


default search action
International Journal of Information Security and Privacy, Volume 3
Volume 3, Number 1, 2009
- Hui-min Ye, Sushil K. Sharma, Huinan Xu:

Re-Evaluation of On-Line Hot Topic Discovery Model. 1-10 - Lee Novakovic, Tanya Jane McGill, Michael W. Dixon:

Understanding User Behavior towards Passwords through Acceptance and Use Modelling. 11-29 - Joanne H. Pratt, Sue A. Conger:

Without Permission: Privacy on the Line. 30-44 - Hamid R. Nemati, Thomas P. Van Dyke:

Do Privacy Statements Really Work? The Effect of Privacy Statements and Fair Information Practices on Trust and Perceived Risk in E-Commerce. 45-64 - Kent D. Boklan:

Large Key Sizes and the Security of Password-Based Cryptography. 65-72
Volume 3, Number 2, 2009
- Virginia Franke Kleist, Bonnie W. Morris, James W. Denton:

Information Systems Security Assurance Management at Municipal Software Solutions, Inc. 1-9 - Alex Kosachev, Hamid R. Nemati:

A Chronicle of a Journey: An E-Mail Bounce Back System. 10-41 - James Suleiman, Terry Huston:

Data Privacy and Security: HIPAA and Small Business Compliance. 42-53 - Benjamin Ngugi, Gina Vega, Glenn S. Dardick:

PCI Compliance: Overcoming the Challenges. 54-67 - Princely Ifinedo

:
Information Technology Security Concerns in Global Financial Services Institutions: Do Socio-Economic Factors Differentiate Perceptions? 68-83 - Kirk P. Arnett, Gary F. Templeton, David A. Vance:

Information Security by Words Alone: The Case for Strong Security Policies. 84-89 - Yong Lu:

The Social Organization of a Criminal Hacker Network: A Case Study. 90-104
Volume 3, Number 3, 2009
- Lei Chen, Wen-Chen Hu, Ming Yang, Lei Zhang:

Security and Privacy Issues in Secure E-Mail Standards and Services. 1-13 - Dulal C. Kar, Hung L. Ngo, Geetha Sanapala:

Applied Cryptography for Security and Privacy in Wireless Sensor Networks. 14-36 - Ming Yang, Monica Trifas, Guillermo A. Francia III

, Lei Chen:
Cryptographic and Steganographic Approaches to Ensure Multimedia Information Security and Privacy. 37-54 - Ramakrishna Thurimella, William Mitchell:

Cloak and Dagger: Man-In-The-Middle and Other Insidious Attacks. 55-75 - Harkeerat Bedi, Li Yang:

Fair Electronic Exchange Based on Fingerprint Biometrics. 76-106 - Feng Zhu

, Wei Zhu:
Secure and Private Service Discovery in Pervasive Computing Environments. 107-122
Volume 3, Number 4, 2009
- Madhu Ahluwalia, Aryya Gangopadhyay, Zhiyuan Chen:

Preserving Privacy in Mining Quantitative Associations Rules. 1-17 - Hamidreza Amouzegar, Mohammad Jafar Tarokh, Anahita Naghilouye Hidaji:

A New Soa Security Model to Protect Against Web Competitive Intelligence Attacks by Software Agents. 18-28 - Xunhua Wang, Hua Lin:

PAKE on the Web. 29-42 - Wasim A. Al-Hamdani:

Three Models to Measure Information Security Compliance. 43-67 - Ian Reay, Patricia Beatty, Scott Dick, James Miller:

Do You Know Where Your Data Is? A Study of the Effect of Enforcement Strategies on Privacy Policies. 68-95

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














