Mobile version of SCIRP

Scientific Research
An Academic Publisher

OPEN       ACCESS

Login
  • Home
  • Articles
  • Journals
  • Books
  • News
  • About
  • Submit
Home > Journals > Computer Science & Communications >JIS
Journal of Information Security

Journal of Information Security

ISSN Print: 2153-1234
ISSN Online: 2153-1242
Website: https://www.scirp.org/journal/jis
E-mail: jis@scirp.org
Google-based Impact Factor: 2.08    
Citations     h5-index & Ranking
Submission
  • Articles
  • Archive
  • Indexing
  • Aims & Scope
  • Editorial Board
  • For Authors
  • Publication Fees
Coming soon ...
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
    2016 »
    5 4 3 2 1

Volume 7, Number 2, March 2016 (Special Issue on Cybersecurity Investments)

Cover Page, Table of Contents and Others: PDF (size: 1375KB)

    The “Iterated Weakest Link” Model of Adaptive Security Investment ()

    Rainer Böhme, Tyler Moore

    Journal of Information Security Vol.7 No.2,  March 31, 2016

    DOI: 10.4236/jis.2016.72006  2,630 Downloads  3,293 Views   Citations
    This article belongs to the Special Issue on

    Is Public Co-Ordination of Investment in Information Security Desirable? ()

    Christos Ioannidis, David Pym, Julian Williams

    Journal of Information Security Vol.7 No.2,  March 30, 2016

    DOI: 10.4236/jis.2016.72005  2,688 Downloads  3,256 Views   Citations
    This article belongs to the Special Issue on

    Investing in Cybersecurity: Insights from the Gordon-Loeb Model ()

    Lawrence A. Gordon, Martin P. Loeb, Lei Zhou

    Journal of Information Security Vol.7 No.2,  March 23, 2016

    DOI: 10.4236/jis.2016.72004  4,752 Downloads  7,643 Views   Citations
    This article belongs to the Special Issue on

    Empirical Investigation of Threats to Loyalty Programs by Using Models Inspired by the Gordon-Loeb Formulation of Security Investment ()

    Shiori Shinoda, Kanta Matsuura

    Journal of Information Security Vol.7 No.2,  March 17, 2016

    DOI: 10.4236/jis.2016.72003  2,066 Downloads  2,718 Views   Citations
    This article belongs to the Special Issue on

    Cybersecurity Investment Guidance: Extensions of the Gordon and Loeb Model ()

    Scott Farrow, Jules Szanton

    Journal of Information Security Vol.7 No.2,  March 16, 2016

    DOI: 10.4236/jis.2016.72002  2,500 Downloads  3,338 Views   Citations
    This article belongs to the Special Issue on

to be published

● Open Special Issues

● Published Special Issues

● Special Issues Guideline

JIS Subscription
E-Mail Alert
JIS Most popular papers
Publication Ethics & OA Statement
History Issue
JIS News
Frequently Asked Questions
Recommend to Peers
Recommend to Library
Contact Us
Disclaimer
Follow SCIRP Home About SCIRP Service Policies
Journals A-Z Journals by Subject Manuscript Tracking System Open Access
Books For Authors Translation & Proofreading Publication Ethics
Jobs Publication Fees Careers Preservation
Blog Special Issues Subscription Retraction
Submission System Login Sitemap Peer-Review Resources Frequently Asked Questions Advertising
Contact Us News Volume & Issue Privacy Policy
Copyright © 2006-2021 Scientific Research Publishing Inc. All Rights Reserved.