Content
October 2008, Volume 2, Issue 4
- 91-109 Will it be Disclosure or Fabrication of Personal Information? An Examination of Persuasion Strategies on Prospective Employees
by Xun Li & Radhika Santhanam
July 2008, Volume 2, Issue 3
- 1-17 The Impact of Privacy Legislation on Patient Care
by Jeff Barnett - 18-27 Using Statistical Texture Analysis for Medical Image Tamper Proofing
by Samia Boucherkha & Mohamed Benmohamed - 28-44 A Privacy Protection Model for Patient Data with Multiple Sensitive Attributes
by Tamas S. Gal & Zhiyuan Chen & Aryya Gangopadhyay - 45-54 Electronic Medical Records, HIPAA, and Patient Privacy
by Jingquan Li & Michael J. Shaw - 55-70 Protecting Patient Information in Outsourced Telehealth Services: Bolting on Security when it cannot be Baked in
by Patricia Y. Logan & Debra Noles - 71-83 Analyzing the Vulnerability of U.S. Hospitals to Social Engineering Attacks: How Many of Your Employees Would Share Their Password?
by B. Dawn Medlin & Joseph A. Cazier & Daniel P. Foulk - 84-97 The Influence of Media Trust and Internet Trust on Privacy-Risking Uses of E-Health
by E. Vance Wilson & David D. Dobrzykowski & Joseph A. Cazier
April 2008, Volume 2, Issue 2
- 1-13 Memory-Based Antiforensic Tools and Techniques
by Hamid Jahankhani & Elidon Beqiri - 14-30 A Secure and Trustful E-Ordering Architecture (TOES) for Small and Medium Size Enterprises (SEMs)
by Spyridon Papastergiou & Despina Polemi - 31-45 Trust-Based Usage Control in Collaborative Environment
by Li Yang & Chang Phuong & Amy Novobilski & Raimund K. Ege - 46-69 Spam Classification Based on E-Mail Path Analysis
by Srikanth Palla & Ram Dantu & João W. Cangussu - 70-82 Laws and Regulations Dealing with Information Security and Privacy: An Investigative Study
by John A. Cassini & B.Dawn Medlin & Adriana Romaniello
January 2008, Volume 2, Issue 1
- 1-25 SEACON: An Integrated Approach to the Analysis and Design of Secure Enterprise Architecture-Based Computer Networks
by Surya B. Yadav - 26-41 Life Cycle Pattern Study of Malicious Codes
by June Wei & Randall C. Reid & Hongmei Zhang - 42-53 An Empirical Investigation of an Individual's Perceived Need for Privacy and Security
by Taner Pirim & Tabitha James & Katherine Boswell & Brian Reithel & Reza Barkhi - 54-79 VIPSEC: Virtualized and Pluggable Security Services Architecture for Grids
by Syed Naqvi - 80-90 Computer Security Practices and Perceptions of the Next Generation of Corporate Computer Use
by S.E. Kruck & Faye P. Teer
October 2007, Volume 1, Issue 4
- 1-23 An Ontology of Information Security
by Almut Herzog & Nahid Shahmehri & Claudiu Duma - 24-46 Towards Autonomous User Privacy Control
by Amr Ali Eldin & Rene Wagenaar - 47-61 E-Mail Worm Detection Using Data Mining
by Mohammad M. Masud & Latifur Khan & Bhavani Thuraisingham - 62-74 A Simulation Model of Information Systems Security
by Norman Pendegraft & Mark Rounds - 75-86 Rootkits and What we Know: Assessing US and Korean Knowledge and Perceptions
by Kirk P. Arnett & Mark B. Schmidt & Allen C. Johnston & Jongki Kim & Hajin Hwang
July 2007, Volume 1, Issue 3
- 1-12 A Projection of the Future Effects of Quantum Computation on Information Privacy
by Geoff Skinner & Elizabeth Chang - 13-25 Information Systems Security: Cases of Network Administrator Threats
by Hamid Jahankhani & Shantha Fernando & Mathews Z. Nkhoma & Haralambos Mouratidis - 26-46 A Rule-Based and Game-Theoretic Approach to Online Credit Card Fraud Detection
by Vishal Vatsa & Shamik Sural & A. K. Majumdar - 47-60 Defeating Active Phishing Attacks for Web-Based Transactions
by Xin Luo & Tan Teik Guan - 61-75 A Semi-fragile Image Watermarking using Wavelet Inter Coefficient Relations
by Latha Parameswaran & K. Anbumani
April 2007, Volume 1, Issue 2
- 1-12 On the Design of an Authentication System Based on Keystroke Dynamics Using a Predefined Input Text
by Dieter Bartmann & Idir Bakdi & Michael Achatz - 13-36 Privacy-Preserving Clustering to Uphold Business Collaboration: A Dimensionality Reduction Based Transformation Approach
by Stanley R.M. Oliveira & Osmar R. Zaïane - 37-60 Information Security Effectiveness: Conceptualization and Validation of a Theory
by Kenneth J. Knapp & Thomas E. Marshall & R. Kelly Rainer Jr. & F. Nelson Ford - 61-73 The Role of Privacy Risk in IT Acceptance: An Empirical Study
by Joseph A. Cazier & E. Vance Wilson & B. Dawn Medlin - 74-92 Ignorance is Bliss: The Effect of Increased Knowledge on Privacy Concerns and Internet Shopping Site Personalization Preferences
by Thomas P. Van Dyke
January 2007, Volume 1, Issue 1
- 1-17 Trustworthy Web Services: An Experience-Based Model for Trustworthiness Evaluation
by Stephen J.H. Yang & Blue C.W. Lan & James S.F. Hsieh & Jen-Yao Chung - 18-34 Administering the Semantic Web: Confidentiality, Privacy, and Trust Management
by Bhavani Thuraisingham & Natasha Tsybulnik & Ashraful Alam - 35-46 Privacy-Preserving Transactions Protocol Using Mobile Agents with Mutual Authentication
by Song Han & Vidyasagar Potdar & Elizabeth Chang & Tharam Dillon - 47-63 Privacy-Preserving Data Mining and the Need for Confluence of Research and Practice
by Lixin Fu & Hamid Nemati & Fereidoon Sadri - 65-86 Privacy and Security in the Age of Electronic Customer Relationship Management
by Nicholas C. Romano Jr. & Jerry Fjermestad