Journal: IJISP

Volume 2, Issue 4

1 -- 21Zude Li, Xiaojun Ye. On Access-Unrestricted Data Anonymity and Privacy Inference Disclosure Control
22 -- 53Barbara Carminati, Elena Ferrari, Andrea Perego. A Decentralized Security Framework for Web-Based Social Networks
54 -- 66Li Yang, Lu Peng, Balachandran Ramadass. SecCMP: Enhancing Critical Secrets Protection in Chip-Multiprocessors
67 -- 90Bhavani M. Thuraisingham, Yashaswini Harsha Kumar, Latifur Khan. Design and Implementation of a Framework for Assured Information Sharing Across Organizational Boundaries
91 -- 109Xun Li, Radhika Santhanam. Will it be Disclosure or Fabrication of Personal Information? An Examination of Persuasion Strategies on Prospective Employees

Volume 2, Issue 3

1 -- 17Jeff Barnett. The Impact of Privacy Legislation on Patient Care
18 -- 27Samia Boucherkha, Mohamed Benmohamed. Using Statistical Texture Analysis for Medical Image Tamper Proofing
28 -- 44Tamas S. Gal, Zhiyuan Chen, Aryya Gangopadhyay. A Privacy Protection Model for Patient Data with Multiple Sensitive Attributes
45 -- 54Jingquan Li, Michael J. Shaw. Electronic Medical Records, HIPAA, and Patient Privacy
55 -- 70Patricia Y. Logan, Debra Noles. Protecting Patient Information in Outsourced Telehealth Services: Bolting on Security when it cannot be Baked in
71 -- 83B. Dawn Medlin, Joseph A. Cazier, Daniel P. Foulk. Analyzing the Vulnerability of U.S. Hospitals to Social Engineering Attacks: How Many of Your Employees Would Share Their Password?
84 -- 97E. Vance Wilson, David D. Dobrzykowski, Joseph A. Cazier. The Influence of Media Trust and Internet Trust on Privacy-Risking Uses of E-Health

Volume 2, Issue 2

1 -- 13Hamid Jahankhani, Elidon Beqiri. Memory-Based Antiforensic Tools and Techniques
14 -- 30Spyridon Papastergiou, Despina Polemi. A Secure and Trustful E-Ordering Architecture (TOES) for Small and Medium Size Enterprises (SEMs)
31 -- 45Li Yang, Chang Phuong, Amy Novobilski, Raimund K. Ege. Trust-Based Usage Control in Collaborative Environment
46 -- 69Srikanth Palla, Ram Dantu, João W. Cangussu. Spam Classification Based on E-Mail Path Analysis
70 -- 82John A. Cassini, B. Dawn Medlin, Adriana Romaniello. Laws and Regulations Dealing with Information Security and Privacy: An Investigative Study

Volume 2, Issue 1

1 -- 25Surya B. Yadav. SEACON: An Integrated Approach to the Analysis and Design of Secure Enterprise Architecture-Based Computer Networks
26 -- 41June Wei, Randall C. Reid, Hongmei Zhang. Life Cycle Pattern Study of Malicious Codes
42 -- 53Taner Pirim, Tabitha L. James, Katherine Boswell, Brian J. Reithel, Reza Barkhi. An Empirical Investigation of an Individual s Perceived Need for Privacy and Security
54 -- 79Syed Naqvi. VIPSEC: Virtualized and Pluggable Security Services Architecture for Grids
80 -- 90S. E. Kruck, Faye P. Teer. Computer Security Practices and Perceptions of the Next Generation of Corporate Computer Use