EconPapers    
Economics at your fingertips  
 

Journal of Information Privacy and Security

2005 - 2017

Current editor(s): Chuleeporn Changchit

From Taylor & Francis Journals
Bibliographic data for series maintained by Chris Longhurst ().

Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.


Volume 7, issue 4, 2011

Security Systems Framework, Security-Related Research, Web Threats pp. 1-2 Downloads
Chuleeporn Changchit
A Framework for Enhancing Systems Security pp. 3-22 Downloads
Srinarayan Sharma and Vijayan Sugumaran
Security Risk Management at a Fortune 500 Firm: A Case Study pp. 23-53 Downloads
Humayun Zafar
Towards an Understanding of Web Application Security Threats and Incidents pp. 54-69 Downloads
Gerhard Steinke, Emanuel Tundrea and Kenmoro Kelly
Interview with: Hemadri Naidu Senior Manager at Cap Gemini Sogeti pp. 70-71 Downloads
Choton Basu
Security Risk Management: Building and Information Security Risk pp. 72-73 Downloads
Pankaj Palvia

Volume 7, issue 3, 2011

Trust, Acceptance, and Data Sanitization pp. 1-2 Downloads
Chuleeporn Changchit
Individual Trust and Consumer Risk Perception pp. 3-22 Downloads
Byung Cho Kim, Lara Khansa and Tabitha James
Modeling Security in Acceptance of Electronic Health Record Systems pp. 23-45 Downloads
Barbara Hewitt and Alexander McLeod
Testing Data Sanitization Practices of Retired Drives with The Digital Forensics Data Recovery Project pp. 46-63 Downloads
Ashley L. Podhradsky and Kevin Streff
Interview with: Ntoh O. Etta Director of Strategic Projects & Corporate Security at NetworkSolutions LLC pp. 64-66 Downloads
Choton Basu
Privacy in Context: Technology, Policy, and the Integrity of Social Life pp. 67-71 Downloads
Ling Zhu

Volume 7, issue 2, 2011

Privacy Concerns and Offshore Outsourcing Security pp. 1-2 Downloads
Chuleeporn Changchit
Preventing Authentication Systems From Keylogging Attack pp. 3-27 Downloads
A. S. Sodiya, O. Folorunso, P. B. Komolafe and O. P. Ogunderu
Usable Authentication in EBusiness: Challenges and Opportunities pp. 28-64 Downloads
Binto George, Anna Valeva and George Mangalaraj
Information Politics in Health Information Exchange Networks pp. 65-90 Downloads
Sherrie Drye Cannoy and Pamela E. Carter
Interview with: Eric Kiernan Partner, KC Computers pp. 91-93 Downloads
Choton Basu
Code Version 2.0 pp. 94-97 Downloads
Ling Zhu

Volume 7, issue 1, 2011

Editorial Preface pp. 1-2 Downloads
Chuleeporn Changchit
Tracking the Footprints of Anonymous Defamation in Cyberspace: A Review of the Law and Technology pp. 3-24 Downloads
Raymond Placid and Judy Wynekoop
An Exploratory Study of the Relationships between Selected Contextual Factors and Information Security Concerns in Global Financial Services Institutions pp. 25-49 Downloads
Princely Ifinedo
Human Flesh Search - Facts and Issues pp. 50-71 Downloads
Rui Chen and Sushil K. Sharma
Interview with: Pradeep Jain An Entrepreneur and Technology Architect in the Content Industry pp. 51-73 Downloads
Choton Basu
Handbook of Information Security Management pp. 74-75 Downloads
Choton Basu

Volume 6, issue 4, 2010

User and Consumer Perceptions of Security pp. 1-2 Downloads
Changchit Chuleeporn
Consumer Perception of Web Site Security Attributes pp. 3-27 Downloads
Post Gerald V. and Walchli Suzanne B.
User Acceptance of Speech-Enabled Technologies for Configuration of Computer and Network Security pp. 28-49 Downloads
Luse Andy, Mennecke Brian E. and Townsend Anthony M.
Passwords: Do User Preferences and Website Protocols Differ From Theory? pp. 50-69 Downloads
Barra Roberta Ann, McLeod Alexander, Savage Arline and Simkin Mark G.
Interview with: Ravichandra Gunturu Senior Software Engineer Blackthorne Capital Management pp. 70-72 Downloads
Choton Basu
Rework pp. 73-74 Downloads
Jay Rogers and Choton Basu

Volume 6, issue 3, 2010

Privacy Concerns and Offshore Outsourcing Security pp. 1-2 Downloads
Changchit Chuleeporn
RFID Privacy Issues in Healthcare: Exploring the Roles of Technologies and Regulations pp. 3-28 Downloads
Parks Rachida, Chu Chao-Hsien and Xu Heng
Information Technology Offshore Outsourcing Security Risks and Safeguards pp. 29-46 Downloads
Wei June, O’Connell Jason and Loho-Noya Meiga
Employee Information Privacy Concerns with Employer Held Data: A Comparison of Two Prevalent Privacy Models pp. 47-71 Downloads
Clouse Shawn F., Wright Ryan T. and Pike Ronald E.
Interview with: Antonio Fernandez Senior Program Manager Supersaver.com pp. 72-73 Downloads
Choton Basu
Internet Safety pp. 74-75 Downloads
Choton Basu

Volume 6, issue 2, 2010

Issues and Challenges of the Diffusion of Web 2.0 on User Privacy pp. 1-2 Downloads
Kumar Anil and Kumar Poonam
Managing Privacy of User Generated Information in a Web 2.0 World pp. 3-16 Downloads
Kumar Anil and Kumar Poonam
A Call to Action: The Privacy Dangers Adolescents Face through Use of Facebook.com pp. 17-32 Downloads
Gray Deborah M. and Christiansen Linda
A Place for Friends? pp. 33-51 Downloads
Rossi Camilla
Interview with: Rainey Reitman Director of Communications Privacy Rights Clearinghouse pp. 52-56 Downloads
Anil Kumar
Understanding Privacy pp. 57-58 Downloads
Anil Kumar

Volume 6, issue 1, 2010

Online Privacy, Information Security and Security Investment pp. 1-2 Downloads
Changchit Chuleeporn
Determinants of Behavioral Responses to Online Privacy: The Effects of Concern, Risk Beliefs, Self-Efficacy, and Communication Sources on Self-Protection Strategies pp. 3-27 Downloads
Cho Hichang
Is Your Email Box Safe? pp. 28-52 Downloads
Zhang Feng and Dayarathn Rasika
Making Sound Security Investment Decisions pp. 53-71 Downloads
Cavusoglu Hasan
Interview with: Peter Ells Director of Strategic Alliances, SoftwareONE pp. 72-74 Downloads
Choton Basu
Groundswell: Winning in a World Transformed by Social Technologies pp. 75-78 Downloads
Ellen Weave

Volume 5, issue 4, 2009

Privacy Governance, Law, and Growth Perspective in Security pp. 1- Downloads
Chuleeporn Changchit
Security and Privacy Governance: Criteria for Systems Design pp. 3-30 Downloads
Jan Gayness Clark, Nicole Lang Beebe, Karen Williams and Linda Shepherd
Protecting Adolescents’ Personal Information Online: Constraints and Parameters pp. 31-50 Downloads
Deborah M. Gray and Linda Christiansen
Growth Perspective of Information Security pp. 51-67 Downloads
Randall Young
Interview with: Uday Awasthi Project Manager, Sun Microsystems pp. 68-69 Downloads
Choton Basu
Disrupting Class How Disruptive Innovation Will Change the Way the World Learns pp. 70-71 Downloads
Choton Basu

Volume 5, issue 3, 2009

Innovation, Technology and Game-Changers pp. 1- Downloads
Choton Basu
Web 2.0 Emergency Applications: How Useful Can Twitter be for Emergency Response? pp. 3-26 Downloads
Alexander Mills, Rui Chen, JinKyu Lee and H. Raghav Rao
A Framework of Using Captive Insurance to Streamline IT Control and Compliance Management pp. 27-43 Downloads
Xia Zhao and Ling Xue
Quest for Universal Identification - A Commentary pp. 44-54 Downloads
Choton Basu
Interview with: Rhommer Varilla Managing Director and VP of Services, SysLogic Inc pp. 55-57 Downloads
Choton Basu
Personality Not Included pp. 58-60 Downloads
Choton Basu

Volume 5, issue 2, 2009

IT Security Perceptions & Tools pp. 1-2 Downloads
Chuleeporn Changchit
Examining the Impact of E-privacy Risk Concerns on Citizens’ Intentions to Use E-government Services: An Oman Perspective pp. 3-26 Downloads
Dhiyab Al Abri, Tanya McGill and Michael Dixon
Introducing the Information Technology Security Essential Body of Knowledge Framework pp. 27-41 Downloads
Wm. Arthur Conklin and Alexander McLeod
Explorative Assessment of Internet Hacking: An Agent-Based Modeling Approach pp. 42-64 Downloads
Zaiyong Tang, Kallol Bagchi and Anurag Jain
Interview with: Ravi Pakala Manager, FIS (Fidelity National Information Systems) pp. 65-66 Downloads
Choton Basu
The Big Switch: Rewiring the World, from Edison to Google pp. 67-68 Downloads
L. Roger Yin

Volume 5, issue 1, 2009

Protecting Information pp. 1-2 Downloads
Chuleeporn Changchit
Business and Security Executives Views of Information Security Investment Drivers: Results from a Delphi Study pp. 3-27 Downloads
Alice M. Johnson
Development of a Mobile Commerce Security Analysis Method pp. 28-48 Downloads
June Wei and Ant Ozok
Information Protection at Telecommunications Firms: Human Resource Management Strategies and their Impact on Organizational Justice pp. 49-77 Downloads
William H. Ross, Christopher J. Meyer, Jeng-Chung V. Chen and Paul Keaton
Interview with: Anne Scrivener Agee Vice Provost for IT and CIO, University of Massachusetts - Boston On Security and Privacy Issues facing the University pp. 78-80 Downloads
Alberta Tai and R. Ayyagari
Online Consumer Protection: Theories of Human Relativism pp. 81-82 Downloads
Chuleeporn Changchit
Page updated 2025-04-06