Book Chapter
|
Hemamali Tennakoon
(2015).
Implications of Social Media Use in Personal and Professional Settings
29 pages.
|
Book Chapter
|
Hemamali Tennakoon
(2016).
Social Media and Networking: Concepts, Methodologies, Tools, and Applications
29 pages.
|
Book Chapter
|
Margareth Stoll
(2015).
Handbook of Research on Emerging Developments in Data Privacy
23 pages.
|
Book Chapter
|
Margareth Stoll
(2019).
Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and Applications
24 pages.
|
Journal Article
|
Nicholas C. Romano Jr., Jerry Fjermestad
(2007).
International Journal of Information Security and Privacy
22 pages.
|
Journal Article
|
Barbara Carminati, Elena Ferrari, Andrea Perego
(2008).
International Journal of Information Security and Privacy
32 pages.
|
Book Chapter
|
Jesus Alvarado, Malka N. Halgamuge
(2019).
Industry 4.0 and Hyper-Customized Smart Manufacturing Supply Chains
37 pages.
|
Book Chapter
|
Jesus Alvarado, Malka N. Halgamuge
(2021).
Research Anthology on Blockchain Technology in Business, Healthcare, Education, and Government
25 pages.
|
Journal Article
|
John A. Cassini, B.Dawn Medlin, Adriana Romaniello
(2008).
International Journal of Information Security and Privacy
13 pages.
|
Journal Article
|
Bhavani Thuraisingham, Yashaswini Harsha Kumar, Latifur Khan
(2008).
International Journal of Information Security and Privacy
24 pages.
|
Journal Article
|
Xun Li, Radhika Santhanam
(2008).
International Journal of Information Security and Privacy
19 pages.
|
Journal Article
|
Surya B. Yadav
(2008).
International Journal of Information Security and Privacy
25 pages.
|
Journal Article
|
Amr Ali Eldin, Rene Wagenaar
(2007).
International Journal of Information Security and Privacy
23 pages.
|
Journal Article
|
Syed Naqvi
(2008).
International Journal of Information Security and Privacy
26 pages.
|
Journal Article
|
Hamid R. Nemati, Thomas Van Dyke
(2009).
International Journal of Information Security and Privacy
20 pages.
|
Book Chapter
|
B. Dawn Medlin, Charlie C. Chen
(2012).
Cyber Crime: Concepts, Methodologies, Tools and Applications
15 pages.
|
Book Chapter
|
B. Dawn Medlin, Charlie C. Chen
(2010).
Information Communication Technology Law, Protection and Access Rights: Global Approaches and Issues
15 pages.
|
Journal Article
|
Almut Herzog, Nahid Shahmehri, Claudiu Duma
(2007).
International Journal of Information Security and Privacy
23 pages.
|
Journal Article
|
Kenneth J. Knapp, Thomas E. Marshall, R. Kelly Rainer Jr., F. Nelson Ford
(2007).
International Journal of Information Security and Privacy
24 pages.
|
Journal Article
|
Zude Li, Xiaojun Ye
(2008).
International Journal of Information Security and Privacy
21 pages.
|
Journal Article
|
Lixin Fu, Hamid Nemati, Fereidoon Sadri
(2007).
International Journal of Information Security and Privacy
17 pages.
|
Journal Article
|
Srikanth Palla, Ram Dantu, João W. Cangussu
(2008).
International Journal of Information Security and Privacy
24 pages.
|
Journal Article
|
Stanley R.M. Oliveira, Osmar R. Zaïane
(2007).
International Journal of Information Security and Privacy
24 pages.
|
Journal Article
|
Thomas P. Van Dyke
(2007).
International Journal of Information Security and Privacy
19 pages.
|
Book Chapter
|
Deniz Tuncalp
(2016).
Web-Based Services: Concepts, Methodologies, Tools, and Applications
26 pages.
|