IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Research IRM InfoSci-OnDemand Powered Search

Search terms:  


Search Reset Total results: 16024
Full text: Title:
Keyword: Author/editor:
ISBN/ISSN: DOI:
Content:
Search Reset
Term Exclude Inflectional Weight
Add New Term
Search Reset
Keywords:  
Search Reset
Subject:  
Search Reset
Sort by:
rank
Book Chapter
Information Security and Privacy in Social Media: The Threat Landscape
Hemamali Tennakoon (2015). Implications of Social Media Use in Personal and Professional Settings 29 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
Information Security and Privacy in Social Media: The Threat Landscape
Hemamali Tennakoon (2016). Social Media and Networking: Concepts, Methodologies, Tools, and Applications 29 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
An Information Security Model for Implementing the New ISO 27001
Margareth Stoll (2015). Handbook of Research on Emerging Developments in Data Privacy 23 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
Privacy and Security in the Age of Electronic Customer Relationship Management
Nicholas C. Romano Jr., Jerry Fjermestad (2007). International Journal of Information Security and Privacy 22 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
A Decentralized Security Framework for Web-Based Social Networks
Barbara Carminati, Elena Ferrari, Andrea Perego (2008). International Journal of Information Security and Privacy 32 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
Design and Implementation of a Framework for Assured Information Sharing Across Organizational Boundaries
Bhavani Thuraisingham, Yashaswini Harsha Kumar, Latifur Khan (2008). International Journal of Information Security and Privacy 24 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
Will it be Disclosure or Fabrication of Personal Information? An Examination of Persuasion Strategies on Prospective Employees
Xun Li, Radhika Santhanam (2008). International Journal of Information Security and Privacy 19 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
SEACON: An Integrated Approach to the Analysis and Design of Secure Enterprise Architecture-Based Computer Networks
Surya B. Yadav (2008). International Journal of Information Security and Privacy 25 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
Towards Autonomous User Privacy Control
Amr Ali Eldin, Rene Wagenaar (2007). International Journal of Information Security and Privacy 23 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
VIPSEC: Virtualized and Pluggable Security Services Architecture for Grids
Syed Naqvi (2008). International Journal of Information Security and Privacy 26 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
Laws and Regulations Dealing with Information Security and Privacy: An Investigative Study
John A. Cassini, B.Dawn Medlin, Adriana Romaniello (2008). International Journal of Information Security and Privacy 13 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
A Global Perspective of Laws and Regulations Dealing with Information Security and Privacy
B. Dawn Medlin, Charlie C. Chen (2012). Cyber Crime: Concepts, Methodologies, Tools and Applications 15 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
A Global Perspective of Laws and Regulations Dealing with Information Security and Privacy
B. Dawn Medlin, Charlie C. Chen (2010). Information Communication Technology Law, Protection and Access Rights: Global Approaches and Issues 15 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
Do Privacy Statements Really Work? The Effect of Privacy Statements and Fair Information Practices on Trust and Perceived Risk in E-Commerce
Hamid R. Nemati, Thomas Van Dyke (2009). International Journal of Information Security and Privacy 20 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
An Ontology of Information Security
Almut Herzog, Nahid Shahmehri, Claudiu Duma (2007). International Journal of Information Security and Privacy 23 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
On Access-Unrestricted Data Anonymity and Privacy Inference Disclosure Control
Zude Li, Xiaojun Ye (2008). International Journal of Information Security and Privacy 21 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
Spam Classification Based on E-Mail Path Analysis
Srikanth Palla, Ram Dantu, João W. Cangussu (2008). International Journal of Information Security and Privacy 24 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
Privacy-Preserving Data Mining and the Need for Confluence of Research and Practice
Lixin Fu, Hamid Nemati, Fereidoon Sadri (2007). International Journal of Information Security and Privacy 17 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
Privacy-Preserving Clustering to Uphold Business Collaboration: A Dimensionality Reduction Based Transformation Approach
Stanley R.M. Oliveira, Osmar R. Zaïane (2007). International Journal of Information Security and Privacy 24 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
Information Security Effectiveness: Conceptualization and Validation of a Theory
Kenneth J. Knapp, Thomas E. Marshall, R. Kelly Rainer Jr., F. Nelson Ford (2007). International Journal of Information Security and Privacy 24 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
Ignorance is Bliss: The Effect of Increased Knowledge on Privacy Concerns and Internet Shopping Site Personalization Preferences
Thomas P. Van Dyke (2007). International Journal of Information Security and Privacy 19 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
Management of Privacy and Security in Cloud Computing: Contractual Controls in Service Agreements
Deniz Tuncalp (2016). Web-Based Services: Concepts, Methodologies, Tools, and Applications 26 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
A Rule-Based and Game-Theoretic Approach to Online Credit Card Fraud Detection
Vishal Vatsa, Shamik Sural, A. K. Majumdar (2007). International Journal of Information Security and Privacy 21 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
Management of Privacy and Security in Cloud Computing: Contractual Controls in Service Agreements
Deniz Tuncalp (2015). Delivery and Adoption of Cloud Computing Services in Contemporary Organizations 26 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
A Projection of the Future Effects of Quantum Computation on Information Privacy
Geoff Skinner, Elizabeth Chang (2007). International Journal of Information Security and Privacy 12 pages.
View Details View Details PDF Full Text View Sample PDF
First Previous 1 2 3 4 5 6 7 8 9 10  ... Next Last 
InfoSci-OnDemand Powered Search
Body Bottom