IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Research IRM InfoSci-OnDemand Powered Search

Search terms:  


Search Reset Total results: 31985
Full text: Title:
Keyword: Author/editor:
ISBN/ISSN: DOI:
Content:
Search Reset
Term Exclude Inflectional Weight
Add New Term
Search Reset
Keywords:  
Search Reset
Subject:  
Search Reset
Sort by:
rank
Book Chapter
U.S. Federal Data Mining Programs in the Context of the War on Terror: The Congress, Courts, and Concerns for Privacy Protections
Shahid M. Shahidullah (2009). Social Implications of Data Mining and Information Privacy: Interdisciplinary Frameworks and Solutions 30 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
U.S. Federal Data Mining Programs in the Context of the War on Terror: The Congress, Court, and Concerns for Privacy Protection
Shahid M. Shahidullah, Mokerrom Hossain (2012). Cyber Crime: Concepts, Methodologies, Tools and Applications 30 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
Culture Clashes: Freedom, Privacy, and Government Surveillance Issues Arising in Relation to National Security and Internet Use
Pauline C. Reich (2012). Law, Policy, and Technology: Cyberterrorism, Information Warfare, and Internet Immobilization 79 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
National Security Policy and Strategy and Cyber Security Risks
Olivera Injac, Ramo Šendelj (2016). Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare 27 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
Reconciling the Needs for National Security and Citizen Privacy in an Age of Surveillance
Kenneth L. Hacker, Bridget Acquah-Baidoo, Anthony Epperson (2016). Ethical Issues and Citizen Rights in the Era of Digital Government Surveillance 25 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
Reconciling the Needs for National Security and Citizen Privacy in an Age of Surveillance
Kenneth L. Hacker, Bridget Acquah-Baidoo, Anthony Epperson (2017). Biometrics: Concepts, Methodologies, Tools, and Applications 25 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
National Security Policy and Strategy and Cyber Security Risks
Olivera Injac, Ramo Šendelj (2017). Identity Theft: Breakthroughs in Research and Practice 29 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
Print Media's Role in Securitization: National Security and Diplomacy Discourses in Nepal
Sudeep Uprety (2019). National Security: Breakthroughs in Research and Practice 20 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
Print Media's Role in Securitization: National Security and Diplomacy Discourses in Nepal
Sudeep Uprety (2018). Media Diplomacy and Its Evolving Role in the Current Geopolitical Climate 27 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
Information Quality: Critical Ingredient for National Security
Larry P. English (2005). Journal of Database Management 15 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
Information Quality: Critical Ingredient for National Security
Larry P. English (2008). Global Information Technologies: Concepts, Methodologies, Tools, and Applications 7 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
An Approach to Governance of CyberSecurity in South Africa
Joey Jansen van Vuuren, Louise Leenen, Jackie Phahlamohlaka, Jannie Zaaiman (2012). International Journal of Cyber Warfare and Terrorism 15 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
An Approach to Governance of CyberSecurity in South Africa
Joey Jansen van Vuuren, Louise Leenen, Jackie Phahlamohlaka, Jannie Zaaiman (2014). Cyber Behavior: Concepts, Methodologies, Tools, and Applications 15 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
The E-Government Surveillance in the United States: Public Opinion on Government Wiretapping Powers
Ramona Sue McNeal, Mary Schmeida, Justin Holmes (2016). Ethical Issues and Citizen Rights in the Era of Digital Government Surveillance 23 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
The E-Government Surveillance in the United States: Public Opinion on Government Wiretapping Powers
Ramona Sue McNeal, Mary Schmeida, Justin Holmes (2017). Biometrics: Concepts, Methodologies, Tools, and Applications 23 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
Cyber-Search and Cyber-Seizure: Policy Considerations of Cyber Operations and Fourth Amendment Implications
Catherine B. Lotrionte (2012). Law, Policy, and Technology: Cyberterrorism, Information Warfare, and Internet Immobilization 44 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
Cyber-Search and Cyber-Seizure: Policy Considerations of Cyber Operations and Fourth Amendment Implications
Catherine B. Lotrionte (2014). Cyber Behavior: Concepts, Methodologies, Tools, and Applications 44 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
Building Blocks and Measurement of National Cyberpower
Joey Jansen van Vuuren, Louise Leenen (2019). Developments in Information Security and Cybernetic Wars 24 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
Disrupting the U.S. National Security Through Financial Cybercrimes
Calvin Nobles (2019). International Journal of Hyperconnectivity and the Internet of Things 21 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
Formulating the Building Blocks for National Cyberpower
JC Jansen van Vuuren, Louise Leenen, Graeme Plint, Jannie Zaaiman, Jackie Phahlamohlaka (2019). National Security: Breakthroughs in Research and Practice 15 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
Social Media Analytics for Intelligence and Countering Violent Extremism
Jennifer Yang Hui (2019). National Security: Breakthroughs in Research and Practice 21 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
Information Quality: Critical Ingredient for National Security
Larry P. English (2008). Information Security and Ethics: Concepts, Methodologies, Tools, and Applications 15 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
Formulating the Building Blocks for National Cyberpower
JC Jansen van Vuuren, Louise Leenen, Graeme Plint, Jannie Zaaiman, Jackie Phahlamohlaka (2017). International Journal of Cyber Warfare and Terrorism 13 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
Security, Sovereignty, and Continental Interoperability: Canada's Elusive Balance
Jeffrey Roy (2008). Patriotic Information Systems 24 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
Social Media Analytics for Intelligence and Countering Violent Extremism
Jennifer Yang Hui (2016). Combating Violent Extremism and Radicalization in the Digital Era 21 pages.
View Details View Details PDF Full Text View Sample PDF
First Previous 1 2 3 4 5 6 7 8 9 10  ... Next Last 
InfoSci-OnDemand Powered Search
Body Bottom