Journal: IJISP

Volume 1, Issue 4

1 -- 23Almut Herzog, Nahid Shahmehri, Claudiu Duma. An Ontology of Information Security
24 -- 46Amr Ali Eldin, René W. Wagenaar. Towards Autonomous User Privacy Control
47 -- 61Mohammad M. Masud, Latifur Khan, Bhavani M. Thuraisingham. E-Mail Worm Detection Using Data Mining
62 -- 74Norman Pendegraft, Mark Rounds. A Simulation Model of Information Systems Security
75 -- 86Kirk P. Arnett, Mark B. Schmidt, Allen C. Johnston, Jongki Kim, Hajin Hwang. Rootkits and What we Know: Assessing US and Korean Knowledge and Perceptions

Volume 1, Issue 3

1 -- 12Geoff Skinner, Elizabeth Chang. A Projection of the Future Effects of Quantum Computation on Information Privacy
13 -- 25Hamid Jahankhani, Shantha Fernando, Mathews Z. Nkhoma, Haralambos Mouratidis. Information Systems Security: Cases of Network Administrator Threats
26 -- 46Vishal Vatsa, Shamik Sural, Arun K. Majumdar. A Rule-Based and Game-Theoretic Approach to Online Credit Card Fraud Detection
47 -- 60Xin Luo, Tan Teik Guan. Defeating Active Phishing Attacks for Web-Based Transactions
61 -- 75Latha Parameswaran, K. Anbumani. A Semi-fragile Image Watermarking using Wavelet Inter Coefficient Relations

Volume 1, Issue 2

1 -- 12Dieter Bartmann, Idir Bakdi, Michael Achatz. On the Design of an Authentication System Based on Keystroke Dynamics Using a Predefined Input Text
13 -- 36Stanley R. M. Oliveira, Osmar R. Zaïane. Privacy-Preserving Clustering to Uphold Business Collaboration: A Dimensionality Reduction Based Transformation Approach
37 -- 60Kenneth J. Knapp, Thomas E. Marshall, R. Kelly Rainer Jr., F. Nelson Ford. Information Security Effectiveness: Conceptualization and Validation of a Theory
61 -- 73Joseph A. Cazier, E. Vance Wilson, B. Dawn Medlin. The Role of Privacy Risk in IT Acceptance: An Empirical Study
74 -- 92Thomas P. Van Dyke. Ignorance is Bliss: The Effect of Increased Knowledge on Privacy Concerns and Internet Shopping Site Personalization Preferences

Volume 1, Issue 1

1 -- 17Stephen J. H. Yang, Blue C. W. Lan, James S. F. Hsieh, Jen-Yao Chung. Trustworthy Web Services: An Experience-Based Model for Trustworthiness Evaluation
18 -- 34Bhavani M. Thuraisingham, Natasha Tsybulnik, Ashraful Alam. Administering the Semantic Web: Confidentiality, Privacy, and Trust Management
35 -- 46Song Han, Vidyasagar Potdar, Elizabeth Chang, Tharam S. Dillon. Privacy-Preserving Transactions Protocol Using Mobile Agents with Mutual Authentication
47 -- 63Lixin Fu, Hamid Nemati, Fereidoon Sadri. Privacy-Preserving Data Mining and the Need for Confluence of Research and Practice
65 -- 86Nicholas C. Romano Jr., Jerry Fjermestad. Privacy and Security in the Age of Electronic Customer Relationship Management