Below are articles published by University of Fairfax faculty and students. These articles may be downloaded for research purposes only, and may not be re-distributed.
If you have published an article and would like it included in this listing, please send a link and citation to librarian@ufairfax.edu
Belshaw, Alan
Belshaw, A. (2008). Information Technology Compliance Best Practices [White Paper]. Compliance Authority Magazine.
Belshaw, A. (2008). Contrasting Payment Card Industry Data Security Standard (PCI DSS) Compliance Solutions with a Best Practices Approach to Information Security [White Paper]. Compliance Authority Magazine.
Cline, Bryan S.
Cline, B. (2009). Organizational Barriers to the Implementation of Security Engineering. IAS '09 Proceedings of the 2009 Fifth International Conference on Information Assurance and Security 2, 527-531. doi:10.1109/IAS.2009.61.
Comings, David
Ting, W. W., & Comings, D.R. (2010). Information Assurance Metric for Assessing NIST's Monitoring Step in the Risk Management Framework. Information Security Journal: A Global Perspective, 19(5), 253-262. doi:10.1080/19393555.2010.514650.
Farrell, Rhonda
Farrell, R. (2010). Securing the Cloud - Governance, Risk, and Compliance Issues Reign Supreme. Information Security Journal: A Global Perspective, Special Section: Cloud Computing, 19(6), 310-319. doi:10.1080/19393555.2010.514655.
Godlove, Timothy
Godlove, T. (2017). Improving Information Security of Teleworkers. Retrieved from https://www.ufairfax.edu/news/Improving-Information-Security-for-Teleworkers-20170113-0022
Godlove, T. (2015). Dynamic Tensions: Essays on Balancing Privacy, Security, & Identity in the 21th Century, Freeport, NY: Giant Steps Press.
Godlove, T. (2015). Guide to Healthcare Information Protection and Privacy for Executives, (First ed.). Freeport, NY: Giant Steps Press.
Godlove, T. & Ball, A, (2015). Patient Matching within a Health Information Exchange. Perspectives in Health Information Management (Spring 2015): 1-11.
Godlove, T. (2014). 2020: What will Information Security look like in 5 years? Retrieved from https://www.ufairfax.edu/news/2020-What-will-Information-Security-look-like-in-5-years-20141126-1328
Godlove, T. & Ball, A., (2013). National Patient Identifier and Patient Privacy in the Digital Era, Information Security Management Handbook, Sixth Edition, Volume 7.
Godlove, T. (2012). Examination of the Factors that Influence Teleworkers' Willingness to Comply with Information Security Guidelines. Information Security Journal: A Global Perspective, 21(4), 216-229. doi:10.1080/19393555.2012.668747
Godlove, T. (2011). Data Security and Privacy Issues in the Digital Era. The Security Journal, 35(1), 4-8.
Godlove, T. (2011). Identity and Privacy in the Digital Era. The Security Journal, 34(Summer), 4-9.
Godlove, T. (2010). Concerns of Identity and Anonymity in a Digital Era. The Security Journal, 33(Fall), 4-9.
Godlove, T. (2010). Telework and Mobile Computing Security Concerns and Risks. The Security Journal, 32(Summer), 5-10.
Godlove, T. (2010). Privacy Concerns Regarding Electronic Health Records. The Security Journal, 31(Spring), 4-9.
Godlove, T., Van Beuge, D. (2010). Why Every Organization Should Have a Data Protection Strategy. The Security Journal 30(Winter), 4-9.
Godlove, T. (2009). Information Security Against Theft and Disruption, Part 2 The Security Journal, 29(Fall), 4-7.
Godlove, T. (2009). Information Security Against Theft and Disruption, Part 1. The Security Journal, 28(Summer), 4-8.
Herrod, Chrisan
Herrod, C. (2004). Chapter 3 in Oliva, L.(Ed.) in IT Solutions Series: Information Technology Security: Advice from Experts (pp. 67-93). doi: 10.4018/978-1-59140-247-3.ch003.
Lazarevich, Aleksandar
Lazarevich, A. (2008). Decision Support Tools for Cyber Crime Investigations. Saarbrücken, Germany: VDM Verlag.
McLaughlin, Kevin
McLaughlin, K. (2010). Centralization, Decentralization, and the Impact on Information Security. IAnewsletter, 14(1), 8-11.
McLaughlin, K. (2010). Workplace Privacy in the Cyber Age:Really? IANewsletter, 13(4), 12-15.
McLaughlin, K. (2011).Cyber Attack! Is a Counter Attack Warranted? Information Security Journal: A Global Perspective , 20(1), 58-64. doi:10.1080/19393555.2010.544705
Quagliata, Karen
Quagliata, K.(2011). Security Awareness Training - What Matters Most? The Security Journal, 35(1), 14-19.
Quagliata, K.(2011). JOnline: Impact of Security Awareness Training Components on Perceived Security Effectiveness, ISACA Journal Online, 4.
Smith, Jeffrey
Smith, J. (2010). Sustainability is Dynamic. Kansas City ASPA One Page Journal. Fall 2010 Issue. Retrieved from http://aspakcjournal.wordpress.com/articles/fall-2010-issue/jeff-smith-article/
Smith, J. (2011). Factors Impacting Information Security in Selection of a Compliance Methodology, Taxonomy, or Framework. Information Systems Security. Retrieved from http://www.infosectoday.com/Articles/Compliance-Methodology.htm
Ting, Wendy
Ting, W. W., & Comings, D.R. (2010). Information Assurance Metric for Assessing NIST's Monitoring Step in the Risk Management Framework. Information Security Journal: A Global Perspective, 19(5), 253-262. doi:10.1080/19393555.2010.514650