


default search action
International Journal of Information Security and Privacy, Volume 1
Volume 1, Number 1, 2007
- Stephen J. H. Yang

, Blue C. W. Lan, James S. F. Hsieh, Jen-Yao Chung:
Trustworthy Web Services: An Experience-Based Model for Trustworthiness Evaluation. 1-17 - Bhavani Thuraisingham, Natasha Tsybulnik, Ashraful Alam:

Administering the Semantic Web: Confidentiality, Privacy, and Trust Management. 18-34 - Song Han, Vidyasagar M. Potdar, Elizabeth Chang

, Tharam S. Dillon:
Privacy-Preserving Transactions Protocol Using Mobile Agents with Mutual Authentication. 35-46 - Lixin Fu, Hamid R. Nemati, Fereidoon Sadri:

Privacy-Preserving Data Mining and the Need for Confluence of Research and Practice. 47-63 - Nicholas C. Romano Jr., Jerry Fjermestad:

Privacy and Security in the Age of Electronic Customer Relationship Management. 65-86
Volume 1, Number 2, 2007
- Dieter Bartmann, Idir Bakdi, Michael Achatz:

On the Design of an Authentication System Based on Keystroke Dynamics Using a Predefined Input Text. 1-12 - Stanley R. M. Oliveira, Osmar R. Zaïane:

Privacy-Preserving Clustering to Uphold Business Collaboration: A Dimensionality Reduction Based Transformation Approach. 13-36 - Kenneth J. Knapp, Thomas E. Marshall, R. Kelly Rainer Jr., F. Nelson Ford:

Information Security Effectiveness: Conceptualization and Validation of a Theory. 37-60 - Joseph A. Cazier

, E. Vance Wilson
, B. Dawn Medlin:
The Role of Privacy Risk in IT Acceptance: An Empirical Study. 61-73 - Thomas P. Van Dyke:

Ignorance is Bliss: The Effect of Increased Knowledge on Privacy Concerns and Internet Shopping Site Personalization Preferences. 74-92
Volume 1, Number 3, 2007
- Geoff Skinner

, Elizabeth Chang
:
A Projection of the Future Effects of Quantum Computation on Information Privacy. 1-12 - Hamid Jahankhani, Shantha Fernando

, Mathews Z. Nkhoma, Haralambos Mouratidis:
Information Systems Security: Cases of Network Administrator Threats. 13-25 - Vishal Vatsa, Shamik Sural

, Arun K. Majumdar:
A Rule-Based and Game-Theoretic Approach to Online Credit Card Fraud Detection. 26-46 - Xin Luo, Teik Guan Tan:

Defeating Active Phishing Attacks for Web-Based Transactions. 47-60 - Latha Parameswaran, K. Anbumani:

A Semi-fragile Image Watermarking using Wavelet Inter Coefficient Relations. 61-75
Volume 1, Number 4, 2007
- Almut Herzog, Nahid Shahmehri, Claudiu Duma:

An Ontology of Information Security. 1-23 - Amr Ali Eldin

, René W. Wagenaar:
Towards Autonomous User Privacy Control. 24-46 - Mohammad M. Masud, Latifur Khan

, Bhavani Thuraisingham:
E-Mail Worm Detection Using Data Mining. 47-61 - Norman Pendegraft, Mark Rounds:

A Simulation Model of Information Systems Security. 62-74 - Kirk P. Arnett, Mark B. Schmidt, Allen C. Johnston, Jongki Kim, Ha Jin Hwang

:
Rootkits and What we Know: Assessing US and Korean Knowledge and Perceptions. 75-86

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














