Journal: IJISP

Volume 3, Issue 4

1 -- 17Madhu Ahluwalia, Aryya Gangopadhyay, Zhiyuan Chen. Preserving Privacy in Mining Quantitative Associations Rules
18 -- 28Hamidreza Amouzegar, Mohammad Jafar Tarokh, Anahita Naghilouye Hidaji. A New Soa Security Model to Protect Against Web Competitive Intelligence Attacks by Software Agents
29 -- 42Xunhua Wang, Hua Lin. PAKE on the Web
43 -- 67Wasim A. Al-Hamdani. Three Models to Measure Information Security Compliance
68 -- 95Ian Reay, Patricia Beatty, Scott Dick, James Miller. Do You Know Where Your Data Is? A Study of the Effect of Enforcement Strategies on Privacy Policies

Volume 3, Issue 3

1 -- 13Lei Chen, Wen-Chen Hu, Ming Yang, Lei Zhang. Security and Privacy Issues in Secure E-Mail Standards and Services
14 -- 36Dulal C. Kar, Hung L. Ngo, Geetha Sanapala. Applied Cryptography for Security and Privacy in Wireless Sensor Networks
37 -- 54Ming Yang, Monica Trifas, Guillermo A. Francia III, Lei Chen. Cryptographic and Steganographic Approaches to Ensure Multimedia Information Security and Privacy
55 -- 75Ramakrishna Thurimella, William Mitchell. Cloak and Dagger: Man-In-The-Middle and Other Insidious Attacks
76 -- 106Harkeerat Bedi, Li Yang. Fair Electronic Exchange Based on Fingerprint Biometrics
107 -- 122Feng Zhu, Wei Zhu. Secure and Private Service Discovery in Pervasive Computing Environments

Volume 3, Issue 2

1 -- 9Virginia Franke Kleist, Bonnie Morris, James W. Denton. Information Systems Security Assurance Management at Municipal Software Solutions, Inc
10 -- 41Alex Kosachev, Hamid R. Nemati. A Chronicle of a Journey: An E-Mail Bounce Back System
42 -- 53James Suleiman, Terry Huston. Data Privacy and Security: HIPAA and Small Business Compliance
54 -- 67Benjamin Ngugi, Gina Vega, Glenn S. Dardick. PCI Compliance: Overcoming the Challenges
68 -- 83Princely Ifinedo. Information Technology Security Concerns in Global Financial Services Institutions: Do Socio-Economic Factors Differentiate Perceptions?
84 -- 89Kirk P. Arnett, Gary F. Templeton, David A. Vance. Information Security by Words Alone: The Case for Strong Security Policies
90 -- 104Yong Lu. The Social Organization of a Criminal Hacker Network: A Case Study

Volume 3, Issue 1

1 -- 10Hui-min Ye, Sushil K. Sharma, Huinan Xu. Re-Evaluation of On-Line Hot Topic Discovery Model
11 -- 29Lee Novakovic, Tanya J. McGill, Michael W. Dixon. Understanding User Behavior towards Passwords through Acceptance and Use Modelling
30 -- 44Joanne H. Pratt, Sue Conger. Without Permission: Privacy on the Line
45 -- 64Hamid R. Nemati, Thomas P. Van Dyke. Do Privacy Statements Really Work? The Effect of Privacy Statements and Fair Information Practices on Trust and Perceived Risk in E-Commerce
65 -- 72Kent D. Boklan. Large Key Sizes and the Security of Password-Based Cryptography