[Raw data] [50 most cited papers] [50 most relevant papers] [cites used to compute IF] [Recent citations ][Frequent citing series ] [more data in EconPapers] [trace new citations] [Missing citations? Add them now] [Incorrect content? Let us know]
IF | AIF | CIF | IF5 | DOC | CDO | CIT | NCI | CCU | D2Y | C2Y | D5Y | C5Y | SC | %SC | CiY | II | AII | |
1990 | 0 | 0.08 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.04 | |||||
1991 | 0 | 0.08 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.04 | |||||
1992 | 0 | 0.09 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.04 | |||||
1993 | 0 | 0.1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.05 | |||||
1994 | 0 | 0.11 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.06 | |||||
1995 | 0 | 0.2 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.08 | |||||
1996 | 0 | 0.22 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.1 | |||||
1997 | 0 | 0.23 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.1 | |||||
1998 | 0 | 0.27 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.12 | |||||
1999 | 0 | 0.29 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.14 | |||||
2000 | 0 | 0.34 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.15 | |||||
2001 | 0 | 0.36 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.16 | |||||
2002 | 0 | 0.4 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.21 | |||||
2003 | 0 | 0.41 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.2 | |||||
2004 | 0 | 0.46 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.21 | |||||
2005 | 0 | 0.47 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.22 | |||||
2006 | 0 | 0.47 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.21 | |||||
2007 | 0 | 0.42 | 0.05 | 0 | 20 | 20 | 1 | 1 | 1 | 0 | 0 | 0 | 1 | 0.05 | 0.19 | |||
2008 | 0 | 0.45 | 0 | 0 | 22 | 42 | 0 | 1 | 20 | 20 | 0 | 0 | 0.21 | |||||
2009 | 0 | 0.44 | 0 | 0 | 23 | 65 | 0 | 1 | 42 | 42 | 0 | 0 | 0.21 | |||||
2010 | 0.02 | 0.44 | 0.01 | 0.02 | 16 | 81 | 1 | 1 | 2 | 45 | 1 | 65 | 1 | 0 | 0 | 0.18 | ||
2011 | 0 | 0.46 | 0 | 0 | 16 | 97 | 0 | 2 | 39 | 81 | 0 | 0 | 0.21 | |||||
2012 | 0.03 | 0.47 | 0.01 | 0.01 | 19 | 116 | 3 | 1 | 3 | 32 | 1 | 97 | 1 | 0 | 0 | 0.19 | ||
2013 | 0 | 0.53 | 0.01 | 0.01 | 18 | 134 | 0 | 1 | 4 | 35 | 96 | 1 | 0 | 0 | 0.22 | |||
2014 | 0 | 0.55 | 0 | 0 | 16 | 150 | 0 | 4 | 37 | 92 | 0 | 0 | 0.21 | |||||
2015 | 0.03 | 0.55 | 0.01 | 0.01 | 16 | 166 | 1 | 2 | 6 | 34 | 1 | 85 | 1 | 0 | 0 | 0.21 | ||
2016 | 0 | 0.56 | 0.01 | 0.01 | 16 | 182 | 0 | 2 | 8 | 32 | 85 | 1 | 0 | 0 | 0.2 | |||
2017 | 0 | 0.58 | 0.01 | 0.02 | 19 | 201 | 0 | 2 | 10 | 32 | 85 | 2 | 0 | 0 | 0.21 | |||
2018 | 0.03 | 0.7 | 0.01 | 0.01 | 25 | 226 | 0 | 2 | 12 | 35 | 1 | 85 | 1 | 0 | 0 | 0.28 | ||
2019 | 0.02 | 0.88 | 0.01 | 0.03 | 28 | 254 | 0 | 3 | 15 | 44 | 1 | 92 | 3 | 0 | 0 | 0.33 |
IF: | Impact Factor: C2Y / D2Y |
AIF: | Average Impact Factor for series in RePEc in year y |
CIF: | Cumulative impact factor |
IF5: | Impact Factor: C5Y / D5Y |
DOC: | Number of documents published in year y |
CDO: | Cumulative number of documents published until year y |
CIT: | Number of citations to papers published in year y |
NCI: | Number of citations in year y |
CCU: | Cumulative number of citations to papers published until year y |
D2Y: | Number of articles published in y-1 plus y-2 |
C2Y: | Cites in y to articles published in y-1 plus y-2 |
D5Y: | Number of articles published in y-1 until y-5 |
C5Y: | Cites in y to articles published in y-1 until y-5 |
SC: | selft citations in y to articles published in y-1 plus y-2 |
%SC: | Percentage of selft citations in y to articles published in y-1 plus y-2 |
CiY: | Cites in year y to documents published in year y |
II: | Immediacy Index: CiY / Documents. |
AII: | Average Immediacy Index for series in RePEc in year y |
# | Year | Title | Cited |
---|---|---|---|
1 | 2012 | Investing in IT Security: How to Determine the Maximum Threshold. (2012). Eisenga, Amanda ; Rodriguez, Walter ; Jones, Travis L. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:6:y:2012:i:3:p:75-87. Full description at Econpapers || Download paper | 4 |
2 | 2010 | Security Issues for Cloud Computing. (2010). Thuraisingham, Bhavani ; Khan, Latifur ; Kantarcioglu, Murat ; Hamlen, Kevin . In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:4:y:2010:i:2:p:36-48. Full description at Econpapers || Download paper | 2 |
3 | 2007 | The Role of Privacy Risk in IT Acceptance: An Empirical Study. (2007). Cazier, Joseph A ; Medlin, Dawn B ; Wilson, Vance E. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:1:y:2007:i:2:p:61-73. Full description at Econpapers || Download paper | 1 |
4 | 2011 | User Perceptions of Security Technologies. (2011). Yaylacicegi, Ulku ; He, Ling ; Kline, Douglas M. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:5:y:2011:i:2:p:1-12. Full description at Econpapers || Download paper | 1 |
5 | 2007 | Information Security Effectiveness: Conceptualization and Validation of a Theory. (2007). Knapp, Kenneth J ; Ford, Nelson F ; Rainer, Kelly R ; Marshall, Thomas E. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:1:y:2007:i:2:p:37-60. Full description at Econpapers || Download paper | 1 |
6 | 2015 | Trust of the Same: Rethinking Trust and Reputation Management from a Structural Homophily Perspective. (2015). Usman, Aminu Bello ; Narayanan, Ajit ; Bai, Quan ; Liu, William . In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:9:y:2015:i:2:p:13-30. Full description at Econpapers || Download paper | 1 |
7 | 2017 | PKI Deployment Challenges and Recommendations for ICS Networks. (2017). , Sreekanth ; Rao, Nandan ; Srivastava, Shubhra . In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:11:y:2017:i:2:p:38-48. Full description at Econpapers || Download paper | 1 |
8 | 2015 | A Meta-Analysis of Studies on Protection Motivation Theory and Information Security Behaviour. (2015). Karlzn, Henrik ; Hallberg, Jonas ; Sommestad, Teodor . In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:9:y:2015:i:1:p:26-46. Full description at Econpapers || Download paper | 1 |
9 | 2009 | Fair Electronic Exchange Based on Fingerprint Biometrics. (2009). Yang, LI ; Bedi, Harkeerat . In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:3:y:2009:i:3:p:76-106. Full description at Econpapers || Download paper | 1 |
10 | 2016 | A Framework for Protecting Users Privacy in Cloud. (2016). Sodiya, Adesina S. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:10:y:2016:i:4:p:33-43. Full description at Econpapers || Download paper | 1 |
11 | 2013 | Child Security in Cyberspace Through Moral Cognition. (2013). , Saravanakumar ; Botsa, Jayaprasad ; Prakash, Satya ; Vaish, Abhishek ; Coul, Natalie ; Srinidhi, T N. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:7:y:2013:i:1:p:16-29. Full description at Econpapers || Download paper | 1 |
12 | 2008 | An Empirical Investigation of an Individuals Perceived Need for Privacy and Security. (2008). Pirim, Taner ; Barkhi, Reza ; Reithel, Brian ; Boswell, Katherine ; James, Tabitha . In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:2:y:2008:i:1:p:42-53. Full description at Econpapers || Download paper | 1 |
# | Year | Title | Cited |
---|
Year | Title | |
---|---|---|
2019 | An approach based on behavioral models and critical states distance notion for improving cybersecurity of industrial control systems. (2019). Flaus, Jean-Marie ; Zamai, Ric ; Sicard, Franck. In: Reliability Engineering and System Safety. RePEc:eee:reensy:v:188:y:2019:i:c:p:584-603. Full description at Econpapers || Download paper |