


default search action
International Journal of Information Security and Privacy, Volume 1
Volume 1, Number 1, 2007
- Stephen J. H. Yang
, Blue C. W. Lan, James S. F. Hsieh, Jen-Yao Chung:
Trustworthy Web Services: An Experience-Based Model for Trustworthiness Evaluation. 1-17 - Bhavani Thuraisingham, Natasha Tsybulnik, Ashraful Alam:
Administering the Semantic Web: Confidentiality, Privacy, and Trust Management. 18-34 - Song Han, Vidyasagar M. Potdar, Elizabeth Chang
, Tharam S. Dillon:
Privacy-Preserving Transactions Protocol Using Mobile Agents with Mutual Authentication. 35-46 - Lixin Fu, Hamid R. Nemati, Fereidoon Sadri:
Privacy-Preserving Data Mining and the Need for Confluence of Research and Practice. 47-63 - Nicholas C. Romano Jr., Jerry Fjermestad:
Privacy and Security in the Age of Electronic Customer Relationship Management. 65-86
Volume 1, Number 2, 2007
- Dieter Bartmann, Idir Bakdi, Michael Achatz:
On the Design of an Authentication System Based on Keystroke Dynamics Using a Predefined Input Text. 1-12 - Stanley R. M. Oliveira, Osmar R. Zaïane:
Privacy-Preserving Clustering to Uphold Business Collaboration: A Dimensionality Reduction Based Transformation Approach. 13-36 - Kenneth J. Knapp, Thomas E. Marshall, R. Kelly Rainer Jr., F. Nelson Ford:
Information Security Effectiveness: Conceptualization and Validation of a Theory. 37-60 - Joseph A. Cazier
, E. Vance Wilson
, B. Dawn Medlin:
The Role of Privacy Risk in IT Acceptance: An Empirical Study. 61-73 - Thomas P. Van Dyke:
Ignorance is Bliss: The Effect of Increased Knowledge on Privacy Concerns and Internet Shopping Site Personalization Preferences. 74-92
Volume 1, Number 3, 2007
- Geoff Skinner
, Elizabeth Chang
:
A Projection of the Future Effects of Quantum Computation on Information Privacy. 1-12 - Hamid Jahankhani, Shantha Fernando
, Mathews Z. Nkhoma, Haralambos Mouratidis:
Information Systems Security: Cases of Network Administrator Threats. 13-25 - Vishal Vatsa, Shamik Sural
, Arun K. Majumdar:
A Rule-Based and Game-Theoretic Approach to Online Credit Card Fraud Detection. 26-46 - Xin Luo, Teik Guan Tan:
Defeating Active Phishing Attacks for Web-Based Transactions. 47-60 - Latha Parameswaran, K. Anbumani:
A Semi-fragile Image Watermarking using Wavelet Inter Coefficient Relations. 61-75
Volume 1, Number 4, 2007
- Almut Herzog, Nahid Shahmehri, Claudiu Duma:
An Ontology of Information Security. 1-23 - Amr Ali Eldin
, René W. Wagenaar:
Towards Autonomous User Privacy Control. 24-46 - Mohammad M. Masud, Latifur Khan
, Bhavani Thuraisingham:
E-Mail Worm Detection Using Data Mining. 47-61 - Norman Pendegraft, Mark Rounds:
A Simulation Model of Information Systems Security. 62-74 - Kirk P. Arnett, Mark B. Schmidt, Allen C. Johnston, Jongki Kim, Ha Jin Hwang
:
Rootkits and What we Know: Assessing US and Korean Knowledge and Perceptions. 75-86

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.