Is this page useful for you? Then, help us to keep the service working. Please have a look to our donations page ... Thanks for your help!!

Citation Profile [Updated: 2025-11-20 18:08:17]
5 Years H Index
4
Impact Factor (IF)
0
5 Years IF
0
Data available in this report

[Raw data] [50 most cited papers] [50 most relevant papers] [cites used to compute IF] [Recent citations ][Frequent citing series ] [more data in EconPapers] [trace new citations] [Missing citations? Add them now] [Incorrect content? Let us know]

Main indicators
Raw Data

 

IF AIF CIF IF5 DOC CDO CIT NCI CCU D2Y C2Y D5Y C5Y SC %SC CiY II AII
2005 0 0.5 0 0 25 25 24 0 0 0 0 0 0.23
2006 0 0.49 0 0 24 49 0 0 25 25 0 0 0.22
2007 0 0.44 0 0 24 73 2 0 49 49 0 0 0.2
2008 0 0.47 0.01 0.01 24 97 6 1 1 48 73 1 0 0 0.22
2009 0 0.46 0 0 24 121 1 1 48 97 0 0 0.23
2010 0 0.46 0 0 24 145 1 1 48 121 0 0 0.2
2011 0 0.51 0.01 0 24 169 3 2 3 48 120 0 0 0.24
2012 0 0.5 0 0 24 193 19 3 48 120 0 0 0.21
2013 0 0.54 0 0 23 216 14 3 48 120 0 0 0.24
2014 0 0.53 0 0 20 236 4 1 4 47 119 0 0 0.22
2015 0.05 0.53 0.02 0.02 25 261 2 4 8 43 2 115 2 0 0 0.22
2016 0.02 0.5 0.01 0.02 20 281 9 4 12 45 1 116 2 0 0 0.2
2017 0.02 0.52 0.01 0.03 27 308 6 4 16 45 1 112 3 0 0 0.21
IF: Two years Impact Factor: C2Y / D2Y
AIF: Average Impact Factor for all series in RePEc in year y
CIF: Cumulative impact factor
IF5: Five years Impact Factor: C5Y / D5Y
DOC: Number of documents published in year y
CDO: Cumulative number of documents published until year y
CIT: Number of citations to papers published in year y
NCI: Number of citations in year y
CCU: Cumulative number of citations to papers published until year y
D2Y: Number of articles published in y-1 plus y-2
C2Y: Cites in y to articles published in y-1 plus y-2
D5Y: Number of articles published in y-1 until y-5
C5Y: Cites in y to articles published in y-1 until y-5
SC: selft citations in y to articles published in y-1 plus y-2
%SC: Percentage of selft citations in y to articles published in y-1 plus y-2
CiY: Cites in year y to documents published in year y
II: Immediacy Index: CiY / Documents.
AII: Average Immediacy Index for series in RePEc in year y
50 most cited documents in this series
#YearTitleCited
12005Mobile Payment Adoption in the US: A Cross-industry, Crossplatform Solution. (2005). Dewan, Sunil G ; Chen, Lei-Da. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:1:y:2005:i:2:p:4-28.

Full description at Econpapers || Download paper

14
22005Perceptions of Information Security in the Workplace: Linking Information Security Climate to Compliant Behavior. (2005). Chan, Mark ; Woon, Irene ; Kankanhalli, Atreyi. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:1:y:2005:i:3:p:18-41.

Full description at Econpapers || Download paper

11
32012Stock Market Response to Information Security Breach: A Study Using Firm and Attack Characteristics. (2012). Das, Saini ; Anand, Manoj ; Mukhopadhyay, Arunabha. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:8:y:2012:i:4:p:27-55.

Full description at Econpapers || Download paper

10
42013Control-Related Motivations and Information Security Policy Compliance: The Role of Autonomy and Efficacy. (2013). Palvia, Prashant ; Lowry, Paul Benjamin ; Wall, Jeffrey D. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:9:y:2013:i:4:p:52-79.

Full description at Econpapers || Download paper

7
52013Applying Protection Motivation Theory to Information Security Training for College Students. (2013). Ding, YI ; Xu, Shuting ; Meso, Peter. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:9:y:2013:i:1:p:47-67.

Full description at Econpapers || Download paper

4
62008The Role of Emotions in Shaping Consumers’ Privacy Beliefs about Unfamiliar Online Vendors. (2008). Sarathy, Rathindra ; Zhang, Jie ; Li, Han. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:4:y:2008:i:3:p:36-62.

Full description at Econpapers || Download paper

4
72012An Exploratory Analysis of Data Breaches from 2005-2011: Trends and Insights. (2012). Ayyagari, Ramakrishna. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:8:y:2012:i:2:p:33-56.

Full description at Econpapers || Download paper

4
82014Comparing the Mobile Device Security Behavior of College Students and Information Technology Professionals. (2014). Furnell, Steven ; Harris, Mark A ; Patten, Karen. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:10:y:2014:i:4:p:186-202.

Full description at Econpapers || Download paper

4
92017What Affects Users to Click on Display Ads on Social Media? The Roles of Message Values, Involvement, and Security. (2017). Zhang, Jing ; Mao, EN. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:13:y:2017:i:2:p:84-96.

Full description at Econpapers || Download paper

3
102017Does privacy matter to millennials? The case for personal cloud. (2017). Bartelt, Valerie ; Moqbel, Murad ; Al-Suqri, Mohammed ; Al-Maskari, Azzah. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:13:y:2017:i:1:p:17-33.

Full description at Econpapers || Download paper

3
112012Students Information Security Practices and Awareness. (2012). Partow-Navid, Parviz ; Slusky, Ludwig. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:8:y:2012:i:4:p:3-26.

Full description at Econpapers || Download paper

3
122016Perceived deception: Evaluating source credibility and self-efficacy. (2016). Thompson, Samuel C ; Warkentin, Merrill ; Ormond, Dustin ; Johnston, Allen C. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:12:y:2016:i:4:p:197-217.

Full description at Econpapers || Download paper

3
132007Understanding eTrust. (2007). Sebastianelli, Rose ; Tamimi, Nabil. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:3:y:2007:i:2:p:3-17.

Full description at Econpapers || Download paper

2
142011An Exploratory Study of the Relationships between Selected Contextual Factors and Information Security Concerns in Global Financial Services Institutions. (2011). Ifinedo, Princely. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:7:y:2011:i:1:p:25-49.

Full description at Econpapers || Download paper

2
152012Interpreting the Impact of Perceived Privacy and Security Concerns in Patients Use of Online Health Information Systems. (2012). Ambrose, Paul ; Basu, Choton. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:8:y:2012:i:1:p:38-50.

Full description at Econpapers || Download paper

2
162008An Empirical Investigation on Customer’s Privacy Perceptions, Trust and Security Awareness in E-commerce Environment. (2008). Luo, Xin ; Raja, M K ; Gurung, Anil. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:4:y:2008:i:1:p:42-60.

Full description at Econpapers || Download paper

2
172016Ca-NIDS: A network intrusion detection system using combinatorial algorithm approach. (2016). Babalola, Y E ; Folorunso, Olusegun ; Ayo, Femi Emmanuel. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:12:y:2016:i:4:p:181-196.

Full description at Econpapers || Download paper

1
182016The impact of exposure to news about electronic government surveillance on concerns about government intrusion, privacy self-efficacy, and privacy protective behavior. (2016). Mamonov, Stanislav ; Koufaris, Marios. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:12:y:2016:i:2:p:56-67.

Full description at Econpapers || Download paper

1
192014A Model of Information Security Awareness for Assessing Information Security Risk for Emerging Technologies. (2014). Mejias, Roberto J ; Balthazard, Pierre A. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:10:y:2014:i:4:p:160-185.

Full description at Econpapers || Download paper

1
202016Information privacy and the digital generation gap: An exploratory study. (2016). Dror, Yuval ; Halperin, Ruth. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:12:y:2016:i:4:p:166-180.

Full description at Econpapers || Download paper

1
212013I Know Who You Are and I Saw What You Did: Social Networks and the Death of Privacy. (2013). Ashtari, Sadaf. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:9:y:2013:i:4:p:80-82.

Full description at Econpapers || Download paper

1
222006A Research Framework for Information Systems Security. (2006). Cannoy, Sherrie ; Schilhavy, Richard ; Palvia, Prashant C. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:2:y:2006:i:2:p:3-24.

Full description at Econpapers || Download paper

1
232010Employee Information Privacy Concerns with Employer Held Data: A Comparison of Two Prevalent Privacy Models. (2010). Ryan, Wright ; Ronald, Pike ; Shawn, Clouse. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:6:y:2010:i:3:p:47-71.

Full description at Econpapers || Download paper

1
242015M0Droid: An Android Behavioral-Based Malware Detection Model. (2015). Mahmud, Ramlan ; Damshenas, Mohsen ; Choo, Kim-Kwang Raymond ; Dehghantanha, Ali. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:11:y:2015:i:3:p:141-157.

Full description at Econpapers || Download paper

1
252013Cloud Computing Security Announcements: Assessment of Investors Reaction. (2013). Venkatesan, Srikanth ; Parameswaran, Srikanth ; Gupta, Manish. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:9:y:2013:i:1:p:17-46.

Full description at Econpapers || Download paper

1
262008Data Protection and Privacy Issue. (2008). Changchit, Chuleeporn. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:4:y:2008:i:3:p:1-2.

Full description at Econpapers || Download paper

1
272014Factors for Measuring Password-Based Authentication Practices. (2014). Levy, Yair ; Furnell, Steven ; Mattord, Herbert J. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:10:y:2014:i:2:p:71-94.

Full description at Econpapers || Download paper

1
282016Personnel security and open source intelligence: Employing social media analytics in pre-employment screening and selection. (2016). Montaquila, Julian M ; Godwin, Cierra N. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:12:y:2016:i:3:p:145-159.

Full description at Econpapers || Download paper

1
292010Determinants of Behavioral Responses to Online Privacy: The Effects of Concern, Risk Beliefs, Self-Efficacy, and Communication Sources on Self-Protection Strategies. (2010). Hichang, Cho. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:6:y:2010:i:1:p:3-27.

Full description at Econpapers || Download paper

1
302015Cross-Site Scripting (XSS) Abuse and Defense: Exploitation on Several Testing Bed Environments and Its Defense. (2015). Gupta, S ; Gangwar, S ; Meena, P K ; Kumar, M. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:11:y:2015:i:2:p:118-136.

Full description at Econpapers || Download paper

1
312016Social Physics: How Good Ideas Spread-The Lessons from a New Science, by Alex Pentland. (2016). Arslan, Faruk. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:12:y:2016:i:4:p:218-220.

Full description at Econpapers || Download paper

1
322011Security Risk Management at a Fortune 500 Firm: A Case Study. (2011). Zafar, Humayun. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:7:y:2011:i:4:p:23-53.

Full description at Econpapers || Download paper

1
332016The role of personalized services and control: An empirical evaluation of privacy calculus and technology acceptance model in the mobile context. (2016). Liu, Zhan ; Pigneur, Yves ; Shan, Jialu. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:12:y:2016:i:3:p:123-144.

Full description at Econpapers || Download paper

1
342013An Empirical Investigation of Privacy Awareness and Concerns on Social Networking Sites. (2013). Hazari, Sunil ; Brown, Cheryl. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:9:y:2013:i:4:p:31-51.

Full description at Econpapers || Download paper

1
352009Security and Privacy Governance: Criteria for Systems Design. (2009). Beebe, Nicole Lang ; Shepherd, Linda ; Williams, Karen ; Clark, Jan Gayness. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:5:y:2009:i:4:p:3-30.

Full description at Econpapers || Download paper

1
362015Review of the Information Security and Privacy Challenges in Bring Your Own Device (BYOD) Environments. (2015). Kenworthy, William ; Armarego, Jocelyn ; Murray, David ; Garba, Abubakar Bello. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:11:y:2015:i:1:p:38-54.

Full description at Econpapers || Download paper

1
372007Knowledge Sharing in Law Enforcement: A Case Study. (2007). Zhang, YI ; Bhaskar, Rahul. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:3:y:2007:i:3:p:45-68.

Full description at Econpapers || Download paper

1
382011Individual Trust and Consumer Risk Perception. (2011). James, Tabitha ; Khansa, Lara ; Kim, Byung Cho. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:7:y:2011:i:3:p:3-22.

Full description at Econpapers || Download paper

1
392016Social media analytics: Security and privacy issues. (2016). Chung, Wingyan. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:12:y:2016:i:3:p:105-106.

Full description at Econpapers || Download paper

1
402013A Framework for Addressing Data Privacy Issues in E-Governance Projects. (2013). Bose, Indranil ; Jha, Ashish Kumar. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:9:y:2013:i:3:p:18-33.

Full description at Econpapers || Download paper

1
412017Long-term market implications of data breaches, not. (2017). Lange, Russell ; Burger, Eric W. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:13:y:2017:i:4:p:186-206.

Full description at Econpapers || Download paper

1
422009Business and Security Executives Views of Information Security Investment Drivers: Results from a Delphi Study. (2009). Johnson, Alice M. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:5:y:2009:i:1:p:3-27.

Full description at Econpapers || Download paper

1
432012Analyzing Information Systems Security Research to Find Key Topics, Trends, and Opportunities. (2012). Blake, Roger ; Ayyagari, Ramakrishna. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:8:y:2012:i:3:p:37-67.

Full description at Econpapers || Download paper

1
50 most relevant documents in this series (papers most cited in the last two years)
#YearTitleCited
12005Mobile Payment Adoption in the US: A Cross-industry, Crossplatform Solution. (2005). Dewan, Sunil G ; Chen, Lei-Da. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:1:y:2005:i:2:p:4-28.

Full description at Econpapers || Download paper

6
22008An Empirical Investigation on Customer’s Privacy Perceptions, Trust and Security Awareness in E-commerce Environment. (2008). Luo, Xin ; Raja, M K ; Gurung, Anil. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:4:y:2008:i:1:p:42-60.

Full description at Econpapers || Download paper

2
32013Applying Protection Motivation Theory to Information Security Training for College Students. (2013). Ding, YI ; Xu, Shuting ; Meso, Peter. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:9:y:2013:i:1:p:47-67.

Full description at Econpapers || Download paper

2
42016Perceived deception: Evaluating source credibility and self-efficacy. (2016). Thompson, Samuel C ; Warkentin, Merrill ; Ormond, Dustin ; Johnston, Allen C. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:12:y:2016:i:4:p:197-217.

Full description at Econpapers || Download paper

2
52012An Exploratory Analysis of Data Breaches from 2005-2011: Trends and Insights. (2012). Ayyagari, Ramakrishna. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:8:y:2012:i:2:p:33-56.

Full description at Econpapers || Download paper

2
62017What Affects Users to Click on Display Ads on Social Media? The Roles of Message Values, Involvement, and Security. (2017). Zhang, Jing ; Mao, EN. In: Journal of Information Privacy and Security. RePEc:taf:uipsxx:v:13:y:2017:i:2:p:84-96.

Full description at Econpapers || Download paper

2
Citing documents used to compute impact factor:
YearTitle
Recent citations