Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-14 of 14
Keywords: Computer privacy
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
Understanding social media users’ privacy-protection behaviors
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2022) 30 (3): 324–345.
Published: 17 November 2021
... 09 2021 16 10 2021 © Emerald Publishing Limited 2021 Emerald Publishing Limited Licensed re-use rights only Privacy concerns Computer privacy Privacy protection behaviors Self-efficacy Privacy benefits Privacy experience Privacy protection behaviors...
Journal Articles
A look into user privacy andthird-party applications in Facebook
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2021) 29 (2): 283–313.
Published: 26 July 2021
... User study Computer privacy Third-party applications Social networks such as Facebook have become an integral part of everyday life for many people, as they are used to maintain social ties, build professional connections, share news and interests and promote business. Also, a wide variety...
Journal Articles
A grounded theory approach to security policy elicitation
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2018) 26 (4): 454–471.
Published: 08 October 2018
..., which would be deleted following analysis. Informed consent is regarded as a process in qualitative research, and the preceding summary is illustrative. Computer security Psychology Access control Computer privacy Computer users In computer science, qualitative methods have been used...
Journal Articles
Applying the physics of notation to the evaluation of a security and privacy requirements engineering methodology
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2018) 26 (4): 382–400.
Published: 08 October 2018
... stage. 03 12 2017 11 12 2017 © Emerald Publishing Limited 2018 Emerald Publishing Limited Licensed re-use rights only Evaluation Information security modelling Computer privacy Security requirements engineering Privacy requirements engineering Physics of notation...
Journal Articles
Consumer trust in Google’s top developers’ apps: an exploratory study
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2016) 24 (5): 474–495.
Published: 14 November 2016
... can be contacted at: marharris1@augusta.edu 03 11 2015 28 01 2016 03 05 2016 03 05 2016 © Emerald Group Publishing Limited 2016 Emerald Group Publishing Limited Licensed re-use rights only Android Computer privacy Google top developers IAP Mobile device...
Journal Articles
Online privacy and security concerns of consumers
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2016) 24 (4): 348–371.
Published: 10 October 2016
... the distinction of constructs of privacy and security concerns and showed their differential effects on other related constructs in the research model. © Emerald Group Publishing Limited 2016 Emerald Group Publishing Limited Licensed re-use rights only Consumer behavior Computer security Computer...
Journal Articles
An efficient intrusion detection and prevention framework for ad hoc networks
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2016) 24 (4): 298–325.
Published: 10 October 2016
... rights only Computer security Communications technology Computer networks Computer privacy Communications industry The first technique is anomaly based intrusion detection which defines the normal behavior of the system using classification and statistical methods. It detects any anomalous...
Journal Articles
Privacy as a secondary goal problem: an experiment examining control
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2015) 23 (4): 382–393.
Published: 12 October 2015
... End-user computing Computer privacy Human physiology End-users of social networks routinely disclose sensitive information about themselves despite stating a high level of concern for their privacy in such services; a phenomenon known as the privacy paradox (Acquisti and Gross, 2006...
Journal Articles
E‐commerce policies and customer privacy: a longitudinal study (2000‐2010)
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2012) 20 (3): 222–244.
Published: 13 July 2012
... Emerald Group Publishing Limited 2012 Electronic commerce Internet policies Computer privacy Consumer protection Privacy The basic premise of this study is that e‐commerce web sites do not adequately publish and explain their consumer policies. The study investigates...
Journal Articles
Protecting personal privacy on the Internet
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2002) 10 (2): 77–84.
Published: 01 May 2002
..., and the individual. This paper discusses the current state of personal privacy in each of these three areas. © MCB UP Limited 2002 Internet Computer privacy Regulations Central government The rapid advance of technology has permitted the creation of vast amounts of information, both...
Journal Articles
Government initiatives in information technology security
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1997) 5 (3): 111–118.
Published: 01 August 1997
..., although some may involve government action if codes are not complied with. © Company 1997 Computer privacy Computer security Data protection Data security Government Policy We are now entering an era of technological change unparalleled since Gutenberg’s Bible introduced...
Journal Articles
Commercialization of cryptography
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1997) 5 (3): 87–89.
Published: 01 August 1997
... pondering what they should do. There is a legitimate requirement for security on the Internet. The Internet is moving forward and the globalization of economies is occurring. © MCB UP Limited 1997 Computer privacy Computer security Electronic Encryption Internet Security The Internet...
Journal Articles
Constructing difficult‐to‐guess passwords
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1996) 4 (1): 43–44.
Published: 01 March 1996
... passwords. © MCB UP Limited 1996 Computer privacy Computer security Data security The technological gap between the comments of many so‐called industry “experts” and the real situation at most organizations is often large. While the discussions may pay significant attention to fingerprint...
Journal Articles
Commercial security on the Internet
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1996) 4 (1): 47–49.
Published: 01 March 1996
... the Internet cannot be underestimated. Figure 1 Sector maturity Note: This paper was subsequently published in Internet Research, Volume 6 Number 2, 1996. © MCB UP Limited 1996 Computer privacy Computer security Encryption Internet Security Traditional purchasing...
