Journal of Information Privacy and Security
2005 - 2017
Current editor(s): Chuleeporn Changchit From Taylor & Francis Journals Bibliographic data for series maintained by Chris Longhurst (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 1, issue 4, 2005
- On Issues of Computer Crimes, Online Security and Legal Resources pp. 1-2

- S. Choton Basu
- The Digital Persona and Trust Bank: A Privacy Management Framework pp. 3-21

- Sree Nilakanta and Kevin Scheibe
- Security Breaches, Privacy Intrusions, and Reporting of Computer Crimes pp. 22-32

- G. Keith Roberts
- An Investigative Study: Consumers Password Choices on an E-Commerce Site pp. 33-52

- B. Dawn Medlin and Joseph A. Cazier
- Amanda M. Hubbard, J.D., FUIPSight Scholar former Trial Attorney, Computer Crime and Intellectual Property Section, U.S. Department of Justice pp. 53-59

- Linda A. Reid
- Book Review: Social, Ethical and Policy Implication of Information Technology by Linda Brennan and Victoria Johnson, Information Science Publishing, 2004 pp. 60-62

- William L. Dougan
Volume 1, issue 3, 2005
- Issues of Coordination and Compliance in Complex Systems pp. 1-2

- John D. Chenoweth
- A Proposed Integrated Framework for Coordinating Computer Security Incident Response Team pp. 3-17

- Rahul Bhaskar
- Perceptions of Information Security in the Workplace: Linking Information Security Climate to Compliant Behavior pp. 18-41

- Mark Chan, Irene Woon and Atreyi Kankanhalli
- Privacy Preserving Combinatorial Reverse Auction Protocol for a Market-Oriented Grid Based on Secure Group Communication pp. 42-56

- Sumit Chakraborty and Sushil Kumar Sharma
- Kelly Hansen, CEO, Neohapsis Inc pp. 57-58

- John D. Chenoweth
- Book Review: Secrets & Lies: Didtal Security in a Networked World Bruce Schneier, Wiley Publishing, 2000 pp. 59-60

- John D. Chenoweth
Volume 1, issue 2, 2005
- On issues of Convenience, Privacy and Security pp. 1-3

- Suvojit Choton Basu
- Mobile Payment Adoption in the US: A Cross-industry, Crossplatform Solution pp. 4-28

- Sunil G. Dewan and Lei-da Chen
- Secure Web service-based resource sharing in ERP Networks pp. 29-48

- Nico Brehm and Jorge Marx Gómez
- Dimensions of Network Security Planning For Web Services pp. 49-66

- Richard S. Swart, Bryan A. Marshall, Matthew E. Harris, Karen A. Forcht and David Olsen
- Marilyn Wood, Security Officer Jim Amundson, Server Administration & Network Solutions Department of Agriculture, Trade and Consumer Protection (DATCP - Wisconsin) pp. 67-68

- Suvojit Choton Basu
- Book Review: The Art of Deception: Controlling the Human Element of Security pp. 69-70

- John D. Chenoweth
Volume 1, issue 1, 2005
- Toward a Long Term Discourse on Privacy, Security, Legal and Ethical Issues of Information pp. 1-3

- Suvojit Choton Basu
- An Interview with Ian Browde Director of Strategy and Business Development, Enterprise Solutions Division, Nokia, Inc pp. 4-9

- Carol Sánchez
- Information Assurance Technical Framework and End User Information Ownership: A Critical Analysis pp. 10-26

- Michael S. Korotka, L. Roger Yin and Suvojit Choton Basu
- A Holistic Perspective on the Science of Computer Forensics pp. 27-39

- Matthew J. Stippich and Christopher J. Stippich
- An Interview with Sindey Schueler-Platz State Administrator, Kansas Bureau of Investigation pp. 40-42

- Suvojit Choton Basu
- Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management pp. 43-44

- John D. Chenoweth
- Computer Security: 20 things Every Employee Should Know. New York pp. 45-

- John D. Chenoweth
| |