Skip to Main Content
Keywords: Computer privacy
Close
Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Journal Articles
Information and Computer Security (2022) 30 (3): 324–345.
Published: 17 November 2021
... 09 2021 16 10 2021 © Emerald Publishing Limited 2021 Emerald Publishing Limited Licensed re-use rights only Privacy concerns Computer privacy Privacy protection behaviors Self-efficacy Privacy benefits Privacy experience Privacy protection behaviors...
Journal Articles
Information and Computer Security (2021) 29 (2): 283–313.
Published: 26 July 2021
... User study Computer privacy Third-party applications Social networks such as Facebook have become an integral part of everyday life for many people, as they are used to maintain social ties, build professional connections, share news and interests and promote business. Also, a wide variety...
Journal Articles
Information and Computer Security (2018) 26 (4): 454–471.
Published: 08 October 2018
..., which would be deleted following analysis. Informed consent is regarded as a process in qualitative research, and the preceding summary is illustrative. Computer security Psychology Access control Computer privacy Computer users In computer science, qualitative methods have been used...
Journal Articles
Journal Articles
Information and Computer Security (2016) 24 (5): 474–495.
Published: 14 November 2016
... can be contacted at: marharris1@augusta.edu 03 11 2015 28 01 2016 03 05 2016 03 05 2016 © Emerald Group Publishing Limited 2016 Emerald Group Publishing Limited Licensed re-use rights only Android Computer privacy Google top developers IAP Mobile device...
Journal Articles
Information and Computer Security (2016) 24 (4): 348–371.
Published: 10 October 2016
... the distinction of constructs of privacy and security concerns and showed their differential effects on other related constructs in the research model. © Emerald Group Publishing Limited 2016 Emerald Group Publishing Limited Licensed re-use rights only Consumer behavior Computer security Computer...
Journal Articles
Information and Computer Security (2016) 24 (4): 298–325.
Published: 10 October 2016
... rights only Computer security Communications technology Computer networks Computer privacy Communications industry The first technique is anomaly based intrusion detection which defines the normal behavior of the system using classification and statistical methods. It detects any anomalous...
Journal Articles
Information and Computer Security (2015) 23 (4): 382–393.
Published: 12 October 2015
... End-user computing Computer privacy Human physiology End-users of social networks routinely disclose sensitive information about themselves despite stating a high level of concern for their privacy in such services; a phenomenon known as the privacy paradox (Acquisti and Gross, 2006...
Journal Articles
Information Management & Computer Security (2012) 20 (3): 222–244.
Published: 13 July 2012
... Emerald Group Publishing Limited 2012 Electronic commerce Internet policies Computer privacy Consumer protection Privacy The basic premise of this study is that e‐commerce web sites do not adequately publish and explain their consumer policies. The study investigates...
Journal Articles
Information Management & Computer Security (2002) 10 (2): 77–84.
Published: 01 May 2002
..., and the individual. This paper discusses the current state of personal privacy in each of these three areas. © MCB UP Limited 2002 Internet Computer privacy Regulations Central government The rapid advance of technology has permitted the creation of vast amounts of information, both...
Journal Articles
Information Management & Computer Security (1997) 5 (3): 111–118.
Published: 01 August 1997
..., although some may involve government action if codes are not complied with. © Company 1997 Computer privacy Computer security Data protection Data security Government Policy We are now entering an era of technological change unparalleled since Gutenberg’s Bible introduced...
Journal Articles
Information Management & Computer Security (1997) 5 (3): 87–89.
Published: 01 August 1997
... pondering what they should do. There is a legitimate requirement for security on the Internet. The Internet is moving forward and the globalization of economies is occurring. © MCB UP Limited 1997 Computer privacy Computer security Electronic Encryption Internet Security The Internet...
Journal Articles
Information Management & Computer Security (1996) 4 (1): 43–44.
Published: 01 March 1996
... passwords. © MCB UP Limited 1996 Computer privacy Computer security Data security The technological gap between the comments of many so‐called industry “experts” and the real situation at most organizations is often large. While the discussions may pay significant attention to fingerprint...
Journal Articles
Information Management & Computer Security (1996) 4 (1): 47–49.
Published: 01 March 1996
... the Internet cannot be underestimated. Figure 1 Sector maturity Note: This paper was subsequently published in Internet Research, Volume 6 Number 2, 1996. © MCB UP Limited 1996 Computer privacy Computer security Encryption Internet Security Traditional purchasing...

or Create an Account

Close Modal
Close Modal