Journal of Information Privacy and Security
2005 - 2017
Current editor(s): Chuleeporn Changchit From Taylor & Francis Journals Bibliographic data for series maintained by Chris Longhurst (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 4, issue 4, 2008
- Security Protection and Management pp. 1-2

- Chuleeporn Changchit
- An Empirical Investigation of Factors Influencing Information Security Behavior pp. 3-20

- Sunil Hazari, William Hargrave and Beth Clenney
- A Distributed Defensive Architecture for DoS/DDoS Attacks pp. 21-44

- S. Malliga and A. Tamilarasi
- An Empirical Assessment of Factors Impeding Effective Password Management pp. 45-59

- Hennie Kruger, Tjaart Steyn, B. Dawn Medlin and Lynette Drevin
- Interview with: Meng Chow Kang, CISSP, CISA Convener, ISO/IEC JTC 1/SC 27/WG 4-Security Controls and Services Standards Working Group pp. 60-63

- Kian Kim Lim
- CyberRegs - A Business Guide to Web Property, Privacy, and Patents pp. 64-65

- James K. Fugate
Volume 4, issue 3, 2008
- Data Protection and Privacy Issue pp. 1-2

- Chuleeporn Changchit
- Consumer’s PCs: A Study of Hard Drive Forensics, Data Recovery, and Exploitation pp. 3-15

- B. Dawn Medlin, Joseph A. Cazier and Robert M. Weaver
- Prime III: Defense-in-Depth Approach to Electronic Voting pp. 16-35

- Juan E. Gilbert, Jonathan MacDonald, Raquel Hill, Derek T. Sanders, Idongesit Mkpong-Ruffin, E. Vincent Cross, Ken Rouse, Jerome McClendon and Gregory Rogers
- The Role of Emotions in Shaping Consumers’ Privacy Beliefs about Unfamiliar Online Vendors pp. 36-62

- Han Li, Rathindra Sarathy and Jie Zhang
- Interview with: Andrew Colarik, PhD, MBA Information Security Consultant, Speaker, Author, and Inventor pp. 63-65

- Choton Basu
- Born Digital - Understanding the First Generation of Digital Natives pp. 66-67

- Choton Basu
Volume 4, issue 2, 2008
- Threat, Authentication, and Privacy pp. 1-2

- Changchit Chuleeporn
- Misuse Cases for Identifying System Dependability Threats pp. 3-22

- Sindre Guttorm and Opdahl Andreas L.
- A Two-Phase Authentication Protocol Using the Cell Phone as a Token pp. 23-39

- Adams Carl and Dimitriou Alexandros
- SVDC: Preserving Privacy in Clustering using Singular Value Decomposition pp. 40-54

- Rajavel Maheswari and Karuppuswamy Duraiswamy
- Interview with: Alan T. Lord, Ernst and Young Professor of Accounting and Director Fulbright Scholar, Master of Accountancy Program, Bowling Green State University, Bowling Green Ohio pp. 55-61

- Valrie Chambers
- Security Metrics - Replacing Fear, Uncertainty, and Doubt pp. 62-63

- Tim Klaus
Volume 4, issue 1, 2008
- System Privacy and Protection pp. 1-2

- Chuleeporn Changchit
- Responding to Critical Infrastructure Threats of Reliability and Security: Economic, Organizational and Technical Perspectives for a Next Generation US Electric Grid pp. 3-20

- Elizabeth White Baker
- Managing Anti-Circumvention Technology for Digital Content pp. 21-41

- Taeha Kim, Youngshin Kim and Alex Talalayevsky
- An Empirical Investigation on Customer’s Privacy Perceptions, Trust and Security Awareness in E-commerce Environment pp. 42-60

- Anil Gurung, Xin Luo and M.k Raja
- Interview with: Peter B. McCarthy, Assistant Secretary for Management and CFO United States Department of the Treasury http://www.ustreas.gov/ pp. 61-63

- Nathaniel J. Melby
- Management of Information Security pp. 64-65

- Joseph S. Mollick
Volume 3, issue 4, 2007
- Intrusion and Hacking pp. 1-2

- Chuleeporn Changchit
- Profiling User Behavior for Intrusion Detection Using Item Response Modeling pp. 3-18

- Yun Wang, Nathaniel J. Melby and Inyoung Kim
- Intrusion Detection Management System for eCommerce Security pp. 19-31

- Jorge Marx Gómez and Jens Lichtenberg
- Illegal Computer Hacking: An Assessment of Factors that Encourage and Deter the Behavior pp. 33-52

- Randall Young and Lixuan Zhang
- Interview with: Damani Short, CIO United States Olympic Committee http://www.usoc.org/ pp. 53-54

- Choton Basu
- Computer Privacy Annoyances — How to Avoid the Most Annoying Invasions of Your Personal and Online Privacy pp. 55-56

- Robert Cutshall
Volume 3, issue 3, 2007
- Information and Security Concern pp. 1-2

- Chuleeporn Changchit
- Looking for Love in All the Wrong Places: A Security Case Study on Online Identity Theft pp. 3-24

- Doug White and Alan Rea
- Exoinformation Space Audits: An Information Richness View of Privacy and Security Obligations pp. 29-44

- Carl Adams and Vasilios Katos
- Knowledge Sharing in Law Enforcement: A Case Study pp. 45-68

- Rahul Bhaskar and Yi Zhang
- Interview with: A.G. “Fred” Altomare, Partner 1:1 Corporation Milpitas, CA 95035 http://www. 1to1corp.com/index.html pp. 69-70

- Choton Basu
- Geekonomics - The Real Cost of Insecure Software pp. 71-72

- David Rice and Chaton Basu
Volume 3, issue 2, 2007
- Trusting Technology Interaction pp. 1-2

- Chuleeporn Changchit
- Understanding eTrust pp. 3-17

- Nabil Tamimi and Rose Sebastianelli
- A Cross-Cultural Analysis of Privacy Notices of the Global 2000 pp. 18-36

- Xiaoni Zhang, Sakaguchi Toru and Max Kennedy
- An Architecture for Automatic and Adaptive Defense pp. 37-58

- Ram Dantu and Joao W. Cangussu
- Interview with: Peter Zaballos, Vice President Frazier Technology Ventures Seattle, WA http://www.fraziertechnology.com/index.htm pp. 59-60

- Choton Basy
- How to Be Invisible pp. 61-62

- J.J. Luna and Choton Basu
Volume 3, issue 1, 2007
- Wide Spectrum of Articles pp. 1-2

- Basu Choton
- A Theoretical Model to Deliver Value in Electronic Commerce pp. 3-29

- Steven A. Brown
- An Investigative Study: Health Care Workers as Security Threat Suppliers pp. 30-46

- B. Dawn Medlin and Adriana Romaniello
- A Block Cipher Based Upon Permutation, Substitution and Iteration pp. 47-62

- Udaya S. Kumar, V.U.K. Sastry and Vinaya A. Babu
- Interview with: Hemadri Gurramkonda Director, Centrica Informatics pp. 63-64

- Choton Basu
- Cybercrime: Digital Cops in a Networked Environment pp. 65-66

- Jack Balkin, James Grimmelmann, Eddan Katz, Nimrod Kozlovski, Shlomit Wagman, Tal Zarsky and John Chenoweth
Volume 2, issue 4, 2006
- Asking the right question? pp. 1-2

- John Chenoweth
- The Efficacy of Emphasizing a Legal System Approach to Computer Security pp. 3-29

- Gerald V. Post and Albert Kagan
- Security Service Packages: Partitioning the Security Space pp. 30-44

- Donald G. Marks and John Hale
- Behavioral Marketing: Security and Privacy Issues pp. 45-59

- Brian Dobosz, Kathleen Green and Guy Sisler
- Interview with: Robert Voliva and Jeremy Fields BankingMv Wav.com IT Developers and Analysts Fort Atkinson, WI pp. 60-62

- Choton Basu and Jeremy Fields
- I. T. Wars Managing the Business-Technology Weave in the New Millennium by David Scott pp. 63-64

- Roger Yin
Volume 2, issue 3, 2006
- Election Systems, Financial Risks and the Chinese Firewall pp. 1-3

- Suvojit Choton Basu
- An Analysis of Security Threats of Electronic Election Systems pp. 3-24

- C.H. Cheng and K.F. Wong
- Online Security Solutions in the Financial Industry based on a Commercial Risk Assessment Matrix pp. 21-41

- Jorge Marx Gómez and Stephan Paxmann
- The Great Chinese Firewall: A Safeguard or Stop Sign? pp. 42-61

- Tierney Bensen, Patrick Henze and Geoff Farnsworth
- Sindey Schueler-Platz State Administrator, Kansas Bureau of Investigation pp. 62-64

- Suvojit Choton Basu
- Book Review: Public Information Technolow and E-Governance: Managing e Virtual State pp. 65-67

- Choton Basu
Volume 2, issue 2, 2006
- Frameworks and Proposed Models pp. 1-2

- Choton S. Basu and John Chenoweth
- A Research Framework for Information Systems Security pp. 3-24

- Sherrie Cannoy, Prashant C. Palvia and Richard Schilhavy
- e-Government - A WebServices Framework pp. 30-50

- Kam Fai Wong, Matthew Ka Wing Tam and Chun Hung Cheng
- Developing Trust in M-commerce: A Vendor and Certificate Authority Model pp. 51-58

- Nelson Stewart, Jared Spencer and Nathaniel Melby
- Interview with: Ken M. Shaurette, CISSP, CISA, CISM Engagement Manager Jefferson Wells, Inc Madison, WI pp. 59-61

- Blake Penn
- Book Review: Who Controls the Internet: Illusions of a Borderless World pp. 62-64

- John D. Chenoweth
Volume 2, issue 1, 2006
- Information Security: Risks and Solutions pp. 1-2

- Linda Reid
- Customer Information: Protecting the Organization’s Most Critical Asset from Misappropriation and Identity Theft pp. 3-15

- Raymond J. Elson and Rey LeClerc
- An XML-Based Intelligent Agent Protocol Design Framework for Individualized Privacy Postures within Trusted Network Environments pp. 16-28

- Merrill Warkentin and Allen C. Johnston
- Do Concerns about Error in Data and Access to Data Affect Students’ Feeling of Alienation? pp. 29-45

- Joseph S. Mollick
- Amanda M. Hubbard, J.D. Fulbright Scholar Former Trial Attorney, Computer Crime and Intellectual Property Section, U.S. Department of Justice pp. 47-56

- Linda A. Reid
- Book Review: Information Ethics: Privacv, Propem, and Power pp. 57-59

- John D. Chenoweth
| |