Content
April 2008, Volume 2, Issue 2
- 31-45 Trust-Based Usage Control in Collaborative Environment
by Li Yang & Chang Phuong & Amy Novobilski & Raimund K. Ege - 46-69 Spam Classification Based on E-Mail Path Analysis
by Srikanth Palla & Ram Dantu & João W. Cangussu - 70-82 Laws and Regulations Dealing with Information Security and Privacy: An Investigative Study
by John A. Cassini & B.Dawn Medlin & Adriana Romaniello
January 2008, Volume 2, Issue 1
- 1-25 SEACON: An Integrated Approach to the Analysis and Design of Secure Enterprise Architecture-Based Computer Networks
by Surya B. Yadav - 26-41 Life Cycle Pattern Study of Malicious Codes
by June Wei & Randall C. Reid & Hongmei Zhang - 42-53 An Empirical Investigation of an Individual's Perceived Need for Privacy and Security
by Taner Pirim & Tabitha James & Katherine Boswell & Brian Reithel & Reza Barkhi - 54-79 VIPSEC: Virtualized and Pluggable Security Services Architecture for Grids
by Syed Naqvi - 80-90 Computer Security Practices and Perceptions of the Next Generation of Corporate Computer Use
by S.E. Kruck & Faye P. Teer
October 2007, Volume 1, Issue 4
- 1-23 An Ontology of Information Security
by Almut Herzog & Nahid Shahmehri & Claudiu Duma - 24-46 Towards Autonomous User Privacy Control
by Amr Ali Eldin & Rene Wagenaar - 47-61 E-Mail Worm Detection Using Data Mining
by Mohammad M. Masud & Latifur Khan & Bhavani Thuraisingham - 62-74 A Simulation Model of Information Systems Security
by Norman Pendegraft & Mark Rounds - 75-86 Rootkits and What we Know: Assessing US and Korean Knowledge and Perceptions
by Kirk P. Arnett & Mark B. Schmidt & Allen C. Johnston & Jongki Kim & Hajin Hwang
July 2007, Volume 1, Issue 3
- 1-12 A Projection of the Future Effects of Quantum Computation on Information Privacy
by Geoff Skinner & Elizabeth Chang - 13-25 Information Systems Security: Cases of Network Administrator Threats
by Hamid Jahankhani & Shantha Fernando & Mathews Z. Nkhoma & Haralambos Mouratidis - 26-46 A Rule-Based and Game-Theoretic Approach to Online Credit Card Fraud Detection
by Vishal Vatsa & Shamik Sural & A. K. Majumdar - 47-60 Defeating Active Phishing Attacks for Web-Based Transactions
by Xin Luo & Tan Teik Guan - 61-75 A Semi-fragile Image Watermarking using Wavelet Inter Coefficient Relations
by Latha Parameswaran & K. Anbumani
April 2007, Volume 1, Issue 2
- 1-12 On the Design of an Authentication System Based on Keystroke Dynamics Using a Predefined Input Text
by Dieter Bartmann & Idir Bakdi & Michael Achatz - 13-36 Privacy-Preserving Clustering to Uphold Business Collaboration: A Dimensionality Reduction Based Transformation Approach
by Stanley R.M. Oliveira & Osmar R. Zaïane - 37-60 Information Security Effectiveness: Conceptualization and Validation of a Theory
by Kenneth J. Knapp & Thomas E. Marshall & R. Kelly Rainer Jr. & F. Nelson Ford - 61-73 The Role of Privacy Risk in IT Acceptance: An Empirical Study
by Joseph A. Cazier & E. Vance Wilson & B. Dawn Medlin - 74-92 Ignorance is Bliss: The Effect of Increased Knowledge on Privacy Concerns and Internet Shopping Site Personalization Preferences
by Thomas P. Van Dyke
January 2007, Volume 1, Issue 1
- 1-17 Trustworthy Web Services: An Experience-Based Model for Trustworthiness Evaluation
by Stephen J.H. Yang & Blue C.W. Lan & James S.F. Hsieh & Jen-Yao Chung - 18-34 Administering the Semantic Web: Confidentiality, Privacy, and Trust Management
by Bhavani Thuraisingham & Natasha Tsybulnik & Ashraful Alam - 35-46 Privacy-Preserving Transactions Protocol Using Mobile Agents with Mutual Authentication
by Song Han & Vidyasagar Potdar & Elizabeth Chang & Tharam Dillon - 47-63 Privacy-Preserving Data Mining and the Need for Confluence of Research and Practice
by Lixin Fu & Hamid Nemati & Fereidoon Sadri - 65-86 Privacy and Security in the Age of Electronic Customer Relationship Management
by Nicholas C. Romano Jr. & Jerry Fjermestad