Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Issue Section
Date
Availability
1-13 of 13
Keywords: Data security
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
Cybersecurity in governing artificial intelligence – the case of Polish cities
Available to Purchase
Journal of Information, Communication and Ethics in Society 1–24.
Published: 20 March 2026
... 2026 26 02 2026 © 2026 Emerald Publishing Limited 2026 Emerald Publishing Limited Licensed re-use rights only Public sector Artificial intelligence e-Government Cybersecurity Data security Artificial intelligence (AI) technologies play a crucial role in the digital...
Journal Articles
Adopting social media as an information system – a case study of an internet service company in Abuja, Nigeria
Available to Purchase
Journal of Information, Communication and Ethics in Society (2021) 19 (1): 163–179.
Published: 30 October 2020
...-users-nigeria/ Steinberg , J. (2020), “ How social media impacts data security ”, available at Future of Business and Tech: www.futureofbusinessandtech.com/business-solutions/how-social-media-impacts-data-security Stern , R. (2010), “ Five ways social media is impacting...
Journal Articles
After Snowden – the evolving landscape of privacy and technology
Available to Purchase
Journal of Information, Communication and Ethics in Society (2017) 15 (3): 328–335.
Published: 14 August 2017
... available to the latter. Robin Wilton can be contacted at: wilton@isoc.org 12 02 2017 22 02 2017 © Robin Wilton, Internet Society, 2017. 2017 Robin Wilton, Internet Society, 2017 Licensed re-use rights only Regulation Trust Privacy Data security Law enforcement National...
Journal Articles
How to abuse biometric passport systems
Available to Purchase
Journal of Information, Communication and Ethics in Society (2012) 10 (2): 68–81.
Published: 11 May 2012
... with current RFID/biometric passport implementations as well as inherent social problems that are hard, if not impossible to avoid. The problems belong under the category of critical eGovernment applications, and similar issues are visible in other eGovernment applications. Finland Data security Biodata...
Journal Articles
A new “Ring of Gyges” and the meaning of invisibility in the information revolution
Available to Purchase
Journal of Information, Communication and Ethics in Society (2010) 8 (4): 364–376.
Published: 09 November 2010
... 2010 Copyright law Data security Ethics Since ancient times, the magic of turning invisible has struck people's imagination as well as the reflection of philosophers. One of the most relevant examples is, of course, Plato's tale in the second book of Republic. Aiming to prove...
Journal Articles
DNA dataveillance: protecting the innocent?
Available to Purchase
Journal of Information, Communication and Ethics in Society (2010) 8 (3): 270–288.
Published: 10 August 2010
... 2006 for further research turned out to be misidentifications” (USGAO, 2006). Data security Genetics Ethics © Emerald Group Publishing Limited 2010 Lee Gillam can be contacted at: l.gillam@surrey.ac.uk Last year detectives reinvestigating a case of rape got a DNA profile...
Journal Articles
Pervasive computing and an aging populace: Methodological challenges for understanding privacy implications
Available to Purchase
Journal of Information, Communication and Ethics in Society (2010) 8 (3): 236–248.
Published: 10 August 2010
... and elders to participate in each others' lives (Demiris et al., 2008). Privacy Data security Elderly people © Emerald Group Publishing Limited 2010 The introduction of working prototypes and commercial devices in the context of a home (and not a laboratory) proved successful...
Journal Articles
Ethics among peers: file sharing on the internet between openness and precaution
Available to Purchase
Journal of Information, Communication and Ethics in Society (2010) 8 (2): 136–149.
Published: 04 May 2010
..., as Adar and Huberman (2000) , claim that free‐riding represents a new digital form of Hardin's (1968) “Tragedy of the Commons”. U. Pagallo can be contacted at: ugo.pagallo@unito.it © Emerald Group Publishing Limited 2010 Copyright law Data security Ethics Privacy Internet Human...
Journal Articles
Vulnerabilities and responsibilities: dealing with monsters in computer security
Available to Purchase
Journal of Information, Communication and Ethics in Society (2009) 7 (4): 243–257.
Published: 30 October 2009
... or availability of information. © Emerald Group Publishing Limited 2009 Data security Culture Ethics With the emergence of the new field of information security, the objectivity of risk and security is still often implicitly assumed (Pieters, 2006 ; Evans and Paul, 2004 ; Nikander...
Journal Articles
Rethinking the concept of the right to information privacy: a Japanese perspective
Available to Purchase
Journal of Information, Communication and Ethics in Society (2008) 6 (3): 233–245.
Published: 12 September 2008
... Murata can be contacted at: kmurata@kisc.meiji.ac.jp © Emerald Group Publishing Limited 2008 Human rights Freedom of information Privacy Data security Japan Japanese firms' efforts at personal data protection are a form of “cold feet” compliance; they seem to hesitate to do...
Journal Articles
Socio‐cultural analysis of personal information leakage in Japan
Available to Purchase
Journal of Information, Communication and Ethics in Society (2008) 6 (2): 161–171.
Published: 27 June 2008
... measures to protect personal information and the right to information privacy in the global, multicultural information society. Database management systems Data security Information control Privacy Legislation Japan Yohko Orito can be contacted at: orito@ll.ehime‐u.ac.jp © Emerald...
Journal Articles
Journal of Information, Communication and Ethics in Society (2008) 6 (1): 90–92.
Published: 04 April 2008
... Data security Intellectual property Most books introducing computer ethics to students and the general public currently come from the USA. Thus, it is very refreshing to see a book coming from Europe that is easily approachable. The topic is very relevant to society as computing technologies...
Journal Articles
Journal of Information, Communication and Ethics in Society (2008) 6 (1): 88–89.
Published: 04 April 2008
... Publishing Limited 2008 --> Ethics Data security Privacy Law Culture It has long been the case that friends and family have no real comprehension of what it is that my day job entails, as an information security professional. However, as the sun set on 2007, a raft of “data breaches...
