Journal of Information Privacy and Security
2005 - 2017
Current editor(s): Chuleeporn Changchit From Taylor & Francis Journals Bibliographic data for series maintained by Chris Longhurst (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 7, issue 4, 2011
- Security Systems Framework, Security-Related Research, Web Threats pp. 1-2

- Chuleeporn Changchit
- A Framework for Enhancing Systems Security pp. 3-22

- Srinarayan Sharma and Vijayan Sugumaran
- Security Risk Management at a Fortune 500 Firm: A Case Study pp. 23-53

- Humayun Zafar
- Towards an Understanding of Web Application Security Threats and Incidents pp. 54-69

- Gerhard Steinke, Emanuel Tundrea and Kenmoro Kelly
- Interview with: Hemadri Naidu Senior Manager at Cap Gemini Sogeti pp. 70-71

- Choton Basu
- Security Risk Management: Building and Information Security Risk pp. 72-73

- Pankaj Palvia
Volume 7, issue 3, 2011
- Trust, Acceptance, and Data Sanitization pp. 1-2

- Chuleeporn Changchit
- Individual Trust and Consumer Risk Perception pp. 3-22

- Byung Cho Kim, Lara Khansa and Tabitha James
- Modeling Security in Acceptance of Electronic Health Record Systems pp. 23-45

- Barbara Hewitt and Alexander McLeod
- Testing Data Sanitization Practices of Retired Drives with The Digital Forensics Data Recovery Project pp. 46-63

- Ashley L. Podhradsky and Kevin Streff
- Interview with: Ntoh O. Etta Director of Strategic Projects & Corporate Security at NetworkSolutions LLC pp. 64-66

- Choton Basu
- Privacy in Context: Technology, Policy, and the Integrity of Social Life pp. 67-71

- Ling Zhu
Volume 7, issue 2, 2011
- Privacy Concerns and Offshore Outsourcing Security pp. 1-2

- Chuleeporn Changchit
- Preventing Authentication Systems From Keylogging Attack pp. 3-27

- A. S. Sodiya, O. Folorunso, P. B. Komolafe and O. P. Ogunderu
- Usable Authentication in EBusiness: Challenges and Opportunities pp. 28-64

- Binto George, Anna Valeva and George Mangalaraj
- Information Politics in Health Information Exchange Networks pp. 65-90

- Sherrie Drye Cannoy and Pamela E. Carter
- Interview with: Eric Kiernan Partner, KC Computers pp. 91-93

- Choton Basu
- Code Version 2.0 pp. 94-97

- Ling Zhu
Volume 7, issue 1, 2011
- Editorial Preface pp. 1-2

- Chuleeporn Changchit
- Tracking the Footprints of Anonymous Defamation in Cyberspace: A Review of the Law and Technology pp. 3-24

- Raymond Placid and Judy Wynekoop
- An Exploratory Study of the Relationships between Selected Contextual Factors and Information Security Concerns in Global Financial Services Institutions pp. 25-49

- Princely Ifinedo
- Human Flesh Search - Facts and Issues pp. 50-71

- Rui Chen and Sushil K. Sharma
- Interview with: Pradeep Jain An Entrepreneur and Technology Architect in the Content Industry pp. 51-73

- Choton Basu
- Handbook of Information Security Management pp. 74-75

- Choton Basu
Volume 6, issue 4, 2010
- User and Consumer Perceptions of Security pp. 1-2

- Changchit Chuleeporn
- Consumer Perception of Web Site Security Attributes pp. 3-27

- Post Gerald V. and Walchli Suzanne B.
- User Acceptance of Speech-Enabled Technologies for Configuration of Computer and Network Security pp. 28-49

- Luse Andy, Mennecke Brian E. and Townsend Anthony M.
- Passwords: Do User Preferences and Website Protocols Differ From Theory? pp. 50-69

- Barra Roberta Ann, McLeod Alexander, Savage Arline and Simkin Mark G.
- Interview with: Ravichandra Gunturu Senior Software Engineer Blackthorne Capital Management pp. 70-72

- Choton Basu
- Rework pp. 73-74

- Jay Rogers and Choton Basu
Volume 6, issue 3, 2010
- Privacy Concerns and Offshore Outsourcing Security pp. 1-2

- Changchit Chuleeporn
- RFID Privacy Issues in Healthcare: Exploring the Roles of Technologies and Regulations pp. 3-28

- Parks Rachida, Chu Chao-Hsien and Xu Heng
- Information Technology Offshore Outsourcing Security Risks and Safeguards pp. 29-46

- Wei June, O’Connell Jason and Loho-Noya Meiga
- Employee Information Privacy Concerns with Employer Held Data: A Comparison of Two Prevalent Privacy Models pp. 47-71

- Clouse Shawn F., Wright Ryan T. and Pike Ronald E.
- Interview with: Antonio Fernandez Senior Program Manager Supersaver.com pp. 72-73

- Choton Basu
- Internet Safety pp. 74-75

- Choton Basu
Volume 6, issue 2, 2010
- Issues and Challenges of the Diffusion of Web 2.0 on User Privacy pp. 1-2

- Kumar Anil and Kumar Poonam
- Managing Privacy of User Generated Information in a Web 2.0 World pp. 3-16

- Kumar Anil and Kumar Poonam
- A Call to Action: The Privacy Dangers Adolescents Face through Use of Facebook.com pp. 17-32

- Gray Deborah M. and Christiansen Linda
- A Place for Friends? pp. 33-51

- Rossi Camilla
- Interview with: Rainey Reitman Director of Communications Privacy Rights Clearinghouse pp. 52-56

- Anil Kumar
- Understanding Privacy pp. 57-58

- Anil Kumar
Volume 6, issue 1, 2010
- Online Privacy, Information Security and Security Investment pp. 1-2

- Changchit Chuleeporn
- Determinants of Behavioral Responses to Online Privacy: The Effects of Concern, Risk Beliefs, Self-Efficacy, and Communication Sources on Self-Protection Strategies pp. 3-27

- Cho Hichang
- Is Your Email Box Safe? pp. 28-52

- Zhang Feng and Dayarathn Rasika
- Making Sound Security Investment Decisions pp. 53-71

- Cavusoglu Hasan
- Interview with: Peter Ells Director of Strategic Alliances, SoftwareONE pp. 72-74

- Choton Basu
- Groundswell: Winning in a World Transformed by Social Technologies pp. 75-78

- Ellen Weave
Volume 5, issue 4, 2009
- Privacy Governance, Law, and Growth Perspective in Security pp. 1-

- Chuleeporn Changchit
- Security and Privacy Governance: Criteria for Systems Design pp. 3-30

- Jan Gayness Clark, Nicole Lang Beebe, Karen Williams and Linda Shepherd
- Protecting Adolescents’ Personal Information Online: Constraints and Parameters pp. 31-50

- Deborah M. Gray and Linda Christiansen
- Growth Perspective of Information Security pp. 51-67

- Randall Young
- Interview with: Uday Awasthi Project Manager, Sun Microsystems pp. 68-69

- Choton Basu
- Disrupting Class How Disruptive Innovation Will Change the Way the World Learns pp. 70-71

- Choton Basu
Volume 5, issue 3, 2009
- Innovation, Technology and Game-Changers pp. 1-

- Choton Basu
- Web 2.0 Emergency Applications: How Useful Can Twitter be for Emergency Response? pp. 3-26

- Alexander Mills, Rui Chen, JinKyu Lee and H. Raghav Rao
- A Framework of Using Captive Insurance to Streamline IT Control and Compliance Management pp. 27-43

- Xia Zhao and Ling Xue
- Quest for Universal Identification - A Commentary pp. 44-54

- Choton Basu
- Interview with: Rhommer Varilla Managing Director and VP of Services, SysLogic Inc pp. 55-57

- Choton Basu
- Personality Not Included pp. 58-60

- Choton Basu
Volume 5, issue 2, 2009
- IT Security Perceptions & Tools pp. 1-2

- Chuleeporn Changchit
- Examining the Impact of E-privacy Risk Concerns on Citizens’ Intentions to Use E-government Services: An Oman Perspective pp. 3-26

- Dhiyab Al Abri, Tanya McGill and Michael Dixon
- Introducing the Information Technology Security Essential Body of Knowledge Framework pp. 27-41

- Wm. Arthur Conklin and Alexander McLeod
- Explorative Assessment of Internet Hacking: An Agent-Based Modeling Approach pp. 42-64

- Zaiyong Tang, Kallol Bagchi and Anurag Jain
- Interview with: Ravi Pakala Manager, FIS (Fidelity National Information Systems) pp. 65-66

- Choton Basu
- The Big Switch: Rewiring the World, from Edison to Google pp. 67-68

- L. Roger Yin
Volume 5, issue 1, 2009
- Protecting Information pp. 1-2

- Chuleeporn Changchit
- Business and Security Executives Views of Information Security Investment Drivers: Results from a Delphi Study pp. 3-27

- Alice M. Johnson
- Development of a Mobile Commerce Security Analysis Method pp. 28-48

- June Wei and Ant Ozok
- Information Protection at Telecommunications Firms: Human Resource Management Strategies and their Impact on Organizational Justice pp. 49-77

- William H. Ross, Christopher J. Meyer, Jeng-Chung V. Chen and Paul Keaton
- Interview with: Anne Scrivener Agee Vice Provost for IT and CIO, University of Massachusetts - Boston On Security and Privacy Issues facing the University pp. 78-80

- Alberta Tai and R. Ayyagari
- Online Consumer Protection: Theories of Human Relativism pp. 81-82

- Chuleeporn Changchit
| |