EconPapers    
Economics at your fingertips  
 

Journal of Information Privacy and Security

2005 - 2017

Current editor(s): Chuleeporn Changchit

From Taylor & Francis Journals
Bibliographic data for series maintained by Chris Longhurst ().

Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.


Volume 4, issue 4, 2008

Security Protection and Management pp. 1-2 Downloads
Chuleeporn Changchit
An Empirical Investigation of Factors Influencing Information Security Behavior pp. 3-20 Downloads
Sunil Hazari, William Hargrave and Beth Clenney
A Distributed Defensive Architecture for DoS/DDoS Attacks pp. 21-44 Downloads
S. Malliga and A. Tamilarasi
An Empirical Assessment of Factors Impeding Effective Password Management pp. 45-59 Downloads
Hennie Kruger, Tjaart Steyn, B. Dawn Medlin and Lynette Drevin
Interview with: Meng Chow Kang, CISSP, CISA Convener, ISO/IEC JTC 1/SC 27/WG 4-Security Controls and Services Standards Working Group pp. 60-63 Downloads
Kian Kim Lim
CyberRegs - A Business Guide to Web Property, Privacy, and Patents pp. 64-65 Downloads
James K. Fugate

Volume 4, issue 3, 2008

Data Protection and Privacy Issue pp. 1-2 Downloads
Chuleeporn Changchit
Consumer’s PCs: A Study of Hard Drive Forensics, Data Recovery, and Exploitation pp. 3-15 Downloads
B. Dawn Medlin, Joseph A. Cazier and Robert M. Weaver
Prime III: Defense-in-Depth Approach to Electronic Voting pp. 16-35 Downloads
Juan E. Gilbert, Jonathan MacDonald, Raquel Hill, Derek T. Sanders, Idongesit Mkpong-Ruffin, E. Vincent Cross, Ken Rouse, Jerome McClendon and Gregory Rogers
The Role of Emotions in Shaping Consumers’ Privacy Beliefs about Unfamiliar Online Vendors pp. 36-62 Downloads
Han Li, Rathindra Sarathy and Jie Zhang
Interview with: Andrew Colarik, PhD, MBA Information Security Consultant, Speaker, Author, and Inventor pp. 63-65 Downloads
Choton Basu
Born Digital - Understanding the First Generation of Digital Natives pp. 66-67 Downloads
Choton Basu

Volume 4, issue 2, 2008

Threat, Authentication, and Privacy pp. 1-2 Downloads
Changchit Chuleeporn
Misuse Cases for Identifying System Dependability Threats pp. 3-22 Downloads
Sindre Guttorm and Opdahl Andreas L.
A Two-Phase Authentication Protocol Using the Cell Phone as a Token pp. 23-39 Downloads
Adams Carl and Dimitriou Alexandros
SVDC: Preserving Privacy in Clustering using Singular Value Decomposition pp. 40-54 Downloads
Rajavel Maheswari and Karuppuswamy Duraiswamy
Interview with: Alan T. Lord, Ernst and Young Professor of Accounting and Director Fulbright Scholar, Master of Accountancy Program, Bowling Green State University, Bowling Green Ohio pp. 55-61 Downloads
Valrie Chambers
Security Metrics - Replacing Fear, Uncertainty, and Doubt pp. 62-63 Downloads
Tim Klaus

Volume 4, issue 1, 2008

System Privacy and Protection pp. 1-2 Downloads
Chuleeporn Changchit
Responding to Critical Infrastructure Threats of Reliability and Security: Economic, Organizational and Technical Perspectives for a Next Generation US Electric Grid pp. 3-20 Downloads
Elizabeth White Baker
Managing Anti-Circumvention Technology for Digital Content pp. 21-41 Downloads
Taeha Kim, Youngshin Kim and Alex Talalayevsky
An Empirical Investigation on Customer’s Privacy Perceptions, Trust and Security Awareness in E-commerce Environment pp. 42-60 Downloads
Anil Gurung, Xin Luo and M.k Raja
Interview with: Peter B. McCarthy, Assistant Secretary for Management and CFO United States Department of the Treasury http://www.ustreas.gov/ pp. 61-63 Downloads
Nathaniel J. Melby
Management of Information Security pp. 64-65 Downloads
Joseph S. Mollick

Volume 3, issue 4, 2007

Intrusion and Hacking pp. 1-2 Downloads
Chuleeporn Changchit
Profiling User Behavior for Intrusion Detection Using Item Response Modeling pp. 3-18 Downloads
Yun Wang, Nathaniel J. Melby and Inyoung Kim
Intrusion Detection Management System for eCommerce Security pp. 19-31 Downloads
Jorge Marx Gómez and Jens Lichtenberg
Illegal Computer Hacking: An Assessment of Factors that Encourage and Deter the Behavior pp. 33-52 Downloads
Randall Young and Lixuan Zhang
Interview with: Damani Short, CIO United States Olympic Committee http://www.usoc.org/ pp. 53-54 Downloads
Choton Basu
Computer Privacy Annoyances — How to Avoid the Most Annoying Invasions of Your Personal and Online Privacy pp. 55-56 Downloads
Robert Cutshall

Volume 3, issue 3, 2007

Information and Security Concern pp. 1-2 Downloads
Chuleeporn Changchit
Looking for Love in All the Wrong Places: A Security Case Study on Online Identity Theft pp. 3-24 Downloads
Doug White and Alan Rea
Exoinformation Space Audits: An Information Richness View of Privacy and Security Obligations pp. 29-44 Downloads
Carl Adams and Vasilios Katos
Knowledge Sharing in Law Enforcement: A Case Study pp. 45-68 Downloads
Rahul Bhaskar and Yi Zhang
Interview with: A.G. “Fred” Altomare, Partner 1:1 Corporation Milpitas, CA 95035 http://www. 1to1corp.com/index.html pp. 69-70 Downloads
Choton Basu
Geekonomics - The Real Cost of Insecure Software pp. 71-72 Downloads
David Rice and Chaton Basu

Volume 3, issue 2, 2007

Trusting Technology Interaction pp. 1-2 Downloads
Chuleeporn Changchit
Understanding eTrust pp. 3-17 Downloads
Nabil Tamimi and Rose Sebastianelli
A Cross-Cultural Analysis of Privacy Notices of the Global 2000 pp. 18-36 Downloads
Xiaoni Zhang, Sakaguchi Toru and Max Kennedy
An Architecture for Automatic and Adaptive Defense pp. 37-58 Downloads
Ram Dantu and Joao W. Cangussu
Interview with: Peter Zaballos, Vice President Frazier Technology Ventures Seattle, WA http://www.fraziertechnology.com/index.htm pp. 59-60 Downloads
Choton Basy
How to Be Invisible pp. 61-62 Downloads
J.J. Luna and Choton Basu

Volume 3, issue 1, 2007

Wide Spectrum of Articles pp. 1-2 Downloads
Basu Choton
A Theoretical Model to Deliver Value in Electronic Commerce pp. 3-29 Downloads
Steven A. Brown
An Investigative Study: Health Care Workers as Security Threat Suppliers pp. 30-46 Downloads
B. Dawn Medlin and Adriana Romaniello
A Block Cipher Based Upon Permutation, Substitution and Iteration pp. 47-62 Downloads
Udaya S. Kumar, V.U.K. Sastry and Vinaya A. Babu
Interview with: Hemadri Gurramkonda Director, Centrica Informatics pp. 63-64 Downloads
Choton Basu
Cybercrime: Digital Cops in a Networked Environment pp. 65-66 Downloads
Jack Balkin, James Grimmelmann, Eddan Katz, Nimrod Kozlovski, Shlomit Wagman, Tal Zarsky and John Chenoweth

Volume 2, issue 4, 2006

Asking the right question? pp. 1-2 Downloads
John Chenoweth
The Efficacy of Emphasizing a Legal System Approach to Computer Security pp. 3-29 Downloads
Gerald V. Post and Albert Kagan
Security Service Packages: Partitioning the Security Space pp. 30-44 Downloads
Donald G. Marks and John Hale
Behavioral Marketing: Security and Privacy Issues pp. 45-59 Downloads
Brian Dobosz, Kathleen Green and Guy Sisler
Interview with: Robert Voliva and Jeremy Fields BankingMv Wav.com IT Developers and Analysts Fort Atkinson, WI pp. 60-62 Downloads
Choton Basu and Jeremy Fields
I. T. Wars Managing the Business-Technology Weave in the New Millennium by David Scott pp. 63-64 Downloads
Roger Yin

Volume 2, issue 3, 2006

Election Systems, Financial Risks and the Chinese Firewall pp. 1-3 Downloads
Suvojit Choton Basu
An Analysis of Security Threats of Electronic Election Systems pp. 3-24 Downloads
C.H. Cheng and K.F. Wong
Online Security Solutions in the Financial Industry based on a Commercial Risk Assessment Matrix pp. 21-41 Downloads
Jorge Marx Gómez and Stephan Paxmann
The Great Chinese Firewall: A Safeguard or Stop Sign? pp. 42-61 Downloads
Tierney Bensen, Patrick Henze and Geoff Farnsworth
Sindey Schueler-Platz State Administrator, Kansas Bureau of Investigation pp. 62-64 Downloads
Suvojit Choton Basu
Book Review: Public Information Technolow and E-Governance: Managing e Virtual State pp. 65-67 Downloads
Choton Basu

Volume 2, issue 2, 2006

Frameworks and Proposed Models pp. 1-2 Downloads
Choton S. Basu and John Chenoweth
A Research Framework for Information Systems Security pp. 3-24 Downloads
Sherrie Cannoy, Prashant C. Palvia and Richard Schilhavy
e-Government - A WebServices Framework pp. 30-50 Downloads
Kam Fai Wong, Matthew Ka Wing Tam and Chun Hung Cheng
Developing Trust in M-commerce: A Vendor and Certificate Authority Model pp. 51-58 Downloads
Nelson Stewart, Jared Spencer and Nathaniel Melby
Interview with: Ken M. Shaurette, CISSP, CISA, CISM Engagement Manager Jefferson Wells, Inc Madison, WI pp. 59-61 Downloads
Blake Penn
Book Review: Who Controls the Internet: Illusions of a Borderless World pp. 62-64 Downloads
John D. Chenoweth

Volume 2, issue 1, 2006

Information Security: Risks and Solutions pp. 1-2 Downloads
Linda Reid
Customer Information: Protecting the Organization’s Most Critical Asset from Misappropriation and Identity Theft pp. 3-15 Downloads
Raymond J. Elson and Rey LeClerc
An XML-Based Intelligent Agent Protocol Design Framework for Individualized Privacy Postures within Trusted Network Environments pp. 16-28 Downloads
Merrill Warkentin and Allen C. Johnston
Do Concerns about Error in Data and Access to Data Affect Students’ Feeling of Alienation? pp. 29-45 Downloads
Joseph S. Mollick
Amanda M. Hubbard, J.D. Fulbright Scholar Former Trial Attorney, Computer Crime and Intellectual Property Section, U.S. Department of Justice pp. 47-56 Downloads
Linda A. Reid
Book Review: Information Ethics: Privacv, Propem, and Power pp. 57-59 Downloads
John D. Chenoweth
Page updated 2025-04-06