Content
April 2009, Volume 5, Issue 2
- 1-2 IT Security Perceptions & Tools
by Chuleeporn Changchit - 3-26 Examining the Impact of E-privacy Risk Concerns on Citizens’ Intentions to Use E-government Services: An Oman Perspective
by Dhiyab Al Abri & Tanya McGill & Michael Dixon - 27-41 Introducing the Information Technology Security Essential Body of Knowledge Framework
by Wm. Arthur Conklin & Alexander McLeod - 42-64 Explorative Assessment of Internet Hacking: An Agent-Based Modeling Approach
by Zaiyong Tang & Kallol Bagchi & Anurag Jain - 65-66 Interview with: Ravi Pakala Manager, FIS (Fidelity National Information Systems)
by Choton Basu - 67-68 The Big Switch: Rewiring the World, from Edison to Google
by L. Roger Yin
January 2009, Volume 5, Issue 1
- 1-2 Protecting Information
by Chuleeporn Changchit - 3-27 Business and Security Executives Views of Information Security Investment Drivers: Results from a Delphi Study
by Alice M. Johnson - 28-48 Development of a Mobile Commerce Security Analysis Method
by June Wei & Ant Ozok - 49-77 Information Protection at Telecommunications Firms: Human Resource Management Strategies and their Impact on Organizational Justice
by William H. Ross & Christopher J. Meyer & Jeng-Chung V. Chen & Paul Keaton - 78-80 Interview with: Anne Scrivener Agee Vice Provost for IT and CIO, University of Massachusetts - Boston On Security and Privacy Issues facing the University
by Alberta Tai & R. Ayyagari - 81-82 Online Consumer Protection: Theories of Human Relativism
by Chuleeporn Changchit
October 2008, Volume 4, Issue 4
- 1-2 Security Protection and Management
by Chuleeporn Changchit - 3-20 An Empirical Investigation of Factors Influencing Information Security Behavior
by Sunil Hazari & William Hargrave & Beth Clenney - 21-44 A Distributed Defensive Architecture for DoS/DDoS Attacks
by S. Malliga & A. Tamilarasi - 45-59 An Empirical Assessment of Factors Impeding Effective Password Management
by Hennie Kruger & Tjaart Steyn & B. Dawn Medlin & Lynette Drevin - 60-63 Interview with: Meng Chow Kang, CISSP, CISA Convener, ISO/IEC JTC 1/SC 27/WG 4-Security Controls and Services Standards Working Group
by Kian Kim Lim - 64-65 CyberRegs - A Business Guide to Web Property, Privacy, and Patents
by James K. Fugate
July 2008, Volume 4, Issue 3
- 1-2 Data Protection and Privacy Issue
by Chuleeporn Changchit - 3-15 Consumer’s PCs: A Study of Hard Drive Forensics, Data Recovery, and Exploitation
by B. Dawn Medlin & Joseph A. Cazier & Robert M. Weaver - 16-35 Prime III: Defense-in-Depth Approach to Electronic Voting
by Juan E. Gilbert & Jonathan MacDonald & Raquel Hill & Derek T. Sanders & Idongesit Mkpong-Ruffin & E. Vincent Cross & Ken Rouse & Jerome McClendon & Gregory Rogers - 36-62 The Role of Emotions in Shaping Consumers’ Privacy Beliefs about Unfamiliar Online Vendors
by Han Li & Rathindra Sarathy & Jie Zhang - 63-65 Interview with: Andrew Colarik, PhD, MBA Information Security Consultant, Speaker, Author, and Inventor
by Choton Basu - 66-67 Born Digital - Understanding the First Generation of Digital Natives
by Choton Basu
April 2008, Volume 4, Issue 2
- 1-2 Threat, Authentication, and Privacy
by Changchit Chuleeporn - 3-22 Misuse Cases for Identifying System Dependability Threats
by Sindre Guttorm & Opdahl Andreas L. - 23-39 A Two-Phase Authentication Protocol Using the Cell Phone as a Token
by Adams Carl & Dimitriou Alexandros - 40-54 SVDC: Preserving Privacy in Clustering using Singular Value Decomposition
by Rajavel Maheswari & Karuppuswamy Duraiswamy - 55-61 Interview with: Alan T. Lord, Ernst and Young Professor of Accounting and Director Fulbright Scholar, Master of Accountancy Program, Bowling Green State University, Bowling Green Ohio
by Valrie Chambers - 62-63 Security Metrics - Replacing Fear, Uncertainty, and Doubt
by Tim Klaus
January 2008, Volume 4, Issue 1
- 1-2 System Privacy and Protection
by Chuleeporn Changchit - 3-20 Responding to Critical Infrastructure Threats of Reliability and Security: Economic, Organizational and Technical Perspectives for a Next Generation US Electric Grid
by Elizabeth White Baker - 21-41 Managing Anti-Circumvention Technology for Digital Content
by Taeha Kim & Youngshin Kim & Alex Talalayevsky - 42-60 An Empirical Investigation on Customer’s Privacy Perceptions, Trust and Security Awareness in E-commerce Environment
by Anil Gurung & Xin Luo & M.K Raja - 61-63 Interview with: Peter B. McCarthy, Assistant Secretary for Management and CFO United States Department of the Treasury http://www.ustreas.gov/
by Nathaniel J. Melby - 64-65 Management of Information Security
by Joseph S. Mollick
October 2007, Volume 3, Issue 4
- 1-2 Intrusion and Hacking
by Chuleeporn Changchit - 3-18 Profiling User Behavior for Intrusion Detection Using Item Response Modeling
by Yun Wang & Nathaniel J. Melby & Inyoung Kim - 19-31 Intrusion Detection Management System for eCommerce Security
by Jorge Marx Gómez & Jens Lichtenberg - 33-52 Illegal Computer Hacking: An Assessment of Factors that Encourage and Deter the Behavior
by Randall Young & Lixuan Zhang - 53-54 Interview with: Damani Short, CIO United States Olympic Committee http://www.usoc.org/
by Choton Basu - 55-56 Computer Privacy Annoyances — How to Avoid the Most Annoying Invasions of Your Personal and Online Privacy
by Robert Cutshall
July 2007, Volume 3, Issue 3
- 1-2 Information and Security Concern
by Chuleeporn Changchit - 3-24 Looking for Love in All the Wrong Places: A Security Case Study on Online Identity Theft
by Doug White & Alan Rea - 29-44 Exoinformation Space Audits: An Information Richness View of Privacy and Security Obligations
by Carl Adams & Vasilios Katos - 45-68 Knowledge Sharing in Law Enforcement: A Case Study
by Rahul Bhaskar & Yi Zhang - 69-70 Interview with: A.G. “Fred” Altomare, Partner 1:1 Corporation Milpitas, CA 95035 http://www. 1to1corp.com/index.html
by Choton Basu - 71-72 Geekonomics - The Real Cost of Insecure Software
by David Rice & Chaton Basu
April 2007, Volume 3, Issue 2
- 1-2 Trusting Technology Interaction
by Chuleeporn Changchit - 3-17 Understanding eTrust
by Nabil Tamimi & Rose Sebastianelli - 18-36 A Cross-Cultural Analysis of Privacy Notices of the Global 2000
by Xiaoni Zhang & Sakaguchi Toru & Max Kennedy - 37-58 An Architecture for Automatic and Adaptive Defense
by Ram Dantu & Joao W. Cangussu - 59-60 Interview with: Peter Zaballos, Vice President Frazier Technology Ventures Seattle, WA http://www.fraziertechnology.com/index.htm
by Choton Basy - 61-62 How to Be Invisible
by J.J. Luna & Choton Basu
January 2007, Volume 3, Issue 1
- 1-2 Wide Spectrum of Articles
by Basu Choton - 3-29 A Theoretical Model to Deliver Value in Electronic Commerce
by Steven A. Brown - 30-46 An Investigative Study: Health Care Workers as Security Threat Suppliers
by B. Dawn Medlin & Adriana Romaniello - 47-62 A Block Cipher Based Upon Permutation, Substitution and Iteration
by Udaya S. Kumar & V.U.K. Sastry & Vinaya A. Babu - 63-64 Interview with: Hemadri Gurramkonda Director, Centrica Informatics
by Choton Basu - 65-66 Cybercrime: Digital Cops in a Networked Environment
by Jack Balkin & James Grimmelmann & Eddan Katz & Nimrod Kozlovski & Shlomit Wagman & Tal Zarsky & John Chenoweth
October 2006, Volume 2, Issue 4
- 1-2 Asking the right question?
by John Chenoweth - 3-29 The Efficacy of Emphasizing a Legal System Approach to Computer Security
by Gerald V. Post & Albert Kagan - 30-44 Security Service Packages: Partitioning the Security Space
by Donald G. Marks & John Hale - 45-59 Behavioral Marketing: Security and Privacy Issues
by Brian Dobosz & Kathleen Green & Guy Sisler - 60-62 Interview with: Robert Voliva and Jeremy Fields BankingMv Wav.com IT Developers and Analysts Fort Atkinson, WI
by Choton Basu & Jeremy Fields - 63-64 I. T. Wars Managing the Business-Technology Weave in the New Millennium by David Scott
by Roger Yin
July 2006, Volume 2, Issue 3
- 1-3 Election Systems, Financial Risks and the Chinese Firewall
by Suvojit Choton Basu - 3-24 An Analysis of Security Threats of Electronic Election Systems
by C.H. Cheng & K.F. Wong - 21-41 Online Security Solutions in the Financial Industry based on a Commercial Risk Assessment Matrix
by Jorge Marx Gómez & Stephan Paxmann - 42-61 The Great Chinese Firewall: A Safeguard or Stop Sign?
by Tierney Bensen & Patrick Henze & Geoff Farnsworth - 62-64 Sindey Schueler-Platz State Administrator, Kansas Bureau of Investigation
by Suvojit Choton Basu - 65-67 Book Review: Public Information Technolow and E-Governance: Managing e Virtual State
by Choton Basu
April 2006, Volume 2, Issue 2
- 1-2 Frameworks and Proposed Models
by Choton S. Basu & John Chenoweth - 3-24 A Research Framework for Information Systems Security
by Sherrie Cannoy & Prashant C. Palvia & Richard Schilhavy - 30-50 e-Government - A WebServices Framework
by Kam Fai Wong & Matthew Ka Wing Tam & Chun Hung Cheng - 51-58 Developing Trust in M-commerce: A Vendor and Certificate Authority Model
by Nelson Stewart & Jared Spencer & Nathaniel Melby - 59-61 Interview with: Ken M. Shaurette, CISSP, CISA, CISM Engagement Manager Jefferson Wells, Inc Madison, WI
by Blake Penn - 62-64 Book Review: Who Controls the Internet: Illusions of a Borderless World
by John D. Chenoweth
January 2006, Volume 2, Issue 1
- 1-2 Information Security: Risks and Solutions
by Linda Reid - 3-15 Customer Information: Protecting the Organization’s Most Critical Asset from Misappropriation and Identity Theft
by Raymond J. Elson & Rey LeClerc - 16-28 An XML-Based Intelligent Agent Protocol Design Framework for Individualized Privacy Postures within Trusted Network Environments
by Merrill Warkentin & Allen C. Johnston - 29-45 Do Concerns about Error in Data and Access to Data Affect Students’ Feeling of Alienation?
by Joseph S. Mollick - 47-56 Amanda M. Hubbard, J.D. Fulbright Scholar Former Trial Attorney, Computer Crime and Intellectual Property Section, U.S. Department of Justice
by Linda A. Reid - 57-59 Book Review: Information Ethics: Privacv, Propem, and Power
by John D. Chenoweth
October 2005, Volume 1, Issue 4
- 1-2 On Issues of Computer Crimes, Online Security and Legal Resources
by S. Choton Basu - 3-21 The Digital Persona and Trust Bank: A Privacy Management Framework
by Sree Nilakanta & Kevin Scheibe - 22-32 Security Breaches, Privacy Intrusions, and Reporting of Computer Crimes
by G. Keith Roberts - 33-52 An Investigative Study: Consumers Password Choices on an E-Commerce Site
by B. Dawn Medlin & Joseph A. Cazier - 53-59 Amanda M. Hubbard, J.D., FUIPSight Scholar former Trial Attorney, Computer Crime and Intellectual Property Section, U.S. Department of Justice
by Linda A. Reid - 60-62 Book Review: Social, Ethical and Policy Implication of Information Technology by Linda Brennan and Victoria Johnson, Information Science Publishing, 2004
by William L. Dougan
July 2005, Volume 1, Issue 3
- 1-2 Issues of Coordination and Compliance in Complex Systems
by John D. Chenoweth - 3-17 A Proposed Integrated Framework for Coordinating Computer Security Incident Response Team
by Rahul Bhaskar - 18-41 Perceptions of Information Security in the Workplace: Linking Information Security Climate to Compliant Behavior
by Mark Chan & Irene Woon & Atreyi Kankanhalli - 42-56 Privacy Preserving Combinatorial Reverse Auction Protocol for a Market-Oriented Grid Based on Secure Group Communication
by Sumit Chakraborty & Sushil Kumar Sharma - 57-58 Kelly Hansen, CEO, Neohapsis Inc
by John D. Chenoweth - 59-60 Book Review: Secrets & Lies: Didtal Security in a Networked World Bruce Schneier, Wiley Publishing, 2000
by John D. Chenoweth
April 2005, Volume 1, Issue 2
- 1-3 On issues of Convenience, Privacy and Security
by Suvojit Choton Basu - 4-28 Mobile Payment Adoption in the US: A Cross-industry, Crossplatform Solution
by Sunil G. Dewan & Lei-da Chen - 29-48 Secure Web service-based resource sharing in ERP Networks
by Nico Brehm & Jorge Marx Gómez - 49-66 Dimensions of Network Security Planning For Web Services
by Richard S. Swart & Bryan A. Marshall & Matthew E. Harris & Karen A. Forcht & David Olsen - 67-68 Marilyn Wood, Security Officer Jim Amundson, Server Administration & Network Solutions Department of Agriculture, Trade and Consumer Protection (DATCP - Wisconsin)
by Suvojit Choton Basu - 69-70 Book Review: The Art of Deception: Controlling the Human Element of Security
by John D. Chenoweth
January 2005, Volume 1, Issue 1
- 1-3 Toward a Long Term Discourse on Privacy, Security, Legal and Ethical Issues of Information
by Suvojit Choton Basu - 1-45 Computer Security: 20 things Every Employee Should Know. New York
by John D. Chenoweth - 4-9 An Interview with Ian Browde Director of Strategy and Business Development, Enterprise Solutions Division, Nokia, Inc
by Carol Sánchez - 10-26 Information Assurance Technical Framework and End User Information Ownership: A Critical Analysis
by Michael S. Korotka & L. Roger Yin & Suvojit Choton Basu - 27-39 A Holistic Perspective on the Science of Computer Forensics
by Matthew J. Stippich & Christopher J. Stippich - 40-42 An Interview with Sindey Schueler-Platz State Administrator, Kansas Bureau of Investigation
by Suvojit Choton Basu - 43-44 Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management
by John D. Chenoweth