Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Issue Section
Date
Availability
1-20 of 22
Keywords: Data security
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
1
Sort by
Journal Articles
Digital preservation practices for information resources in university libraries of Pakistan
Available to Purchase
Journal:
Online Information Review
Online Information Review (2024) 48 (4): 725–745.
Published: 05 December 2023
... Publishing Limited 2023 Emerald Publishing Limited Licensed re-use rights only Curation Sustainability Preservation strategies Digitization Higher education institutes Replication Data security Beagrie and Jones, (2008 , p. 24) defined digital preservation as “… the series of managed...
Journal Articles
No business as usual: a case for data ethics and data governance in the age of coronavirus
Available to Purchase
Journal:
Online Information Review
Online Information Review (2020) 44 (6): 1217–1221.
Published: 27 July 2020
... and security of personal data by designing effective data governance frameworks that go beyond a mere compliance with existing policies and prevailing data privacy and protection laws to ensure data security and protection for all stakeholders. Originality/value This commentary is making the case for more...
Journal Articles
An empirical study of the use of e‐security seals in e‐commerce
Available to Purchase
Journal:
Online Information Review
Online Information Review (2009) 33 (4): 655–671.
Published: 07 August 2009
... be further defined as cognitive trust, which provides a base for affective trust and should therefore exist before affective trust (Lewis and Weigert, 1985). © Emerald Group Publishing Limited 2009 Data security Trust Electronic commerce Internet shopping Consumer behaviour Decision...
Journal Articles
Towards a cross‐context identity management framework in e‐health
Available to Purchase
Journal:
Online Information Review
Online Information Review (2009) 33 (3): 422–442.
Published: 19 June 2009
... requester, the conversion of context‐specific identifiers is performed by a trusted agent as the mediator, denoted by node C, D and G. Health services Medical information systems Data security Internet In recent years, the technological evolution of e‐health systems has drawn increasing...
Journal Articles
Journal:
Online Information Review
Online Information Review (2009) 33 (2): 387–389.
Published: 17 April 2009
... identity E‐business Biometrics Data security Digital Identity Management is a collection of essays, articles and short case studies, between them covering an impressive range of the subject claimed by the full title of the book. The group of authors contributing articles includes several...
Journal Articles
Journal:
Online Information Review
Online Information Review (2008) 32 (1): 119–120.
Published: 22 February 2008
... Emerald Group Publishing Limited 2008 --> Data security Internet Worldwide web Computer crime Virtually Criminal: Crime, Deviance and Regulation Online examines the darker side of the Internet – cyber crime, illicit dealings, and the complex issues of control in cyberspace...
Journal Articles
Towards an international road‐map for cybersecurity
Available to Purchase
Journal:
Online Information Review
Online Information Review (2007) 31 (5): 566–582.
Published: 02 October 2007
... ecosystem enables phishing and the ensuing damage, in particular due to theft of critical personal or business information. Data security Computer crime Information society internet Developing countries We stand at a critical point in the further development of the internet...
Journal Articles
Who am I, and where's my money? Issues in online security
Available to Purchase
Journal:
Online Information Review
Online Information Review (2007) 31 (5): 561–565.
Published: 02 October 2007
... understand this better the authors have created a managerial “perception grid” of information security issues. Money Virtual organizations Data security Information control Computer networks These are not fatuous questions, as any follower of the literature on internet crime and security can...
Journal Articles
Protecting online information sharing in peer‐to‐peer (P2P) networks: A proposal for a P2P network security pricing model
Available to Purchase
Journal:
Online Information Review
Online Information Review (2007) 31 (5): 682–693.
Published: 02 October 2007
... demonstrated here is a different approach to network security that has a strong potential to impact on the future security of P2P and other computer based networks. Daniel O. Rice can be contacted at: drice2@loyola.edu © Emerald Group Publishing Limited 2007 Information management Data security...
Journal Articles
Perception of risk and the strategic impact of existing IT on information security strategy at board level
Available to Purchase
Journal:
Online Information Review
Online Information Review (2007) 31 (5): 622–660.
Published: 02 October 2007
... Data security Perception Governance Information security has become an increasingly important factor for many organisations. Over the past decade, there has been a rapid diffusion of electronic commerce and a rising number of interconnected networks, resulting in an escalation of security...
Journal Articles
The role of security, privacy, usability and reputation in the development of online banking
Available to Purchase
Journal:
Online Information Review
Online Information Review (2007) 31 (5): 583–603.
Published: 02 October 2007
... for; the perceived ease of site navigation in terms of time required and action necessary in order to obtain the desired results; and the ability of the users to control what they are doing, and where they are, at any given moment. Data security Privacy Trust Commitment Virtual banking Lack...
Journal Articles
Journal:
Online Information Review
Online Information Review (2007) 31 (4): 538–539.
Published: 14 August 2007
...Ina Fourie Joseph Migga Kizza . Computer Network Security and Cyber Ethics (2nd ed.) . Jefferson, NC : McFarland and Company 2006 . 223 pp. , ISBN: 0786425954 US$35.00 (soft cover) © Emerald Group Publishing Limited 2007 --> Computer networks Data...
Journal Articles
The dimensionality of customer privacy concern on the internet
Available to Purchase
Journal:
Online Information Review
Online Information Review (2007) 31 (4): 420–439.
Published: 14 August 2007
... that filter unwanted e‐mail. J. Alberto Castañeda can be contacted at: jalberto@ugr.es © Emerald Group Publishing Limited 2007 Internet Privacy Data security Electronic commerce Both commercial and service web sites require information on their visitors/customers...
Journal Articles
Journal:
Online Information Review
Online Information Review (2007) 31 (1): 96–97.
Published: 27 February 2007
...Madely du Preez © Emerald Group Publishing Limited 2007 --> Data security Internet The Internet, and with it the World Wide Web (WWW), has become an information highway and this has resulted in an even greater need to manage data, information and knowledge. In their new book...
Journal Articles
Verification algorithms for governed use of multimedia content
Available to Purchase
Journal:
Online Information Review
Online Information Review (2007) 31 (1): 38–58.
Published: 27 February 2007
... that the permissions and constraints passed from parent to child licences have been done according to the terms determined by content creators or distributors. Eva Rodríguez can be contacted at: evar@ac.upc.edu © Emerald Group Publishing Limited 2007 Intellectual property Data security Algorithmic...
Journal Articles
Complementing DRM with digital watermarking: mark, search, retrieve
Available to Purchase
Journal:
Online Information Review
Online Information Review (2007) 31 (1): 10–21.
Published: 27 February 2007
... with the correct search criterion. © Emerald Group Publishing Limited 2007 Data security Digital storage Mark scanning equipment In order to use digital watermarking for assisting DRM systems, two general strategies can be followed: 1. Public watermarking. The watermark...
Journal Articles
Revolutionising the voting process through online strategies
Available to Purchase
Journal:
Online Information Review
Online Information Review (2005) 29 (5): 513–530.
Published: 01 October 2005
... systems and their IT‐infrastructure. It is a basic premise of the present study that voting online increases voter participation, which can only be viewed in a positive light. © Emerald Group Publishing Limited 2005 Elections Electoral systems Data security Internet United States of America...
Journal Articles
E‐mail viruses: how organizations can protect their e‐mails
Available to Purchase
Journal:
Online Information Review
Online Information Review (2004) 28 (5): 356–366.
Published: 01 October 2004
... into the following categories: © Emerald Group Publishing Limited 2004 Computer networks Data security Electronic mail Computer viruses In recent years, the number of worldwide Internet users has continued to rise dramatically as the Internet expands. Together with this growth, serious...
Journal Articles
Cybercriminal impacts on online business and consumer confidence
Available to Purchase
Journal:
Online Information Review
Online Information Review (2004) 28 (3): 224–234.
Published: 01 June 2004
... the online consumer, corporations must ensure that the security measures taken will ultimately prevail to assure that consumers will continue to use the Internet to satisfy their shopping needs. © Emerald Group Publishing Limited 2004 Crimes Data security Electronic commerce Expectancy theory...
Journal Articles
Journal:
Online Information Review
Online Information Review (2003) 27 (4): 289–290.
Published: 01 August 2003
... . 587 pp. , ISBN: 0910965501 US$29.95 (soft cover) © MCB UP Limited 2003 --> Privacy Data security Naked in Cyberspace … can only be described as an absolute value‐for‐money book! It contains a wealth of information on personal data, where and how to find them, pitfalls...
1
