comparison pp. 95-107

- Michael E. Whitman and Humayun Zafar
- IT Auditing: Using Controls to Protect Information Assets (1st ed.), by Chris Davis, Mike Schiller, and Kevin Wheeler pp. 108-109

- Adolfo S. Coronado
Volume 10, issue 1, 2014
- Editorial Preface pp. 1-2

- Kallol Bagchi
- Brief Review of Software Security History with an Emphasis on Efforts Focused at Early Stages of the Software Lifecycle pp. 3-27

- Spyros T. Halkidis, Alexander Chatzigeorgiou and George Stephanides
- Information Security in Higher Education: A Neo-Institutional Perspective pp. 28-43

- Hwee-Joo Kam and Pairin Katerattanakul
- Privacy-Preserving Interest Group Formation in Online Social Networks (OSNs) Using Fully Homomorphic Encryption pp. 44-52

- Mohammed Kaosar and Quazi Mamun
- Information Technology Control and Audit (4th ed.) by Sandra Senft,Frederick Gallegos, and Aleksandra Davis pp. 53-55

- Adolfo S. Coronado
Volume 9, issue 4, 2013
- Editorial Preface pp. 1-2

- Kallol Bagchi
- Acquiring Subject Participation for Information Security Survey Research: A Content and Correspondence Analysis Approach pp. 3-30

- Alice M. Johnson and Belinda P. Shipps
- An Empirical Investigation of Privacy Awareness and Concerns on Social Networking Sites pp. 31-51

- Sunil Hazari and Cheryl Brown
- Control-Related Motivations and Information Security Policy Compliance: The Role of Autonomy and Efficacy pp. 52-79

- Jeffrey D. Wall, Prashant Palvia and Paul Benjamin Lowry
- I Know Who You Are and I Saw What You Did: Social Networks and the Death of Privacy pp. 80-82

- Sadaf Ashtari
Volume 9, issue 3, 2013
- Editorial Preface pp. 1-3

- Indranil Bose
- RFID-Based Attack Scenarios in Retailing, Healthcare and Sports pp. 4-17

- Wang Suk Suh, Eun Jung Yoon and Selwyn Piramuthu
- A Framework for Addressing Data Privacy Issues in E-Governance Projects pp. 18-33

- Ashish Kumar Jha and Indranil Bose
- Cybercrime Enforcement Around the Globe pp. 34-52

- Yuanrong Hu, Xi Chen and Indranil Bose
- Expert Opinion Interview with: Edward B.Talbot, Independent Consultant pp. 53-55

- Kallol Bagchi
- Computer Security Fundamentals, Second Edition pp. 56-58

- Adolfo S. Coronado
Volume 9, issue 2, 2013
- Editorial Preface pp. 1-2

- Kallol Bagchi
- Contemporary Threats Countermeasuresi pp. 3-20

- Joseph H. Schuessler
- Crime Toolkits: The Current Threats to Web Applications pp. 21-39

- Ammar Alazab, Jemal Abawajy, Michael Hobbs and Ansam Khraisat
- The Role of Privacy in the Adoption of Location-Based Services pp. 40-59

- En Mao and Jing Zhang
- Expert Opinion Interview with: James Jackson President/COO Slipstream LLC pp. 60-61

- Choton Basu
- Computer Security: Principles and Practice, Second Edition pp. 62-65

- Adolfo S. Coronado
Volume 9, issue 1, 2013
- Editorial Preface pp. 1-2

- Peeter Kirs and Godwin Udo
- Interval Responses for Queries on Confidential Attributes: A Security Evaluation pp. 3-16

- Krishnamurty Muralidhar and Rathindra Sarathy
- Cloud Computing Security Announcements: Assessment of Investors' Reaction pp. 17-46

- Srikanth Parameswaran, Srikanth Venkatesan and Manish Gupta
- Applying Protection Motivation Theory to Information Security Training for College Students pp. 47-67

- Peter Meso, Yi Ding and Shuting Xu
- Expert Opinion Interview with: Satish Kumar Nampally, Senior Manager, Cognizant Technology Solutions pp. 68-69

- Choton Basu
- Principles of Computer Security: CompTIA Security+™ pp. 70-72

- Adolfo S. Coronado
Volume 8, issue 4, 2012
- Editorial Preface pp. 1-2

- Kallol Bagchi
- Students Information Security Practices and Awareness pp. 3-26

- Ludwig Slusky and Parviz Partow-Navid
- Stock Market Response to Information Security Breach: A Study Using Firm and Attack Characteristics pp. 27-55

- Saini Das, Arunabha Mukhopadhyay and Manoj Anand
- Enhancing Information Privacy and Data Sharing in a Healthcare IT Firm: The Case of Ricerro Communications pp. 56-78

- Wingyan Chung and Lewis Hershey
- Expert Opinion- Part 4 Interview with: Joseph Neuman CEO GotApps.com pp. 79-80

- Choton Basu
- Corporate Computer and Network Security pp. 81-84

- Adolfo S. Coronado
Volume 8, issue 3, 2012
- Editorial Preface pp. 1-3

- Kallol Bagchi
- Passive Enumeration of Secret Information in LMAP and M2 AP RFID Authentication Protocols pp. 4-14

- Selwyn Piramuthu
- A Model of End Users' Web Threats Information Processing pp. 15-36

- Lixuan Zhang and Clinton Amos
- Analyzing Information Systems Security Research to Find Key Topics, Trends, and Opportunities pp. 37-67

- Roger Blake and Ramakrishna Ayyagari
- Expert Opinion Interview with: Jack Vaughn, Technology Implementation Manager (TIM), College of Business Administration, The University of Texas at El Paso pp. 68-71

- Peeter Kirs
- Business Data Networks and Telecommunications (8th Eds) pp. 72-73

- Aurelia Donald
Volume 8, issue 2, 2012
- Editorial Preface pp. 1-2

- Chuleeporn Changchit
- The Effectiveness of Data Shuffling for Privacy-Preserving Data Mining Applications pp. 3-17

- Han Li, Krishnamurty Muralidhar and Rathindra Sarathy
- Using PRNG Generated Templates to Protect Fingerprint Database pp. 18-32

- Qinghai Gao and Kamal Shahrabi
- An Exploratory Analysis of Data Breaches from 2005-2011: Trends and Insights pp. 33-56

- Ramakrishna Ayyagari
- Expert Opinion – Part 2 Interview with pp. 57-60

- Sanjib Sahoo
- Blind Spot a Leader's Guide to IT-Enabled Business Transformation pp. 61-64

- Richard G. Platt
Volume 8, issue 1, 2012
- Special Issue: Data Privacy, Policies and Frameworks pp. 1-2

- Choton Basu
- Disclosing Personal Data Socially — An Empirical Study on Facebook Users' Privacy Awareness pp. 3-29

- Olli Pitkänen and Virpi Kristiina Tuunainen
- Security Auditing: The Need for Policies and Practices pp. 30-37

- Robert A. Robertson
- Interpreting the Impact of Perceived Privacy and Security Concerns in Patients' Use of Online Health Information Systems pp. 38-50

- Paul Ambrose and Choton Basu
- Expert Opinion — Part 1 pp. 51-55

- Choton Basu
- Book Review pp. 56-58

- Roberto Vinaja
| |