Content
October 2017, Volume 13, Issue 4
- 161-163 Editorial Preface
by Chuleeporn Changchit & Kallol Bagchi & Choton Basu - 164-168 Future of privacy and security – the Four Horsemen
by Choton Basu - 169-185 A study of web privacy policies across industries
by Razieh Nokhbeh Zaeem & K. Suzanne Barber - 186-206 Long-term market implications of data breaches, not
by Russell Lange & Eric W. Burger - 207-225 Who uses mobile apps to meet strangers: The roles of core traits and surface characteristics
by Lixuan Zhang & Iryna Pentina & Wendy Fox Kirk - 226-237 RSVP a temporal method for graphical authentication
by Ashley A Cain & Jeremiah D Still - 238-259 Cultural and Generational Influences on Information Privacy Concerns within Online Social Networks: An Empirical Evaluation of the Miltgen and Peyrat-Guillard Model
by Faruk Arslan & Niharika Dayyala - 260-281 Predicting information security policy compliance intentions and behavior for six employee-based risks
by Tatyana Ryutov & Nicole Sintov & Mengtian Zhao & Richard S. John - 282-295 Development of Internet of Things-Related Monitoring Policies
by Gundars Kaupins & Janet Stephens - 296-315 Utilizing normative theories to develop ethical actions for better privacy practices
by Zareef A. Mohammed & Gurvirender P. Tejay & Joseph Squillace - 316-318 Bazzell, M., & Carroll, J. (2016). The Complete Privacy & Security Desk Reference-Volume I Digital. United States of America: CreateSpace Independent Publishing Platform, 478 pp
by Faruk Arslan
July 2017, Volume 13, Issue 3
- 103-103 Privacy protection and adding security strength
by Chuleeporn Changchit & Kallol Bagchi - 104-119 Detecting and preventing inference attacks in online social networks: A data-driven and holistic framework
by Xiaoyun He & Haibing Lu - 120-136 Invasion of privacy by smart meters: An analysis of consumer concerns
by Ziyue Huang & Prashant Palvia - 137-156 Valuing Information Security: A Look at the Influence of User Engagement on Information Security Strength
by Randall J. Boyle & Chandrashekar D. Challa & Jeffrey A. Clements - 157-159 Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy, by Cathy O’Neil
by Faruk Arslan
April 2017, Volume 13, Issue 2
- 49-50 Privacy and Security Concerns with Healthcare Data and Social Media Usage
by Chuleeporn Changchit & Kallol Bagchi - 51-68 Handling confidentiality and privacy on cloud-based health information systems
by Carlos Serrão & Elsa Cardoso - 69-83 The Effect of Procedural and Technological Security Countermeasures on the Propensity to Misuse Medical Data
by Wachiraporn Arunothong & Derek L. Nazareth - 84-96 What Affects Users to Click on Display Ads on Social Media? The Roles of Message Values, Involvement, and Security
by En Mao & Jing Zhang - 97-98 Interview With Lionel Cassin
by Chuleeporn Changchit - 99-102 Security and Privacy in Social Networks, by Yaniv Altshuler, Yuval Elovici, Armin B. Cremers, Nadav Aharony, Alex Pentland
by Faruk Arslan
January 2017, Volume 13, Issue 1
- 1-1 Editorial
by Kallol Bagchi & Chuleeporn Changchit - 2-16 An examination of an e-authentication service as an intervention in e-mail risk perception
by Rui Chen & Jingguo Wang & Tejaswini Herath & H. R. Rao - 17-33 Does privacy matter to millennials? The case for personal cloud
by Murad Moqbel & Valerie Bartelt & Mohammed Al-Suqri & Azzah Al-Maskari - 34-45 Record Re-Identification of Swapped Numerical Microdata
by Krishnamurty Muralidhar - 46-47 Thinking with Data: How to Turn Information into Insights, by Max Shron
by Faruk Arslan
October 2016, Volume 12, Issue 4
- 165-165 Editorial preface
by Kallol Bagchi, Editor in Chief - 166-180 Information privacy and the digital generation gap: An exploratory study
by Ruth Halperin & Yuval Dror - 181-196 Ca-NIDS: A network intrusion detection system using combinatorial algorithm approach
by Olusegun Folorunso & Femi Emmanuel Ayo & Y. E. Babalola - 197-217 Perceived deception: Evaluating source credibility and self-efficacy
by Dustin Ormond & Merrill Warkentin & Allen C. Johnston & Samuel C. Thompson - 218-220 Social Physics: How Good Ideas Spread-The Lessons from a New Science, by Alex Pentland
by Faruk Arslan
July 2016, Volume 12, Issue 3
- 105-106 Social media analytics: Security and privacy issues
by Wingyan Chung - 107-122 A simulation-based approach to predicting influence in social media communities: A case of U.S. border security
by Wingyan Chung - 123-144 The role of personalized services and control: An empirical evaluation of privacy calculus and technology acceptance model in the mobile context
by Zhan Liu & Jialu Shan & Yves Pigneur - 145-159 Personnel security and open source intelligence: Employing social media analytics in pre-employment screening and selection
by Julian M. Montaquila & Cierra N. Godwin - 160-163 Proceedings of The 2015 NSF Workshop on Curricular Development for Computing in Context
by Edgar Gutierrez-Franco & Mario Marin & Luis Rabelo & John Pastrana
April 2016, Volume 12, Issue 2
- 55-55 Editorial preface
by Kallol Bagchi - 56-67 The impact of exposure to news about electronic government surveillance on concerns about government intrusion, privacy self-efficacy, and privacy protective behavior
by Stanislav Mamonov & Marios Koufaris - 68-83 The impact of attitudinal factors on intention to report workplace Internet abuse
by Matt Campbell & Antonis C. Stylianou & Jordan Shropshire - 84-92 Twibel: A matter of Internet privacy
by Raymond Placid & Judy Wynekoop - 93-102 Social media policies in the Department of Defense—Do they address the risk?
by Katherine “Suzy” Cole-Miller & William “Doug” Ward & Ann Fruhling & Kathryn Dempsey Cooper - 103-104 Discovering Computers 2016: Tools, Apps, Devices, and the Impact of Technology, by Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Jennifer T. Campbell, and Mark Frydenburg
by Faruk Arslan
January 2016, Volume 12, Issue 1
- 1-2 Special Issue on Attacks and Distinct Features in Networks
by Dharma P. Agrawal - 3-13 Recent survey of various defense mechanisms against phishing attacks
by Aakanksha Tewari & A. K. Jain & B. B. Gupta - 14-31 Privacy-preserved data publishing of evolving online social networks
by Wei Chang & Jie Wu - 32-54 Mechanism design for Data Replica Placement (DRP) problem in strategic settings
by Minzhe Guo & Prabir Bhattacharya
October 2015, Volume 11, Issue 4
- 187-188 Editorial Preface
by Kallol Bagchi - 189-210 Job Quitters, Information Security Awareness, and Knowledge Management Strategies
by Hongbo Lyu & Zuopeng (Justin) Zhang - 211-227 The Application of Keystroke Analysis for Physical Security: A Field Experiment
by Christopher S. Leberknight & Michael L. Recce - 228-229 Research Essay Editorial
by Gaurav Gupta & Indranil Bose - 230-242 Challenges of Multi-Source Data and Information New Era
by Roberto Mugavero & Federico Benolli & Valentina Sabato - 243-261 Geospatial Intelligence, Technological Development, and Human Interaction
by Roberto Mugavero & Federico Benolli & Valentina Sabato - 262-273 Bioterrorism: New Technologies for Global Emergencies and Public Health
by Roberto Mugavero & Valentina Sabato & Matteo Basso & Wanda D’Amico & Federico Benolli - 274-275 Information Assurance for the Enterprise: A Roadmap to Information Security, by C. Schou and D. Shoemaker
by Adolfo S. Coronado
July 2015, Volume 11, Issue 3
- 139-140 Editorial Preface
by Kallol Bagchi - 141-157 M0Droid: An Android Behavioral-Based Malware Detection Model
by Mohsen Damshenas & Ali Dehghantanha & Kim-Kwang Raymond Choo & Ramlan Mahmud - 158-173 Investigating Factors Influencing Web-Browsing Safety Efficacy (WSE) Among Older Adults
by Victoria Kisekka & Rajarshi Chakraborty & Sharmistha Bagchi-Sen & H. Raghav Rao - 174-181 Information Security: SETA Program Status at Jordanian Universities
by Mohammad S. Eyadat - 182-183 Interview with Allen Hsieh, Business Consultant, China
by Choton Basu - 184-186 Introduction to Computer Security, by M. T. Goodrich and R. Tamassia
by Adolfo S. Coronado
April 2015, Volume 11, Issue 2
- 59-61 Special Issue on Secured Communication in Wireless and Wired Networks
by Dharma P. Agrawal - 62-79 Location Privacy Protection for Smartphone Users Using Quadtree Entropy Maps
by Xiaoen Ju & Kang G. Shin - 80-96 The Human Key: Identification and Authentication in Wearable Devices Using Gait
by Pallavi Meharia & Dharma P. Agrawal - 97-117 Information Theoretic and Statistical Drive Sanitization Models
by Jeffrey Medsger & Avinash Srinivasan & Jie Wu - 118-136 Cross-Site Scripting (XSS) Abuse and Defense: Exploitation on Several Testing Bed Environments and Its Defense
by B. B. Gupta & S. Gupta & S. Gangwar & M. Kumar & P. K. Meena - 137-138 Mining the Social Web: Data Mining Facebook, Twitter, LinkedIn, Google+, Github, and More, by Matthew A. Russell
by Dehghantanha Ali
January 2015, Volume 11, Issue 1
- 1-2 Editorial Preface
by Kallol Bagchi - 3-18 Information Disclosure on a Chinese Social Media Platform
by Lixuan Zhang & Clinton Amos & Iryna Pentina - 19-37 Healthshark: Using Twitter for Situational Awareness in Public Health
by Alana Platt & Levi Citrin & Cynthia Hood - 38-54 Review of the Information Security and Privacy Challenges in Bring Your Own Device (BYOD) Environments
by Abubakar Bello Garba & Jocelyn Armarego & David Murray & William Kenworthy - 55-57 Security Planning & Disaster Recovery, by Eric Maiwald and William Sieglein
by Adolfo S. Coronado
October 2014, Volume 10, Issue 4
- 157-159 Guest Editorial
by Wu He & Xiaohong Yuan - 160-185 A Model of Information Security Awareness for Assessing Information Security Risk for Emerging Technologies
by Roberto J. Mejias & Pierre A. Balthazard - 186-202 Comparing the Mobile Device Security Behavior of College Students and Information Technology Professionals
by Mark A. Harris & Steven Furnell & Karen Patten - 203-224 Organizational Privacy Strategy: Four Quadrants of Strategic Responses to Information Privacy and Security Threats
by Rachida F. Parks & Rolf T. Wigand - 225-235 Altering Security Perceptions Through the Use of Geo-Authentication
by Gongjun Yan & Kenneth Shemroske & Gary Black - 236-238 Data Stewardship: An Actionable Guide to Effective Data Management and Data Governance, by David Plotkin
by Adolfo S. Coronado
July 2014, Volume 10, Issue 3
- 111-112 Editorial Preface
by Kallol Bagchi - 113-137 Social Network Privacy: Trusting Friends
by Gerald V. Post & Suzanne B. Walchli - 138-152 Analysis and Estimation of Expected Cyber-Attack Scenarios and Consequences
by Roberto Mugavero & Valentina Sabato - 153-155 CCNP Security IPS 642-627 Official Cert Guide
by Adolfo S. Coronado
June 2014, Volume 10, Issue 2
- 57-58 Guest Editorial
by Humayun Zafar - 59-70 The Enemy Within the Insider: Detecting the Insider Threat Through Addiction Theory
by Michele Maasberg & Nicole L. Beebe - 71-94 Factors for Measuring Password-Based Authentication Practices
by Herbert J. Mattord & Yair Levy & Steven Furnell - 95-107 Student Perceptions of Computer Use Ethics: A Decade in Comparison
by Michael E. Whitman & Humayun Zafar - 108-109 IT Auditing: Using Controls to Protect Information Assets (1st ed.), by Chris Davis, Mike Schiller, and Kevin Wheeler
by Adolfo S. Coronado
January 2014, Volume 10, Issue 1
- 1-2 Editorial Preface
by Kallol Bagchi - 3-27 Brief Review of Software Security History with an Emphasis on Efforts Focused at Early Stages of the Software Lifecycle
by Spyros T. Halkidis & Alexander Chatzigeorgiou & George Stephanides - 28-43 Information Security in Higher Education: A Neo-Institutional Perspective
by Hwee-Joo Kam & Pairin Katerattanakul - 44-52 Privacy-Preserving Interest Group Formation in Online Social Networks (OSNs) Using Fully Homomorphic Encryption
by Mohammed Kaosar & Quazi Mamun - 53-55 Information Technology Control and Audit (4th ed.) by Sandra Senft,Frederick Gallegos, and Aleksandra Davis
by Adolfo S. Coronado
October 2013, Volume 9, Issue 4
- 1-2 Editorial Preface
by Kallol Bagchi - 3-30 Acquiring Subject Participation for Information Security Survey Research: A Content and Correspondence Analysis Approach
by Alice M. Johnson & Belinda P. Shipps - 31-51 An Empirical Investigation of Privacy Awareness and Concerns on Social Networking Sites
by Sunil Hazari & Cheryl Brown - 52-79 Control-Related Motivations and Information Security Policy Compliance: The Role of Autonomy and Efficacy
by Jeffrey D. Wall & Prashant Palvia & Paul Benjamin Lowry - 80-82 I Know Who You Are and I Saw What You Did: Social Networks and the Death of Privacy
by Sadaf Ashtari
July 2013, Volume 9, Issue 3
- 1-3 Editorial Preface
by Indranil Bose - 4-17 RFID-Based Attack Scenarios in Retailing, Healthcare and Sports
by Wang Suk Suh & Eun Jung Yoon & Selwyn Piramuthu - 18-33 A Framework for Addressing Data Privacy Issues in E-Governance Projects
by Ashish Kumar Jha & Indranil Bose - 34-52 Cybercrime Enforcement Around the Globe
by Yuanrong Hu & Xi Chen & Indranil Bose - 53-55 Expert Opinion Interview with: Edward B.Talbot, Independent Consultant
by Kallol Bagchi - 56-58 Computer Security Fundamentals, Second Edition
by Adolfo S. Coronado
April 2013, Volume 9, Issue 2
- 1-2 Editorial Preface
by Kallol Bagchi - 3-20 Contemporary Threats Countermeasuresi
by Joseph H. Schuessler - 21-39 Crime Toolkits: The Current Threats to Web Applications
by Ammar Alazab & Jemal Abawajy & Michael Hobbs & Ansam Khraisat - 40-59 The Role of Privacy in the Adoption of Location-Based Services
by En Mao & Jing Zhang - 60-61 Expert Opinion Interview with: James Jackson President/COO Slipstream LLC
by Choton Basu - 62-65 Computer Security: Principles and Practice, Second Edition
by Adolfo S. Coronado
January 2013, Volume 9, Issue 1
- 1-2 Editorial Preface
by Peeter Kirs & Godwin Udo - 3-16 Interval Responses for Queries on Confidential Attributes: A Security Evaluation
by Krishnamurty Muralidhar & Rathindra Sarathy - 17-46 Cloud Computing Security Announcements: Assessment of Investors' Reaction
by Srikanth Parameswaran & Srikanth Venkatesan & Manish Gupta - 47-67 Applying Protection Motivation Theory to Information Security Training for College Students
by Peter Meso & Yi Ding & Shuting Xu - 68-69 Expert Opinion Interview with: Satish Kumar Nampally, Senior Manager, Cognizant Technology Solutions
by Choton Basu - 70-72 Principles of Computer Security: CompTIA Security+™
by Adolfo S. Coronado
October 2012, Volume 8, Issue 4
- 1-2 Editorial Preface
by Kallol Bagchi - 3-26 Students Information Security Practices and Awareness
by Ludwig Slusky & Parviz Partow-Navid - 27-55 Stock Market Response to Information Security Breach: A Study Using Firm and Attack Characteristics
by Saini Das & Arunabha Mukhopadhyay & Manoj Anand - 56-78 Enhancing Information Privacy and Data Sharing in a Healthcare IT Firm: The Case of Ricerro Communications
by Wingyan Chung & Lewis Hershey - 79-80 Expert Opinion- Part 4 Interview with: Joseph Neuman CEO GotApps.com
by Choton Basu - 81-84 Corporate Computer and Network Security
by Adolfo S. Coronado
July 2012, Volume 8, Issue 3
- 1-3 Editorial Preface
by Kallol Bagchi - 4-14 Passive Enumeration of Secret Information in LMAP and M2 AP RFID Authentication Protocols
by Selwyn Piramuthu - 15-36 A Model of End Users' Web Threats Information Processing
by Lixuan Zhang & Clinton Amos - 37-67 Analyzing Information Systems Security Research to Find Key Topics, Trends, and Opportunities
by Roger Blake & Ramakrishna Ayyagari - 68-71 Expert Opinion Interview with: Jack Vaughn, Technology Implementation Manager (TIM), College of Business Administration, The University of Texas at El Paso
by Peeter Kirs - 72-73 Business Data Networks and Telecommunications (8th Eds)
by Aurelia Donald
April 2012, Volume 8, Issue 2
- 1-2 Editorial Preface
by Chuleeporn Changchit - 3-17 The Effectiveness of Data Shuffling for Privacy-Preserving Data Mining Applications
by Han Li & Krishnamurty Muralidhar & Rathindra Sarathy - 18-32 Using PRNG Generated Templates to Protect Fingerprint Database
by Qinghai Gao & Kamal Shahrabi - 33-56 An Exploratory Analysis of Data Breaches from 2005-2011: Trends and Insights
by Ramakrishna Ayyagari - 57-60 Expert Opinion – Part 2 Interview with
by Sanjib Sahoo - 61-64 Blind Spot a Leader's Guide to IT-Enabled Business Transformation
by Richard G. Platt
January 2012, Volume 8, Issue 1
- 1-2 Special Issue: Data Privacy, Policies and Frameworks
by Choton Basu - 3-29 Disclosing Personal Data Socially — An Empirical Study on Facebook Users' Privacy Awareness
by Olli Pitkänen & Virpi Kristiina Tuunainen - 30-37 Security Auditing: The Need for Policies and Practices
by Robert A. Robertson - 38-50 Interpreting the Impact of Perceived Privacy and Security Concerns in Patients' Use of Online Health Information Systems
by Paul Ambrose & Choton Basu - 51-55 Expert Opinion — Part 1
by Choton Basu - 56-58 Book Review
by Roberto Vinaja
October 2011, Volume 7, Issue 4
- 1-2 Security Systems Framework, Security-Related Research, Web Threats
by Chuleeporn Changchit - 3-22 A Framework for Enhancing Systems Security
by Srinarayan Sharma & Vijayan Sugumaran - 23-53 Security Risk Management at a Fortune 500 Firm: A Case Study
by Humayun Zafar - 54-69 Towards an Understanding of Web Application Security Threats and Incidents
by Gerhard Steinke & Emanuel Tundrea & Kenmoro Kelly - 70-71 Interview with: Hemadri Naidu Senior Manager at Cap Gemini Sogeti
by Choton Basu - 72-73 Security Risk Management: Building and Information Security Risk
by Pankaj Palvia
July 2011, Volume 7, Issue 3
- 1-2 Trust, Acceptance, and Data Sanitization
by Chuleeporn Changchit - 3-22 Individual Trust and Consumer Risk Perception
by Byung Cho Kim & Lara Khansa & Tabitha James - 23-45 Modeling Security in Acceptance of Electronic Health Record Systems
by Barbara Hewitt & Alexander McLeod - 46-63 Testing Data Sanitization Practices of Retired Drives with The Digital Forensics Data Recovery Project
by Ashley L. Podhradsky & Kevin Streff - 64-66 Interview with: Ntoh O. Etta Director of Strategic Projects & Corporate Security at NetworkSolutions LLC
by Choton Basu - 67-71 Privacy in Context: Technology, Policy, and the Integrity of Social Life
by Ling Zhu
April 2011, Volume 7, Issue 2
- 1-2 Privacy Concerns and Offshore Outsourcing Security
by Chuleeporn Changchit - 3-27 Preventing Authentication Systems From Keylogging Attack
by A. S. Sodiya & O. Folorunso & P. B. Komolafe & O. P. Ogunderu - 28-64 Usable Authentication in EBusiness: Challenges and Opportunities
by Binto George & Anna Valeva & George Mangalaraj - 65-90 Information Politics in Health Information Exchange Networks
by Sherrie Drye Cannoy & Pamela E. Carter - 91-93 Interview with: Eric Kiernan Partner, KC Computers
by Choton Basu - 94-97 Code Version 2.0
by Ling Zhu
January 2011, Volume 7, Issue 1
- 1-2 Editorial Preface
by Chuleeporn Changchit - 3-24 Tracking the Footprints of Anonymous Defamation in Cyberspace: A Review of the Law and Technology
by Raymond Placid & Judy Wynekoop - 25-49 An Exploratory Study of the Relationships between Selected Contextual Factors and Information Security Concerns in Global Financial Services Institutions
by Princely Ifinedo - 50-71 Human Flesh Search - Facts and Issues
by Rui Chen & Sushil K. Sharma - 51-73 Interview with: Pradeep Jain An Entrepreneur and Technology Architect in the Content Industry
by Choton Basu - 74-75 Handbook of Information Security Management
by Choton Basu
October 2010, Volume 6, Issue 4
- 1-2 User and Consumer Perceptions of Security
by Changchit Chuleeporn - 3-27 Consumer Perception of Web Site Security Attributes
by Post Gerald V. & Walchli Suzanne B. - 28-49 User Acceptance of Speech-Enabled Technologies for Configuration of Computer and Network Security
by Luse Andy & Mennecke Brian E. & Townsend Anthony M. - 50-69 Passwords: Do User Preferences and Website Protocols Differ From Theory?
by Barra Roberta Ann & McLeod Alexander & Savage Arline & Simkin Mark G. - 70-72 Interview with: Ravichandra Gunturu Senior Software Engineer Blackthorne Capital Management
by Choton Basu - 73-74 Rework
by Jay Rogers & Choton Basu
July 2010, Volume 6, Issue 3
- 1-2 Privacy Concerns and Offshore Outsourcing Security
by Changchit Chuleeporn - 3-28 RFID Privacy Issues in Healthcare: Exploring the Roles of Technologies and Regulations
by Parks Rachida & Chu Chao-Hsien & Xu Heng - 29-46 Information Technology Offshore Outsourcing Security Risks and Safeguards
by Wei June & O’Connell Jason & Loho-Noya Meiga - 47-71 Employee Information Privacy Concerns with Employer Held Data: A Comparison of Two Prevalent Privacy Models
by Clouse Shawn F. & Wright Ryan T. & Pike Ronald E. - 72-73 Interview with: Antonio Fernandez Senior Program Manager Supersaver.com
by Choton Basu - 74-75 Internet Safety
by Choton Basu
April 2010, Volume 6, Issue 2
- 1-2 Issues and Challenges of the Diffusion of Web 2.0 on User Privacy
by Kumar Anil & Kumar Poonam - 3-16 Managing Privacy of User Generated Information in a Web 2.0 World
by Kumar Anil & Kumar Poonam - 17-32 A Call to Action: The Privacy Dangers Adolescents Face through Use of Facebook.com
by Gray Deborah M. & Christiansen Linda - 33-51 A Place for Friends?
by Rossi Camilla - 52-56 Interview with: Rainey Reitman Director of Communications Privacy Rights Clearinghouse
by Anil Kumar - 57-58 Understanding Privacy
by Anil Kumar
January 2010, Volume 6, Issue 1
- 1-2 Online Privacy, Information Security and Security Investment
by Changchit Chuleeporn - 3-27 Determinants of Behavioral Responses to Online Privacy: The Effects of Concern, Risk Beliefs, Self-Efficacy, and Communication Sources on Self-Protection Strategies
by Cho Hichang - 28-52 Is Your Email Box Safe?
by Zhang Feng & Dayarathn Rasika - 53-71 Making Sound Security Investment Decisions
by Cavusoglu Hasan - 72-74 Interview with: Peter Ells Director of Strategic Alliances, SoftwareONE
by Choton Basu - 75-78 Groundswell: Winning in a World Transformed by Social Technologies
by Ellen Weave
October 2009, Volume 5, Issue 4
- 1-1 Privacy Governance, Law, and Growth Perspective in Security
by Chuleeporn Changchit - 3-30 Security and Privacy Governance: Criteria for Systems Design
by Jan Gayness Clark & Nicole Lang Beebe & Karen Williams & Linda Shepherd - 31-50 Protecting Adolescents’ Personal Information Online: Constraints and Parameters
by Deborah M. Gray & Linda Christiansen - 51-67 Growth Perspective of Information Security
by Randall Young - 68-69 Interview with: Uday Awasthi Project Manager, Sun Microsystems
by Choton Basu - 70-71 Disrupting Class How Disruptive Innovation Will Change the Way the World Learns
by Choton Basu
July 2009, Volume 5, Issue 3
- 1-1 Innovation, Technology and Game-Changers
by Choton Basu - 3-26 Web 2.0 Emergency Applications: How Useful Can Twitter be for Emergency Response?
by Alexander Mills & Rui Chen & JinKyu Lee & H. Raghav Rao - 27-43 A Framework of Using Captive Insurance to Streamline IT Control and Compliance Management
by Xia Zhao & Ling Xue - 44-54 Quest for Universal Identification - A Commentary
by Choton Basu - 55-57 Interview with: Rhommer Varilla Managing Director and VP of Services, SysLogic Inc
by Choton Basu - 58-60 Personality Not Included
by Choton Basu