Is this page useful for you? Then, help us to keep the service working. Please have a look to our donations page ... Thanks for your help!!

Citation Profile [Updated: 2025-11-20 18:08:17]
5 Years H Index
4
Impact Factor (IF)
0.05
5 Years IF
0.02
Data available in this report

[Raw data] [50 most cited papers] [50 most relevant papers] [cites used to compute IF] [Recent citations ][Frequent citing series ] [more data in EconPapers] [trace new citations] [Missing citations? Add them now] [Incorrect content? Let us know]

Main indicators
Raw Data

 

IF AIF CIF IF5 DOC CDO CIT NCI CCU D2Y C2Y D5Y C5Y SC %SC CiY II AII
2007 0 0.44 0.05 0 20 20 7 1 1 0 0 0 1 0.05 0.2
2008 0 0.47 0 0 22 42 0 1 20 20 0 0 0.22
2009 0 0.46 0 0 23 65 4 1 42 42 0 0 0.23
2010 0.02 0.46 0.01 0.02 16 81 3 1 2 45 1 65 1 0 0 0.2
2011 0 0.51 0 0 16 97 0 2 39 81 0 0 0.24
2012 0.03 0.5 0.01 0.01 19 116 6 1 3 32 1 97 1 0 0 0.21
2013 0 0.54 0.01 0.01 18 134 2 2 5 35 96 1 0 0 0.24
2014 0 0.53 0 0 16 150 1 5 37 92 0 0 0.22
2015 0.03 0.53 0.02 0.02 16 166 6 3 8 34 1 85 2 0 0 0.22
2016 0 0.5 0.03 0.01 16 182 1 5 13 32 85 1 0 0 0.2
2017 0 0.52 0.01 0.02 19 201 3 3 16 32 85 2 0 0 0.21
2018 0.03 0.53 0.02 0.01 25 226 5 4 20 35 1 85 1 0 0 0.22
2019 0.05 0.54 0.02 0.04 28 254 5 4 24 44 2 92 4 0 0 0.21
2020 0.08 0.64 0.02 0.06 26 280 10 6 30 53 4 104 6 0 0 0.3
2021 0.06 0.74 0.03 0.05 35 315 3 10 40 54 3 114 6 0 1 0.03 0.27
2022 0.07 0.74 0.03 0.05 30 345 0 11 51 61 4 133 6 0 0 0.22
2023 0.02 0.7 0.03 0.04 10 355 0 10 61 65 1 144 6 2 20 0 0.2
2024 0.05 0.82 0.02 0.02 12 367 1 7 68 40 2 129 3 3 42.9 2 0.17 0.24
IF: Two years Impact Factor: C2Y / D2Y
AIF: Average Impact Factor for all series in RePEc in year y
CIF: Cumulative impact factor
IF5: Five years Impact Factor: C5Y / D5Y
DOC: Number of documents published in year y
CDO: Cumulative number of documents published until year y
CIT: Number of citations to papers published in year y
NCI: Number of citations in year y
CCU: Cumulative number of citations to papers published until year y
D2Y: Number of articles published in y-1 plus y-2
C2Y: Cites in y to articles published in y-1 plus y-2
D5Y: Number of articles published in y-1 until y-5
C5Y: Cites in y to articles published in y-1 until y-5
SC: selft citations in y to articles published in y-1 plus y-2
%SC: Percentage of selft citations in y to articles published in y-1 plus y-2
CiY: Cites in year y to documents published in year y
II: Immediacy Index: CiY / Documents.
AII: Average Immediacy Index for series in RePEc in year y
50 most cited documents in this series
#YearTitleCited
12020Factors Impacting Behavioral Intention of Users to Adopt IoT In India: From Security and Privacy Perspective. (2020). Chatterjee, Sheshadri. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:14:y:2020:i:4:p:92-112.

Full description at Econpapers || Download paper

6
22015A Meta-Analysis of Studies on Protection Motivation Theory and Information Security Behaviour. (2015). Sommestad, Teodor ; Hallberg, Jonas ; Karlzn, Henrik . In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:9:y:2015:i:1:p:26-46.

Full description at Econpapers || Download paper

5
32007Information Security Effectiveness: Conceptualization and Validation of a Theory. (2007). Marshall, Thomas E ; Ford, Nelson F ; Knapp, Kenneth J ; Rainer, Kelly R. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:1:y:2007:i:2:p:37-60.

Full description at Econpapers || Download paper

4
42010Security Issues for Cloud Computing. (2010). Kantarcioglu, Murat ; Khan, Latifur ; Hamlen, Kevin ; Thuraisingham, Bhavani. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:4:y:2010:i:2:p:36-48.

Full description at Econpapers || Download paper

4
52012Investing in IT Security: How to Determine the Maximum Threshold. (2012). Rodriguez, Walter ; Jones, Travis L ; Eisenga, Amanda . In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:6:y:2012:i:3:p:75-87.

Full description at Econpapers || Download paper

4
62009Do Privacy Statements Really Work? The Effect of Privacy Statements and Fair Information Practices on Trust and Perceived Risk in E-Commerce. (2009). van Dyke, Thomas ; Nemati, Hamid R. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:3:y:2009:i:1:p:45-64.

Full description at Econpapers || Download paper

3
72020Two-Stage Automobile Insurance Fraud Detection by Using Optimized Fuzzy C-Means Clustering and Supervised Learning. (2020). Panigrahi, Suvasini ; Subudhi, Sharmila. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:14:y:2020:i:3:p:18-37.

Full description at Econpapers || Download paper

3
82018Optimized Packet Filtering Honeypot with Snooping Agents in Intrusion Detection System for WLAN. (2018). Saha, Rahul ; Rai, Mritunjay Kumar ; Singh, Mandeep ; Kumar, Gulshan. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:12:y:2018:i:1:p:53-62.

Full description at Econpapers || Download paper

2
92016A Framework for Protecting Users Privacy in Cloud. (2016). Sodiya, Adesina S. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:10:y:2016:i:4:p:33-43.

Full description at Econpapers || Download paper

2
102014A New Negative Selection Algorithm for Adaptive Network Intrusion Detection System. (2014). Chikhi, Salim ; Ramdane, Chikh . In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:8:y:2014:i:4:p:1-25.

Full description at Econpapers || Download paper

2
112007An Ontology of Information Security. (2007). Shahmehri, Nahid ; Duma, Claudiu ; Herzog, Almut . In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:1:y:2007:i:4:p:1-23.

Full description at Econpapers || Download paper

2
122019A Survey: Intrusion Detection Techniques for Internet of Things. (2019). Choudhary, Sarika ; Kesswani, Nishtha. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:13:y:2019:i:1:p:86-105.

Full description at Econpapers || Download paper

1
132013Child Security in Cyberspace Through Moral Cognition. (2013). Srinidhi, T N ; Prakash, Satya ; Kumar, Saravana ; Coul, Natalie ; Botsa, Jayaprasad ; Vaish, Abhishek. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:7:y:2013:i:1:p:16-29.

Full description at Econpapers || Download paper

1
142021Socio-Technical Attack Approximation Based on Structural Virality of Information in Social Networks. (2021). Ranjan, Preetish ; Vaish, Abhishek. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:15:y:2021:i:1:p:153-172.

Full description at Econpapers || Download paper

1
152018A Comparative Study of Privacy Protection Practices in the US, Europe, and Asia. (2018). Ashrafi, Noushin ; Kuilboer, Jean-Pierre. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:12:y:2018:i:3:p:1-15.

Full description at Econpapers || Download paper

1
162012Global Analysis of Security and Trust Perceptions in Web Design for E-Commerce. (2012). Srinivasan, S ; Barker, Robert. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:6:y:2012:i:1:p:1-13.

Full description at Econpapers || Download paper

1
172019A Matrix-Based Pair-Wise Key Establishment for Secure and Energy Efficient WSN-Assisted IoT. (2019). Tripathi, Sarsij ; Shukla, Anurag Shukla. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:13:y:2019:i:3:p:91-105.

Full description at Econpapers || Download paper

1
182015Trust of the Same: Rethinking Trust and Reputation Management from a Structural Homophily Perspective. (2015). Liu, William ; Bai, Quan ; Usman, Aminu Bello ; Narayanan, Ajit. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:9:y:2015:i:2:p:13-30.

Full description at Econpapers || Download paper

1
192022A Framework for Analysis of Incompleteness and Security Challenges in IoT Big Data. (2022). , Mrunalini ; Kumari, Kimmi. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:16:y:2022:i:2:p:1-13.

Full description at Econpapers || Download paper

1
202017Digital Forensic Analysis of Cybercrimes: Best Practices and Methodologies. (2017). Cavaller, Victor ; Sabillon, Regner ; Serra-Ruiz, Jordi ; Cano, Jeimy J. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:11:y:2017:i:2:p:25-37.

Full description at Econpapers || Download paper

1
212019Enhanced Security for Electronic Health Care Information Using Obfuscation and RSA Algorithm in Cloud Computing. (2019). Sharma, Surender Kumar ; Gautam, Pratiksha ; Ansari, Mohd Dilshad. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:13:y:2019:i:1:p:59-69.

Full description at Econpapers || Download paper

1
222013Spearing High Net Wealth Individuals: The Case of Online Fraud and Mature Age Internet Users. (2013). Martin, Nigel ; Rice, John. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:7:y:2013:i:1:p:1-15.

Full description at Econpapers || Download paper

1
232007On the Design of an Authentication System Based on Keystroke Dynamics Using a Predefined Input Text. (2007). Achatz, Michael ; Bakdi, Idir ; Bartmann, Dieter . In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:1:y:2007:i:2:p:1-12.

Full description at Econpapers || Download paper

1
242011User Perceptions of Security Technologies. (2011). Yaylacicegi, Ulku ; He, Ling ; Kline, Douglas M. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:5:y:2011:i:2:p:1-12.

Full description at Econpapers || Download paper

1
252019Building an Effective Approach toward Intrusion Detection Using Ensemble Feature Selection. (2019). Singh, Pradeep ; Shukla, Alok Kumar. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:13:y:2019:i:3:p:31-47.

Full description at Econpapers || Download paper

1
262021(p+, α, t)-Anonymity Technique Against Privacy Attacks. (2021). Gadad, Veena. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:15:y:2021:i:2:p:68-86.

Full description at Econpapers || Download paper

1
272008An Empirical Investigation of an Individuals Perceived Need for Privacy and Security. (2008). Pirim, Taner ; James, Tabitha ; Barkhi, Reza ; Boswell, Katherine ; Reithel, Brian. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:2:y:2008:i:1:p:42-53.

Full description at Econpapers || Download paper

1
282018A Reliable Data Provenance and Privacy Preservation Architecture for Business-Driven Cyber-Physical Systems Using Blockchain. (2018). Liang, Xueping ; Shetty, Sachin ; Zhao, Juan ; Liu, Jihong ; Tosh, Deepak K. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:12:y:2018:i:4:p:68-81.

Full description at Econpapers || Download paper

1
292012A Survey of U.S. Laws for Health Information Security & Privacy. (2012). Yuan, Xiaohong ; Xu, Jinsheng ; Wang, Hong ; Akowuah, Francis . In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:6:y:2012:i:4:p:40-54.

Full description at Econpapers || Download paper

1
302020Feature Reduction and Optimization of Malware Detection System Using Ant Colony Optimization and Rough Sets. (2020). Varma, Ravi Kiran ; Reddy, Kumar S ; Kalidindi, Akhila. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:14:y:2020:i:3:p:95-114.

Full description at Econpapers || Download paper

1
312024An IIoT Temporal Data Anomaly Detection Method Combining Transformer and Adversarial Training. (2024). Tian, Yuan ; Wang, Wendong ; He, Jingyuan. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:18:y:2024:i:1:p:1-28.

Full description at Econpapers || Download paper

1
322017A Survey on Denial of Service Attacks and Preclusions. (2017). , Sumathy. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:11:y:2017:i:4:p:1-15.

Full description at Econpapers || Download paper

1
332019Parallel Hybrid BBO Search Method for Twitter Sentiment Analysis of Large Scale Datasets Using MapReduce. (2019). Bala, Manju ; Sharma, Kapil ; Tripathi, Ashish Kumar. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:13:y:2019:i:3:p:106-122.

Full description at Econpapers || Download paper

1
342021Improved Extended Progressive Visual Cryptography Scheme Using Pixel Harmonization. (2021). Bhagate, Suhas ; Kulkarni, Prakash J. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:15:y:2021:i:2:p:196-216.

Full description at Econpapers || Download paper

1
352018SEC-CMAC A New Message Authentication Code Based on the Symmetrical Evolutionist Ciphering Algorithm. (2018). Omary, Fouzia ; Ziani, Fatima Ezzahra ; Echandouri, Bouchra ; Sadak, Anas. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:12:y:2018:i:3:p:16-26.

Full description at Econpapers || Download paper

1
362024An Abnormal External Link Detection Algorithm Based on Multi-Modal Fusion. (2024). Wu, Zhiqiang. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:18:y:2024:i:1:p:1-15.

Full description at Econpapers || Download paper

1
372017Honeypot Baselining for Zero Day Attack Detection. (2017). Chamotra, Saurabh ; Misra, Ram Swaroop ; Sehgal, Rakesh Kumar. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:11:y:2017:i:3:p:63-74.

Full description at Econpapers || Download paper

1
382009Fair Electronic Exchange Based on Fingerprint Biometrics. (2009). Yang, LI ; Bedi, Harkeerat . In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:3:y:2009:i:3:p:76-106.

Full description at Econpapers || Download paper

1
392019Cyber Defense Maturity Levels and Threat Models for Smart Cities. (2019). al Shidhani, Ali Amur. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:13:y:2019:i:2:p:32-46.

Full description at Econpapers || Download paper

1
402013A Survey of Security Standards Applicable to Health Information Systems. (2013). Yuan, Xiaohong ; Xu, Jinsheng ; Wang, Hong ; Akowuah, Francis . In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:7:y:2013:i:4:p:22-36.

Full description at Econpapers || Download paper

1
412021Anomaly Intrusion Detection Using SVM and C4.5 Classification With an Improved Particle Swarm Optimization (I-PSO). (2021). Sandeep, V ; Kondappan, Saravanan ; Barath, Raj ; Jone, Amir Anton. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:15:y:2021:i:2:p:113-130.

Full description at Econpapers || Download paper

1
422007The Role of Privacy Risk in IT Acceptance: An Empirical Study. (2007). Wilson, Vance E ; Cazier, Joseph A ; Medlin, Dawn B. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:1:y:2007:i:2:p:61-73.

Full description at Econpapers || Download paper

1
432018Association Rule Hiding in Privacy Preserving Data Mining. (2018). Mohan, Vijayarani S ; Angamuthu, Tamilarasi. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:12:y:2018:i:3:p:141-163.

Full description at Econpapers || Download paper

1
442012Safety Measures for Social Computing in Wiki Learning Environment. (2012). Latih, Rodziah ; Taghavi, Mona ; Jnior, Joaquim Celestino ; Patel, Ahmed ; Zin, Abdullah Mohd . In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:6:y:2012:i:2:p:1-15.

Full description at Econpapers || Download paper

1
452020Structure-Based Analysis of Different Categories of Cyberbullying in Dynamic Social Network. (2020). M. P. S. Bhatia, ; Sarna, Geetika. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:14:y:2020:i:3:p:1-17.

Full description at Econpapers || Download paper

1
462015An Efficient, Anonymous and Unlinkable Incentives Scheme. (2015). Milutinovic, Milica ; de Decker, Bart ; Put, Andreas . In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:9:y:2015:i:3:p:1-20.

Full description at Econpapers || Download paper

1
472023i-2NIDS Novel Intelligent Intrusion Detection Approach for a Strong Network Security. (2023). Ennaji, Sabrine ; el Akkad, Nabil ; Haddouch, Khalid. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:17:y:2023:i:1:p:1-17.

Full description at Econpapers || Download paper

1
482017PKI Deployment Challenges and Recommendations for ICS Networks. (2017). , Sreekanth ; Srivastava, Shubhra ; Rao, Nandan. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:11:y:2017:i:2:p:38-48.

Full description at Econpapers || Download paper

1
492009Information Technology Security Concerns in Global Financial Services Institutions: Do Socio-Economic Factors Differentiate Perceptions?. (2009). Ifinedo, Princely. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:3:y:2009:i:2:p:68-83.

Full description at Econpapers || Download paper

1
50 most relevant documents in this series (papers most cited in the last two years)
#YearTitleCited
12020Factors Impacting Behavioral Intention of Users to Adopt IoT In India: From Security and Privacy Perspective. (2020). Chatterjee, Sheshadri. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:14:y:2020:i:4:p:92-112.

Full description at Econpapers || Download paper

6
22009Do Privacy Statements Really Work? The Effect of Privacy Statements and Fair Information Practices on Trust and Perceived Risk in E-Commerce. (2009). van Dyke, Thomas ; Nemati, Hamid R. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:3:y:2009:i:1:p:45-64.

Full description at Econpapers || Download paper

2
Citing documents used to compute impact factor: 2
YearTitle
2024TinyML Algorithms for Big Data Management in Large-Scale IoT Systems. (2024). Sioutas, Spyros ; Theodorakopoulos, Leonidas ; Krimpas, George A ; Mammassis, Constantinos S ; Karras, Christos ; Giannaros, Anastasios. In: Future Internet. RePEc:gam:jftint:v:16:y:2024:i:2:p:42-:d:1326236.

Full description at Econpapers || Download paper

2024An IIoT Temporal Data Anomaly Detection Method Combining Transformer and Adversarial Training. (2024). Tian, Yuan ; Wang, Wendong ; He, Jingyuan. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:18:y:2024:i:1:p:1-28.

Full description at Econpapers || Download paper

Recent citations
Recent citations received in 2024

YearCiting document
2024A Multi-Scale Feature Extraction Method Based on Improved Transformer for Intrusion Detection. (2024). Zhang, Yaping. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:18:y:2024:i:1:p:1-20.

Full description at Econpapers || Download paper

2024An IIoT Temporal Data Anomaly Detection Method Combining Transformer and Adversarial Training. (2024). Tian, Yuan ; Wang, Wendong ; He, Jingyuan. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:18:y:2024:i:1:p:1-28.

Full description at Econpapers || Download paper

Recent citations received in 2021

YearCiting document
2021The Impact of European Environmental Policies on Energy Prices. Possible Solutions in the Black Sea Region. (2021). Muraraeu, Ioan-Catalin. In: Romanian Economic Journal. RePEc:rej:journl:v:24:y:2021:i:82:p:80-90.

Full description at Econpapers || Download paper