Volume 16,
Number 1,
2006
Volume 16,
Number 2,
2006
Privacy and anonymity in the digital era
- Vicente Benjumea, Javier Lopez, José M. Troya:
Anonymous attribute certificates based on traceable signatures.
120-139
- Evangelia Kavakli, Christos Kalloniatis, Pericles Loucopoulos, Stefanos Gritzalis:
Incorporating privacy requirements into the system design process: The PriS conceptual framework.
140-158
- Krzysztof Piotrowski, Peter Langendörfer, Oliver Maye, Zoya Dyka:
Protecting privacy in e-cash schemes by securing hidden identity approaches against statistical attacks.
159-169
- Leonidas Kazatzopoulos, Constantinos Delakouridis, Giannis F. Marias, Panagiotis Georgiadis:
An incentive-based architecture to enable privacy in dynamic environments.
171-189
- Aameek Singh, Bugra Gedik, Ling Liu:
Agyaat: mutual anonymity over structured P2P networks.
189-212
- Jin-Qiao Shi, Binxing Fang, Li-Jie Shao:
n-1) attack.">Regroup-And-Go mixes to counter the (n-1) attack.
213-223
Volume 16,
Number 3,
2006
- Carlos Flavián, Raquel Gurrea:
The choice of digital newspapers: influence of reader goals and user experience.
231-247
- Mamata Jenamani, Pratap K. J. Mohapatra, Sujoy Ghose:
Design benchmarking, user behavior analysis and link-structure personalization in commercial web sites.
248-266
- Pradeep Korgaonkar, Ronnie Silverblatt, Tulay Girard:
Online retailing, product classifications, and consumer preferences.
267-288
- Matthew K. O. Lee, Christy M. K. Cheung, Kai H. Lim, Choon-Ling Sia:
Understanding customer knowledge sharing in web-based discussion boards: An exploratory study.
289-303
- Katariina Mäenpää:
Clustering the consumers on the basis of their perceptions of the Internet banking services.
304-322
- Huseyin Cenk Ozmutlu, Fatih Çavdur, Seda Ozmutlu:
Automatic new topic identification in search engine transaction logs.
323-338
- Jennifer Rowley:
An analysis of the e-service literature: towards a research agenda.
339-359
Volume 16,
Number 4,
2006
- Hsin-Pin Fu, Tien-Hsiang Chang, Pei Chao, Chyou-Huey Chiou:
A collaborative model for service provision by multiple public-sector agencies.
365-379
- Carla Ruiz-Mafé, Silvia Sanz-Blas:
Explaining Internet dependency: An exploratory study of future purchase intention of Spanish Internet users.
380-397
- Rong-An Shang, Yu-Chen Chen, Hsueh-Jung Liao:
The value of participation in virtual consumer communities on brand loyalty.
398-418
- Amanda Spink, Bernard J. Jansen, Vinish Kathuria, Sherry Koshman:
Overlap among major web search engines.
419-426
- Yu-Hui Tao, Chu-Chen Rosa Yeh, Sheng-I Sun:
Improving training needs assessment processes via the Internet: system design and qualitative study.
427-449
- Pablo Zoghbi Manrique de Lara, Domingo Verano Tacoronte, Jyh-Ming Ting Ding:
Do current anti-cyberloafing disciplinary practices have a replica in research findings?: A study of the effects of coercive strategies on workplace Internet misuse.
450-467
Volume 16,
Number 5,
2006
Apart-themed issue on internet security
- Leisheng Peng, Duminda Wijesekera, Thomas C. Wingfield, James Bret Michael:
An ontology-based distributed whiteboard to determine legal responses to online cyber attacks.
475-490
- Michael Hafner, Ruth Breu, Berthold Agreiter, Andrea Nowak:
Sectet: an extensible framework for the realization of secure inter-organizational workflows.
491-506
- Charlott Eliasson, André Zúquete:
An electronic voting system supporting vote weights.
507-518
- David G. Rosado, Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini:
Security patterns and requirements for internet-based applications.
519-536
- Gi Woong Yun, Jay Ford, Robert P. Hawkins, Suzanne Pingree, Fiona McTavish, David H. Gustafson, Haile Berhe:
On the validity of client-side vs server-side web log data analysis.
537-552
- Dong Hee Shin:
Distributed inter-organizational systems and innovation processes.
553-572
Copyright © Fri Mar 12 17:28:58 2010
by Michael Ley (ley@uni-trier.de)