Skip to Main Content
Library Home

Research Resources

Articles

Below are articles published by University of Fairfax faculty and students. These articles may be downloaded for research purposes only, and may not be re-distributed.

If you have published an article and would like it included in this listing, please send a link and citation to librarian@ufairfax.edu

Belshaw, Alan

Belshaw, A. (2008). Information Technology Compliance Best Practices [White Paper]. Compliance Authority Magazine.

Belshaw, A. (2008). Contrasting Payment Card Industry Data Security Standard (PCI DSS) Compliance Solutions with a Best Practices Approach to Information Security [White Paper]. Compliance Authority Magazine.

Cline, Bryan S.

Cline, B. (2009). Organizational Barriers to the Implementation of Security Engineering. IAS '09 Proceedings of the 2009 Fifth International Conference on Information Assurance and Security 2, 527-531. doi:10.1109/IAS.2009.61.

Comings, David

Ting, W. W., & Comings, D.R. (2010). Information Assurance Metric for Assessing NIST's Monitoring Step in the Risk Management Framework. Information Security Journal: A Global Perspective, 19(5), 253-262. doi:10.1080/19393555.2010.514650.

Farrell, Rhonda

Farrell, R. (2010). Securing the Cloud - Governance, Risk, and Compliance Issues Reign Supreme. Information Security Journal: A Global Perspective, Special Section: Cloud Computing, 19(6), 310-319. doi:10.1080/19393555.2010.514655.

Godlove, Timothy

Godlove, T. (2017). Improving Information Security of Teleworkers. Retrieved from https://www.ufairfax.edu/news/Improving-Information-Security-for-Teleworkers-20170113-0022

Godlove, T. (2015). Dynamic Tensions: Essays on Balancing Privacy, Security, & Identity in the 21th Century, Freeport, NY: Giant Steps Press.

Godlove, T. (2015). Guide to Healthcare Information Protection and Privacy for Executives, (First ed.). Freeport, NY: Giant Steps Press.

Godlove, T. & Ball, A, (2015). Patient Matching within a Health Information Exchange. Perspectives in Health Information Management (Spring 2015): 1-11.

Godlove, T. (2014). 2020: What will Information Security look like in 5 years? Retrieved from https://www.ufairfax.edu/news/2020-What-will-Information-Security-look-like-in-5-years-20141126-1328

Godlove, T. & Ball, A., (2013). National Patient Identifier and Patient Privacy in the Digital Era, Information Security Management Handbook, Sixth Edition, Volume 7.

Godlove, T. (2012). Examination of the Factors that Influence Teleworkers' Willingness to Comply with Information Security Guidelines. Information Security Journal: A Global Perspective, 21(4), 216-229. doi:10.1080/19393555.2012.668747

Godlove, T. (2011). Data Security and Privacy Issues in the Digital Era. The Security Journal, 35(1), 4-8.

Godlove, T. (2011). Identity and Privacy in the Digital Era. The Security Journal, 34(Summer), 4-9.

Godlove, T. (2010). Concerns of Identity and Anonymity in a Digital Era. The Security Journal, 33(Fall), 4-9.

Godlove, T. (2010). Telework and Mobile Computing Security Concerns and Risks. The Security Journal, 32(Summer), 5-10.

Godlove, T. (2010). Privacy Concerns Regarding Electronic Health Records. The Security Journal, 31(Spring), 4-9.

Godlove, T., Van Beuge, D. (2010). Why Every Organization Should Have a Data Protection Strategy. The Security Journal 30(Winter), 4-9.

Godlove, T. (2009). Information Security Against Theft and Disruption, Part 2 The Security Journal, 29(Fall), 4-7.

Godlove, T. (2009). Information Security Against Theft and Disruption, Part 1. The Security Journal, 28(Summer), 4-8.

Herrod, Chrisan

Herrod, C. (2004). Chapter 3 in Oliva, L.(Ed.) in IT Solutions Series: Information Technology Security: Advice from Experts (pp. 67-93). doi: 10.4018/978-1-59140-247-3.ch003.

Lazarevich, Aleksandar

Lazarevich, A. (2008). Decision Support Tools for Cyber Crime Investigations. Saarbrücken, Germany: VDM Verlag.

McLaughlin, Kevin

McLaughlin, K. (2010). Centralization, Decentralization, and the Impact on Information Security. IAnewsletter, 14(1), 8-11.

McLaughlin, K. (2010). Workplace Privacy in the Cyber Age:Really? IANewsletter, 13(4), 12-15.

McLaughlin, K. (2011).Cyber Attack! Is a Counter Attack Warranted? Information Security Journal: A Global Perspective , 20(1), 58-64. doi:10.1080/19393555.2010.544705

Quagliata,  Karen

Quagliata, K.(2011). Security Awareness Training - What Matters Most? The Security Journal, 35(1), 14-19.

Quagliata, K.(2011). JOnline: Impact of Security Awareness Training Components on Perceived Security EffectivenessISACA Journal Online, 4.

Smith, Jeffrey

Smith, J. (2010). Sustainability is Dynamic. Kansas City ASPA One Page Journal. Fall 2010 Issue. Retrieved from http://aspakcjournal.wordpress.com/articles/fall-2010-issue/jeff-smith-article/

Smith, J. (2011). Factors Impacting Information Security in Selection of a Compliance Methodology, Taxonomy, or Framework. Information Systems Security. Retrieved from http://www.infosectoday.com/Articles/Compliance-Methodology.htm

Ting, Wendy

Ting, W. W., & Comings, D.R. (2010). Information Assurance Metric for Assessing NIST's Monitoring Step in the Risk Management Framework. Information Security Journal: A Global Perspective, 19(5), 253-262. doi:10.1080/19393555.2010.514650