Is this page useful for you? Then, help us to keep the service working. Please have a look to our donations page ... Thanks for your help!!

Citation Profile [Updated: 2019-12-04 10:36:47]
5 Years H
2
Impact Factor
0.04
5 Years IF
0.01
Data available in this report

[Raw data] [50 most cited papers] [50 most relevant papers] [cites used to compute IF] [Recent citations ][Frequent citing series ] [more data in EconPapers] [trace new citations] [Missing citations? Add them now] [Incorrect content? Let us know]

Main indicators
Raw Data

 

IF AIF CIF IF5 DOC CDO CIT NCI CCU D2Y C2Y D5Y C5Y SC %SC CiY II AII
1990 0 0.08 0 0 0 0 0 0 0 0 0 0 0.04
1991 0 0.08 0 0 0 0 0 0 0 0 0 0 0.04
1992 0 0.08 0 0 0 0 0 0 0 0 0 0 0.04
1993 0 0.1 0 0 0 0 0 0 0 0 0 0 0.05
1994 0 0.11 0 0 0 0 0 0 0 0 0 0 0.05
1995 0 0.19 0 0 0 0 0 0 0 0 0 0 0.08
1996 0 0.22 0 0 0 0 0 0 0 0 0 0 0.1
1997 0 0.22 0 0 0 0 0 0 0 0 0 0 0.09
1998 0 0.26 0 0 0 0 0 0 0 0 0 0 0.12
1999 0 0.28 0 0 0 0 0 0 0 0 0 0 0.14
2000 0 0.33 0 0 0 0 0 0 0 0 0 0 0.15
2001 0 0.36 0 0 0 0 0 0 0 0 0 0 0.15
2002 0 0.39 0 0 0 0 0 0 0 0 0 0 0.21
2003 0 0.4 0 0 0 0 0 0 0 0 0 0 0.2
2004 0 0.45 0 0 0 0 0 0 0 0 0 0 0.2
2005 0 0.46 0 0 0 0 0 0 0 0 0 0 0.22
2006 0 0.46 0 0 0 0 0 0 0 0 0 0 0.21
2007 0 0.42 0.05 0 20 20 1 1 1 0 0 0 1 0.05 0.18
2008 0 0.44 0 0 22 42 0 1 20 20 0 0 0.21
2009 0 0.44 0 0 23 65 1 1 42 42 0 0 0.21
2010 0.02 0.43 0.01 0.02 16 81 1 1 2 45 1 65 1 0 0 0.18
2011 0 0.46 0 0 16 97 0 2 39 81 0 0 0.21
2012 0.03 0.47 0.01 0.01 19 116 3 1 3 32 1 97 1 0 0 0.19
2013 0 0.53 0.01 0.01 18 134 0 1 4 35 96 1 0 0 0.22
2014 0 0.55 0 0 16 150 0 4 37 92 0 0 0.22
2015 0 0.56 0.01 0 16 166 0 1 5 34 85 0 0 0.21
2016 0 0.58 0.01 0.01 16 182 0 2 7 32 85 1 0 0 0.2
2017 0 0.6 0.01 0.02 9 191 0 2 9 32 85 2 0 0 0.22
2018 0.04 0.76 0.01 0.01 0 191 0 2 11 25 1 75 1 0 0 0.31
IF: Impact Factor: C2Y / D2Y
AIF: Average Impact Factor for series in RePEc in year y
CIF: Cumulative impact factor
IF5: Impact Factor: C5Y / D5Y
DOC: Number of documents published in year y
CDO: Cumulative number of documents published until year y
CIT: Number of citations to papers published in year y
NCI: Number of citations in year y
CCU: Cumulative number of citations to papers published until year y
D2Y: Number of articles published in y-1 plus y-2
C2Y: Cites in y to articles published in y-1 plus y-2
D5Y: Number of articles published in y-1 until y-5
C5Y: Cites in y to articles published in y-1 until y-5
SC: selft citations in y to articles published in y-1 plus y-2
%SC: Percentage of selft citations in y to articles published in y-1 plus y-2
CiY: Cites in year y to documents published in year y
II: Immediacy Index: CiY / Documents.
AII: Average Immediacy Index for series in RePEc in year y
50 most cited documents in this series
#YearTitleCited
12012Investing in IT Security: How to Determine the Maximum Threshold. (2012). Eisenga, Amanda ; Rodriguez, Walter ; Jones, Travis L. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:6:y:2012:i:3:p:75-87.

Full description at Econpapers || Download paper

4
22010Security Issues for Cloud Computing. (2010). Thuraisingham, Bhavani ; Khan, Latifur ; Kantarcioglu, Murat ; Hamlen, Kevin . In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:4:y:2010:i:2:p:36-48.

Full description at Econpapers || Download paper

2
32009Fair Electronic Exchange Based on Fingerprint Biometrics. (2009). Yang, LI ; Bedi, Harkeerat . In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:3:y:2009:i:3:p:76-106.

Full description at Econpapers || Download paper

1
42017PKI Deployment Challenges and Recommendations for ICS Networks. (2017). , Sreekanth ; Rao, Nandan ; Srivastava, Shubhra . In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:11:y:2017:i:2:p:38-48.

Full description at Econpapers || Download paper

1
52015Trust of the Same: Rethinking Trust and Reputation Management from a Structural Homophily Perspective. (2015). Usman, Aminu Bello ; Narayanan, Ajit ; Bai, Quan ; Liu, William . In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:9:y:2015:i:2:p:13-30.

Full description at Econpapers || Download paper

1
6Do Privacy Statements Really Work? The Effect of Privacy Statements and Fair Information Practices on Trust and Perceived Risk in E-Commerce. (2009). Van Dyke, Thomas ; Nemati, Hamid R. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:3:y:2009:i:1:p:45-64.

Full description at Econpapers || Download paper

1
72016A Framework for Protecting Users Privacy in Cloud. (2016). Sodiya, Adesina S. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:10:y:2016:i:4:p:33-43.

Full description at Econpapers || Download paper

1
82008An Empirical Investigation of an Individuals Perceived Need for Privacy and Security. (2008). Pirim, Taner ; Barkhi, Reza ; Reithel, Brian ; Boswell, Katherine ; James, Tabitha . In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:2:y:2008:i:1:p:42-53.

Full description at Econpapers || Download paper

1
92011User Perceptions of Security Technologies. (2011). Yaylacicegi, Ulku ; He, Ling ; Kline, Douglas M. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:5:y:2011:i:2:p:1-12.

Full description at Econpapers || Download paper

1
102007The Role of Privacy Risk in IT Acceptance: An Empirical Study. (2007). Cazier, Joseph A ; Medlin, Dawn B ; Wilson, Vance E. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:1:y:2007:i:2:p:61-73.

Full description at Econpapers || Download paper

1
112007Information Security Effectiveness: Conceptualization and Validation of a Theory. (2007). Knapp, Kenneth J ; Ford, Nelson F ; Rainer, Kelly R ; Marshall, Thomas E. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:1:y:2007:i:2:p:37-60.

Full description at Econpapers || Download paper

1
50 most relevant documents in this series (papers most cited in the last two years)
#YearTitleCited
12012Investing in IT Security: How to Determine the Maximum Threshold. (2012). Eisenga, Amanda ; Rodriguez, Walter ; Jones, Travis L. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:6:y:2012:i:3:p:75-87.

Full description at Econpapers || Download paper

3
Citing documents used to compute impact factor: 1
YearTitle
2018Short-term integration costs of variable renewable energy: Wind curtailment and balancing in Britain and Germany. (2018). Staffell, Iain ; Joos, Michael . In: Renewable and Sustainable Energy Reviews. RePEc:eee:rensus:v:86:y:2018:i:c:p:45-65.

Full description at Econpapers || Download paper

Recent citations