[Raw
data] [50 most cited papers]
[50 most relevant papers]
[cites used to compute IF]
[Recent
citations ][Frequent citing
series ] [more data in
EconPapers]
[
trace new citations] [Missing
citations? Add them now]
[Incorrect content? Let us
know]
| IF | AIF | CIF | IF5 | DOC | CDO | CIT | NCI | CCU | D2Y | C2Y | D5Y | C5Y | SC | %SC | CiY | II | AII | |
| 2005 | 0 | 0.5 | 0 | 0 | 25 | 25 | 24 | 0 | 0 | 0 | 0 | 0 | 0.23 | |||||
| 2006 | 0 | 0.49 | 0 | 0 | 24 | 49 | 0 | 0 | 25 | 25 | 0 | 0 | 0.22 | |||||
| 2007 | 0 | 0.44 | 0 | 0 | 24 | 73 | 2 | 0 | 49 | 49 | 0 | 0 | 0.2 | |||||
| 2008 | 0 | 0.47 | 0.01 | 0.01 | 24 | 97 | 6 | 1 | 1 | 48 | 73 | 1 | 0 | 0 | 0.22 | |||
| 2009 | 0 | 0.46 | 0 | 0 | 24 | 121 | 1 | 1 | 48 | 97 | 0 | 0 | 0.23 | |||||
| 2010 | 0 | 0.46 | 0 | 0 | 24 | 145 | 1 | 1 | 48 | 121 | 0 | 0 | 0.2 | |||||
| 2011 | 0 | 0.51 | 0.01 | 0 | 24 | 169 | 3 | 2 | 3 | 48 | 120 | 0 | 0 | 0.24 | ||||
| 2012 | 0 | 0.5 | 0 | 0 | 24 | 193 | 19 | 3 | 48 | 120 | 0 | 0 | 0.21 | |||||
| 2013 | 0 | 0.54 | 0 | 0 | 23 | 216 | 14 | 3 | 48 | 120 | 0 | 0 | 0.24 | |||||
| 2014 | 0 | 0.53 | 0 | 0 | 20 | 236 | 4 | 1 | 4 | 47 | 119 | 0 | 0 | 0.22 | ||||
| 2015 | 0.05 | 0.53 | 0.02 | 0.02 | 25 | 261 | 2 | 4 | 8 | 43 | 2 | 115 | 2 | 0 | 0 | 0.22 | ||
| 2016 | 0.02 | 0.5 | 0.01 | 0.02 | 20 | 281 | 9 | 4 | 12 | 45 | 1 | 116 | 2 | 0 | 0 | 0.2 | ||
| 2017 | 0.02 | 0.52 | 0.01 | 0.03 | 27 | 308 | 6 | 4 | 16 | 45 | 1 | 112 | 3 | 0 | 0 | 0.21 |
| IF: | Two years Impact Factor: C2Y / D2Y |
| AIF: | Average Impact Factor for all series in RePEc in year y |
| CIF: | Cumulative impact factor |
| IF5: | Five years Impact Factor: C5Y / D5Y |
| DOC: | Number of documents published in year y |
| CDO: | Cumulative number of documents published until year y |
| CIT: | Number of citations to papers published in year y |
| NCI: | Number of citations in year y |
| CCU: | Cumulative number of citations to papers published until year y |
| D2Y: | Number of articles published in y-1 plus y-2 |
| C2Y: | Cites in y to articles published in y-1 plus y-2 |
| D5Y: | Number of articles published in y-1 until y-5 |
| C5Y: | Cites in y to articles published in y-1 until y-5 |
| SC: | selft citations in y to articles published in y-1 plus y-2 |
| %SC: | Percentage of selft citations in y to articles published in y-1 plus y-2 |
| CiY: | Cites in year y to documents published in year y |
| II: | Immediacy Index: CiY / Documents. |
| AII: | Average Immediacy Index for series in RePEc in year y |
| # | Year | Title | Cited |
|---|---|---|---|
| 1 | 2005 | Mobile Payment Adoption in the US: A Cross-industry, Crossplatform Solution. (2005). Dewan, Sunil G ; Chen, Lei-Da. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:1:y:2005:i:2:p:4-28. Full description at Econpapers || Download paper | 14 |
| 2 | 2005 | Perceptions of Information Security in the Workplace: Linking Information Security Climate to Compliant Behavior. (2005). Chan, Mark ; Woon, Irene ; Kankanhalli, Atreyi. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:1:y:2005:i:3:p:18-41. Full description at Econpapers || Download paper | 11 |
| 3 | 2012 | Stock Market Response to Information Security Breach: A Study Using Firm and Attack Characteristics. (2012). Das, Saini ; Anand, Manoj ; Mukhopadhyay, Arunabha. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:8:y:2012:i:4:p:27-55. Full description at Econpapers || Download paper | 10 |
| 4 | 2013 | Control-Related Motivations and Information Security Policy Compliance: The Role of Autonomy and Efficacy. (2013). Palvia, Prashant ; Lowry, Paul Benjamin ; Wall, Jeffrey D. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:9:y:2013:i:4:p:52-79. Full description at Econpapers || Download paper | 7 |
| 5 | 2013 | Applying Protection Motivation Theory to Information Security Training for College Students. (2013). Ding, YI ; Xu, Shuting ; Meso, Peter. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:9:y:2013:i:1:p:47-67. Full description at Econpapers || Download paper | 4 |
| 6 | 2008 | The Role of Emotions in Shaping Consumersâ Privacy Beliefs about Unfamiliar Online Vendors. (2008). Sarathy, Rathindra ; Zhang, Jie ; Li, Han. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:4:y:2008:i:3:p:36-62. Full description at Econpapers || Download paper | 4 |
| 7 | 2012 | An Exploratory Analysis of Data Breaches from 2005-2011: Trends and Insights. (2012). Ayyagari, Ramakrishna. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:8:y:2012:i:2:p:33-56. Full description at Econpapers || Download paper | 4 |
| 8 | 2014 | Comparing the Mobile Device Security Behavior of College Students and Information Technology Professionals. (2014). Furnell, Steven ; Harris, Mark A ; Patten, Karen. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:10:y:2014:i:4:p:186-202. Full description at Econpapers || Download paper | 4 |
| 9 | 2017 | What Affects Users to Click on Display Ads on Social Media? The Roles of Message Values, Involvement, and Security. (2017). Zhang, Jing ; Mao, EN. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:13:y:2017:i:2:p:84-96. Full description at Econpapers || Download paper | 3 |
| 10 | 2017 | Does privacy matter to millennials? The case for personal cloud. (2017). Bartelt, Valerie ; Moqbel, Murad ; Al-Suqri, Mohammed ; Al-Maskari, Azzah. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:13:y:2017:i:1:p:17-33. Full description at Econpapers || Download paper | 3 |
| 11 | 2012 | Students Information Security Practices and Awareness. (2012). Partow-Navid, Parviz ; Slusky, Ludwig. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:8:y:2012:i:4:p:3-26. Full description at Econpapers || Download paper | 3 |
| 12 | 2016 | Perceived deception: Evaluating source credibility and self-efficacy. (2016). Thompson, Samuel C ; Warkentin, Merrill ; Ormond, Dustin ; Johnston, Allen C. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:12:y:2016:i:4:p:197-217. Full description at Econpapers || Download paper | 3 |
| 13 | 2007 | Understanding eTrust. (2007). Sebastianelli, Rose ; Tamimi, Nabil. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:3:y:2007:i:2:p:3-17. Full description at Econpapers || Download paper | 2 |
| 14 | 2011 | An Exploratory Study of the Relationships between Selected Contextual Factors and Information Security Concerns in Global Financial Services Institutions. (2011). Ifinedo, Princely. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:7:y:2011:i:1:p:25-49. Full description at Econpapers || Download paper | 2 |
| 15 | 2012 | Interpreting the Impact of Perceived Privacy and Security Concerns in Patients Use of Online Health Information Systems. (2012). Ambrose, Paul ; Basu, Choton. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:8:y:2012:i:1:p:38-50. Full description at Econpapers || Download paper | 2 |
| 16 | 2008 | An Empirical Investigation on Customerâs Privacy Perceptions, Trust and Security Awareness in E-commerce Environment. (2008). Luo, Xin ; Raja, M K ; Gurung, Anil. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:4:y:2008:i:1:p:42-60. Full description at Econpapers || Download paper | 2 |
| 17 | 2016 | Ca-NIDS: A network intrusion detection system using combinatorial algorithm approach. (2016). Babalola, Y E ; Folorunso, Olusegun ; Ayo, Femi Emmanuel. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:12:y:2016:i:4:p:181-196. Full description at Econpapers || Download paper | 1 |
| 18 | 2016 | The impact of exposure to news about electronic government surveillance on concerns about government intrusion, privacy self-efficacy, and privacy protective behavior. (2016). Mamonov, Stanislav ; Koufaris, Marios. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:12:y:2016:i:2:p:56-67. Full description at Econpapers || Download paper | 1 |
| 19 | 2014 | A Model of Information Security Awareness for Assessing Information Security Risk for Emerging Technologies. (2014). Mejias, Roberto J ; Balthazard, Pierre A. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:10:y:2014:i:4:p:160-185. Full description at Econpapers || Download paper | 1 |
| 20 | 2016 | Information privacy and the digital generation gap: An exploratory study. (2016). Dror, Yuval ; Halperin, Ruth. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:12:y:2016:i:4:p:166-180. Full description at Econpapers || Download paper | 1 |
| 21 | 2013 | I Know Who You Are and I Saw What You Did: Social Networks and the Death of Privacy. (2013). Ashtari, Sadaf. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:9:y:2013:i:4:p:80-82. Full description at Econpapers || Download paper | 1 |
| 22 | 2006 | A Research Framework for Information Systems Security. (2006). Cannoy, Sherrie ; Schilhavy, Richard ; Palvia, Prashant C. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:2:y:2006:i:2:p:3-24. Full description at Econpapers || Download paper | 1 |
| 23 | 2010 | Employee Information Privacy Concerns with Employer Held Data: A Comparison of Two Prevalent Privacy Models. (2010). Ryan, Wright ; Ronald, Pike ; Shawn, Clouse. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:6:y:2010:i:3:p:47-71. Full description at Econpapers || Download paper | 1 |
| 24 | 2015 | M0Droid: An Android Behavioral-Based Malware Detection Model. (2015). Mahmud, Ramlan ; Damshenas, Mohsen ; Choo, Kim-Kwang Raymond ; Dehghantanha, Ali. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:11:y:2015:i:3:p:141-157. Full description at Econpapers || Download paper | 1 |
| 25 | 2013 | Cloud Computing Security Announcements: Assessment of Investors Reaction. (2013). Venkatesan, Srikanth ; Parameswaran, Srikanth ; Gupta, Manish. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:9:y:2013:i:1:p:17-46. Full description at Econpapers || Download paper | 1 |
| 26 | 2008 | Data Protection and Privacy Issue. (2008). Changchit, Chuleeporn. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:4:y:2008:i:3:p:1-2. Full description at Econpapers || Download paper | 1 |
| 27 | 2014 | Factors for Measuring Password-Based Authentication Practices. (2014). Levy, Yair ; Furnell, Steven ; Mattord, Herbert J. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:10:y:2014:i:2:p:71-94. Full description at Econpapers || Download paper | 1 |
| 28 | 2016 | Personnel security and open source intelligence: Employing social media analytics in pre-employment screening and selection. (2016). Montaquila, Julian M ; Godwin, Cierra N. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:12:y:2016:i:3:p:145-159. Full description at Econpapers || Download paper | 1 |
| 29 | 2010 | Determinants of Behavioral Responses to Online Privacy: The Effects of Concern, Risk Beliefs, Self-Efficacy, and Communication Sources on Self-Protection Strategies. (2010). Hichang, Cho. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:6:y:2010:i:1:p:3-27. Full description at Econpapers || Download paper | 1 |
| 30 | 2015 | Cross-Site Scripting (XSS) Abuse and Defense: Exploitation on Several Testing Bed Environments and Its Defense. (2015). Gupta, S ; Gangwar, S ; Meena, P K ; Kumar, M. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:11:y:2015:i:2:p:118-136. Full description at Econpapers || Download paper | 1 |
| 31 | 2016 | Social Physics: How Good Ideas Spread-The Lessons from a New Science, by Alex Pentland. (2016). Arslan, Faruk. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:12:y:2016:i:4:p:218-220. Full description at Econpapers || Download paper | 1 |
| 32 | 2011 | Security Risk Management at a Fortune 500 Firm: A Case Study. (2011). Zafar, Humayun. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:7:y:2011:i:4:p:23-53. Full description at Econpapers || Download paper | 1 |
| 33 | 2016 | The role of personalized services and control: An empirical evaluation of privacy calculus and technology acceptance model in the mobile context. (2016). Liu, Zhan ; Pigneur, Yves ; Shan, Jialu. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:12:y:2016:i:3:p:123-144. Full description at Econpapers || Download paper | 1 |
| 34 | 2013 | An Empirical Investigation of Privacy Awareness and Concerns on Social Networking Sites. (2013). Hazari, Sunil ; Brown, Cheryl. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:9:y:2013:i:4:p:31-51. Full description at Econpapers || Download paper | 1 |
| 35 | 2009 | Security and Privacy Governance: Criteria for Systems Design. (2009). Beebe, Nicole Lang ; Shepherd, Linda ; Williams, Karen ; Clark, Jan Gayness. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:5:y:2009:i:4:p:3-30. Full description at Econpapers || Download paper | 1 |
| 36 | 2015 | Review of the Information Security and Privacy Challenges in Bring Your Own Device (BYOD) Environments. (2015). Kenworthy, William ; Armarego, Jocelyn ; Murray, David ; Garba, Abubakar Bello. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:11:y:2015:i:1:p:38-54. Full description at Econpapers || Download paper | 1 |
| 37 | 2007 | Knowledge Sharing in Law Enforcement: A Case Study. (2007). Zhang, YI ; Bhaskar, Rahul. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:3:y:2007:i:3:p:45-68. Full description at Econpapers || Download paper | 1 |
| 38 | 2011 | Individual Trust and Consumer Risk Perception. (2011). James, Tabitha ; Khansa, Lara ; Kim, Byung Cho. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:7:y:2011:i:3:p:3-22. Full description at Econpapers || Download paper | 1 |
| 39 | 2016 | Social media analytics: Security and privacy issues. (2016). Chung, Wingyan. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:12:y:2016:i:3:p:105-106. Full description at Econpapers || Download paper | 1 |
| 40 | 2013 | A Framework for Addressing Data Privacy Issues in E-Governance Projects. (2013). Bose, Indranil ; Jha, Ashish Kumar. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:9:y:2013:i:3:p:18-33. Full description at Econpapers || Download paper | 1 |
| 41 | 2017 | Long-term market implications of data breaches, not. (2017). Lange, Russell ; Burger, Eric W. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:13:y:2017:i:4:p:186-206. Full description at Econpapers || Download paper | 1 |
| 42 | 2009 | Business and Security Executives Views of Information Security Investment Drivers: Results from a Delphi Study. (2009). Johnson, Alice M. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:5:y:2009:i:1:p:3-27. Full description at Econpapers || Download paper | 1 |
| 43 | 2012 | Analyzing Information Systems Security Research to Find Key Topics, Trends, and Opportunities. (2012). Blake, Roger ; Ayyagari, Ramakrishna. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:8:y:2012:i:3:p:37-67. Full description at Econpapers || Download paper | 1 |
| # | Year | Title | Cited |
|---|---|---|---|
| 1 | 2005 | Mobile Payment Adoption in the US: A Cross-industry, Crossplatform Solution. (2005). Dewan, Sunil G ; Chen, Lei-Da. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:1:y:2005:i:2:p:4-28. Full description at Econpapers || Download paper | 6 |
| 2 | 2008 | An Empirical Investigation on Customerâs Privacy Perceptions, Trust and Security Awareness in E-commerce Environment. (2008). Luo, Xin ; Raja, M K ; Gurung, Anil. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:4:y:2008:i:1:p:42-60. Full description at Econpapers || Download paper | 2 |
| 3 | 2013 | Applying Protection Motivation Theory to Information Security Training for College Students. (2013). Ding, YI ; Xu, Shuting ; Meso, Peter. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:9:y:2013:i:1:p:47-67. Full description at Econpapers || Download paper | 2 |
| 4 | 2016 | Perceived deception: Evaluating source credibility and self-efficacy. (2016). Thompson, Samuel C ; Warkentin, Merrill ; Ormond, Dustin ; Johnston, Allen C. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:12:y:2016:i:4:p:197-217. Full description at Econpapers || Download paper | 2 |
| 5 | 2012 | An Exploratory Analysis of Data Breaches from 2005-2011: Trends and Insights. (2012). Ayyagari, Ramakrishna. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:8:y:2012:i:2:p:33-56. Full description at Econpapers || Download paper | 2 |
| 6 | 2017 | What Affects Users to Click on Display Ads on Social Media? The Roles of Message Values, Involvement, and Security. (2017). Zhang, Jing ; Mao, EN. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:13:y:2017:i:2:p:84-96. Full description at Econpapers || Download paper | 2 |
| Year | Title |
|---|