default search action
International Journal of Information Security and Privacy, Volume 3
Volume 3, Number 1, 2009
- Hui-min Ye, Sushil K. Sharma, Huinan Xu:
Re-Evaluation of On-Line Hot Topic Discovery Model. 1-10 - Lee Novakovic, Tanya Jane McGill, Michael W. Dixon:
Understanding User Behavior towards Passwords through Acceptance and Use Modelling. 11-29 - Joanne H. Pratt, Sue A. Conger:
Without Permission: Privacy on the Line. 30-44 - Hamid R. Nemati, Thomas P. Van Dyke:
Do Privacy Statements Really Work? The Effect of Privacy Statements and Fair Information Practices on Trust and Perceived Risk in E-Commerce. 45-64 - Kent D. Boklan:
Large Key Sizes and the Security of Password-Based Cryptography. 65-72
Volume 3, Number 2, 2009
- Virginia Franke Kleist, Bonnie W. Morris, James W. Denton:
Information Systems Security Assurance Management at Municipal Software Solutions, Inc. 1-9 - Alex Kosachev, Hamid R. Nemati:
A Chronicle of a Journey: An E-Mail Bounce Back System. 10-41 - James Suleiman, Terry Huston:
Data Privacy and Security: HIPAA and Small Business Compliance. 42-53 - Benjamin Ngugi, Gina Vega, Glenn S. Dardick:
PCI Compliance: Overcoming the Challenges. 54-67 - Princely Ifinedo:
Information Technology Security Concerns in Global Financial Services Institutions: Do Socio-Economic Factors Differentiate Perceptions? 68-83 - Kirk P. Arnett, Gary F. Templeton, David A. Vance:
Information Security by Words Alone: The Case for Strong Security Policies. 84-89 - Yong Lu:
The Social Organization of a Criminal Hacker Network: A Case Study. 90-104
Volume 3, Number 3, 2009
- Lei Chen, Wen-Chen Hu, Ming Yang, Lei Zhang:
Security and Privacy Issues in Secure E-Mail Standards and Services. 1-13 - Dulal C. Kar, Hung L. Ngo, Geetha Sanapala:
Applied Cryptography for Security and Privacy in Wireless Sensor Networks. 14-36 - Ming Yang, Monica A. Trifas, Guillermo A. Francia III, Lei Chen:
Cryptographic and Steganographic Approaches to Ensure Multimedia Information Security and Privacy. 37-54 - Ramakrishna Thurimella, William Mitchell:
Cloak and Dagger: Man-In-The-Middle and Other Insidious Attacks. 55-75 - Harkeerat Bedi, Li Yang:
Fair Electronic Exchange Based on Fingerprint Biometrics. 76-106 - Feng Zhu, Wei Zhu:
Secure and Private Service Discovery in Pervasive Computing Environments. 107-122
Volume 3, Number 4, 2009
- Madhu Ahluwalia, Aryya Gangopadhyay, Zhiyuan Chen:
Preserving Privacy in Mining Quantitative Associations Rules. 1-17 - Hamidreza Amouzegar, Mohammad Jafar Tarokh, Anahita Naghilouye Hidaji:
A New Soa Security Model to Protect Against Web Competitive Intelligence Attacks by Software Agents. 18-28 - Xunhua Wang, Hua Lin:
PAKE on the Web. 29-42 - Wasim A. Al-Hamdani:
Three Models to Measure Information Security Compliance. 43-67 - Ian Reay, Patricia Beatty, Scott Dick, James Miller:
Do You Know Where Your Data Is? A Study of the Effect of Enforcement Strategies on Privacy Policies. 68-95
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.