Is this page useful for you? Then, help us to keep the service working. Please have a look to our donations page ... Thanks for your help!!

International Journal of Information Security and Privacy (IJISP) / IGI Global


null

Impact Factor

0.02

5-Years IF

1

5-Years H index

Main indicators


Raw data


IF AIF IF5 DOC CDO CCU CIF CIT D2Y C2Y D5Y C5Y %SC CiY II AII
19900.1000 (%)0.04
19910.1000 (%)0.04
19920.09000 (%)0.04
19930.11000 (%)0.05
19940.12000 (%)0.04
19950.19000 (%)0.07
19960.23000 (%)0.09
19970.26000 (%)0.09
19980.28000 (%)0.1
19990.32000 (%)0.13
20000.39000 (%)0.15
20010.39000 (%)0.14
20020.4000 (%)0.17
20030.43000 (%)0.18
20040.48000 (%)0.19
20050.52000 (%)0.2
20060.51000 (%)0.2
20070.45202010.05200 (%)10.050.18
20080.48224212020 (%)0.2
20090.49236524242 (%)0.19
20100.020.460.02168110.01451651 (%)0.17
20110.49169713981 (%)0.19
20120.521911643297 (%)0.19
20130.58181343596 (%)0.2
20140.6161503792 (%)0.2
20150.611616610.013485 (%)0.19
20160.680.011618220.01132851 (%)0.2
20170.730.02919120.0132852 (%)0.22
IF: Impact Factor: C2Y / D2Y
AIF: Average Impact Factor for series in RePEc in year y
IF5: Impact Factor: C5Y / D5Y
DOC: Number of documents published in year y
CDO: Cumulative number of documents published until year y
CCU: Cumulative number of citations to papers published until year y
CIF: Cumulative impact factor
CIT: Number of citations to papers published in year y
D2Y: Number of articles published in y-1 plus y-2
C2Y: Cites in y to articles published in y-1 plus y-2
D5Y: Number of articles published in y-1 until y-5
C5Y: Cites in y to articles published in y-1 until y-5
%SC: Percentage of selft citations in y to articles published in y-1 plus y-2
CiY: Cites in year y to documents published in year y
II: Immediacy Index: CiY / Documents.
AII: Average Immediacy Index for series in RePEc in year y

 

50 most cited documents in this series:


#YearTitleCited
12012Investing in IT Security: How to Determine the Maximum Threshold. (2012). Eisenga, Amanda ; Rodriguez, Walter ; Jones, Travis L. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:6:y:2012:i:3:p:75-87.

Full description at Econpapers || Download paper

4
22016A Framework for Protecting Users Privacy in Cloud. (2016). Sodiya, Adesina S. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:10:y:2016:i:4:p:33-43.

Full description at Econpapers || Download paper

1
3Do Privacy Statements Really Work? The Effect of Privacy Statements and Fair Information Practices on Trust and Perceived Risk in E-Commerce. (2009). Van Dyke, Thomas ; Nemati, Hamid R. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:3:y:2009:i:1:p:45-64.

Full description at Econpapers || Download paper

1
42008An Empirical Investigation of an Individuals Perceived Need for Privacy and Security. (2008). Pirim, Taner ; Barkhi, Reza ; Reithel, Brian ; Boswell, Katherine ; James, Tabitha . In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:2:y:2008:i:1:p:42-53.

Full description at Econpapers || Download paper

1
52007The Role of Privacy Risk in IT Acceptance: An Empirical Study. (2007). Cazier, Joseph A ; Medlin, Dawn B ; Wilson, Vance E. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:1:y:2007:i:2:p:61-73.

Full description at Econpapers || Download paper

1
62011User Perceptions of Security Technologies. (2011). Yaylacicegi, Ulku ; He, Ling ; Kline, Douglas M. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:5:y:2011:i:2:p:1-12.

Full description at Econpapers || Download paper

1
72007Information Security Effectiveness: Conceptualization and Validation of a Theory. (2007). Knapp, Kenneth J ; Ford, Nelson F ; Rainer, Kelly R ; Marshall, Thomas E. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:1:y:2007:i:2:p:37-60.

Full description at Econpapers || Download paper

1
82009Fair Electronic Exchange Based on Fingerprint Biometrics. (2009). Yang, LI ; Bedi, Harkeerat . In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:3:y:2009:i:3:p:76-106.

Full description at Econpapers || Download paper

1

50 most relevant documents in this series (papers most cited in the last two years)


#YearTitleCited
12012Investing in IT Security: How to Determine the Maximum Threshold. (2012). Eisenga, Amanda ; Rodriguez, Walter ; Jones, Travis L. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:6:y:2012:i:3:p:75-87.

Full description at Econpapers || Download paper

3

Citing documents used to compute impact factor 0:


YearTitle

Recent citations (cites in year: CiY)


Warning!! This is still an experimental service. The results of this service should be interpreted with care, especially in research assessment exercises. The processing of documents is automatic. There still are errors and omissions in the identification of references. We are working to improve the software to increase the accuracy of the results.

Source data used to compute the impact factor of RePEc series.

CitEc is a RePEc service, providing citation data for Economics since 2001. Sponsored by INOMICS. Last updated December, 2th 2018. Contact: CitEc Team