Skip Nav Destination
Close Modal
Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-2 of 2
Keywords: Internet security
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
Mobile internet and consumer happiness: the role of risk
Available to Purchase
Journal:
Internet Research
Internet Research (2018) 28 (3): 785–803.
Published: 04 June 2018
... of the sample. Privacy Internet marketing Mobile communications Risk Wireless technology Internet security Mobile broadband subscriptions have reached 4.3 billion globally by the end of 2017 with the annual growth rate of 20 percent or more in the last five years (International...
Journal Articles
Security aspects of an enterprise‐wide network architecture
Available to Purchase
Journal:
Internet Research
Internet Research (1999) 9 (1): 8–15.
Published: 01 March 1999
... is needed. Application gateways offer many advantages: Computer architectures Computer networks Information systems Internet Internet security Nowadays, a huge amount of information is stored in our networks. It has never been so easy for intruders to gain access to this information...
