Skip to Main Content
Keywords: Data security
Close
Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Journal Articles
Online Information Review (2024) 48 (4): 725–745.
Published: 05 December 2023
... Publishing Limited 2023 Emerald Publishing Limited Licensed re-use rights only Curation Sustainability Preservation strategies Digitization Higher education institutes Replication Data security Beagrie and Jones, (2008 , p. 24) defined digital preservation as “… the series of managed...
Journal Articles
Online Information Review (2020) 44 (6): 1217–1221.
Published: 27 July 2020
... and security of personal data by designing effective data governance frameworks that go beyond a mere compliance with existing policies and prevailing data privacy and protection laws to ensure data security and protection for all stakeholders. Originality/value This commentary is making the case for more...
Journal Articles
Online Information Review (2009) 33 (4): 655–671.
Published: 07 August 2009
... be further defined as cognitive trust, which provides a base for affective trust and should therefore exist before affective trust (Lewis and Weigert, 1985). © Emerald Group Publishing Limited 2009 Data security Trust Electronic commerce Internet shopping Consumer behaviour Decision...
Journal Articles
Online Information Review (2009) 33 (3): 422–442.
Published: 19 June 2009
... requester, the conversion of context‐specific identifiers is performed by a trusted agent as the mediator, denoted by node C, D and G. Health services Medical information systems Data security Internet In recent years, the technological evolution of e‐health systems has drawn increasing...
Journal Articles
Online Information Review (2009) 33 (2): 387–389.
Published: 17 April 2009
... identity E‐business Biometrics Data security Digital Identity Management is a collection of essays, articles and short case studies, between them covering an impressive range of the subject claimed by the full title of the book. The group of authors contributing articles includes several...
Journal Articles
Online Information Review (2008) 32 (1): 119–120.
Published: 22 February 2008
... Emerald Group Publishing Limited 2008 --> Data security Internet Worldwide web Computer crime Virtually Criminal: Crime, Deviance and Regulation Online examines the darker side of the Internet – cyber crime, illicit dealings, and the complex issues of control in cyberspace...
Journal Articles
Online Information Review (2007) 31 (5): 566–582.
Published: 02 October 2007
... ecosystem enables phishing and the ensuing damage, in particular due to theft of critical personal or business information. Data security Computer crime Information society internet Developing countries We stand at a critical point in the further development of the internet...
Journal Articles
Online Information Review (2007) 31 (5): 561–565.
Published: 02 October 2007
... understand this better the authors have created a managerial “perception grid” of information security issues. Money Virtual organizations Data security Information control Computer networks These are not fatuous questions, as any follower of the literature on internet crime and security can...
Journal Articles
Journal Articles
Journal Articles
Online Information Review (2007) 31 (5): 583–603.
Published: 02 October 2007
... for; the perceived ease of site navigation in terms of time required and action necessary in order to obtain the desired results; and the ability of the users to control what they are doing, and where they are, at any given moment. Data security Privacy Trust Commitment Virtual banking Lack...
Journal Articles
Online Information Review (2007) 31 (4): 538–539.
Published: 14 August 2007
...Ina Fourie Joseph   Migga Kizza . Computer Network Security and Cyber Ethics (2nd ed.) . Jefferson, NC : McFarland and Company   2006 . 223 pp. , ISBN: 0786425954   US$35.00 (soft cover) © Emerald Group Publishing Limited 2007 --> Computer networks Data...
Journal Articles
Online Information Review (2007) 31 (4): 420–439.
Published: 14 August 2007
... that filter unwanted e‐mail. J. Alberto Castañeda can be contacted at: jalberto@ugr.es © Emerald Group Publishing Limited 2007 Internet Privacy Data security Electronic commerce Both commercial and service web sites require information on their visitors/customers...
Journal Articles
Online Information Review (2007) 31 (1): 96–97.
Published: 27 February 2007
...Madely du Preez © Emerald Group Publishing Limited 2007 --> Data security Internet The Internet, and with it the World Wide Web (WWW), has become an information highway and this has resulted in an even greater need to manage data, information and knowledge. In their new book...
Journal Articles
Online Information Review (2007) 31 (1): 38–58.
Published: 27 February 2007
... that the permissions and constraints passed from parent to child licences have been done according to the terms determined by content creators or distributors. Eva Rodríguez can be contacted at: evar@ac.upc.edu © Emerald Group Publishing Limited 2007 Intellectual property Data security Algorithmic...
Journal Articles
Online Information Review (2007) 31 (1): 10–21.
Published: 27 February 2007
... with the correct search criterion. © Emerald Group Publishing Limited 2007 Data security Digital storage Mark scanning equipment In order to use digital watermarking for assisting DRM systems, two general strategies can be followed: 1. Public watermarking. The watermark...
Journal Articles
Online Information Review (2005) 29 (5): 513–530.
Published: 01 October 2005
... systems and their IT‐infrastructure. It is a basic premise of the present study that voting online increases voter participation, which can only be viewed in a positive light. © Emerald Group Publishing Limited 2005 Elections Electoral systems Data security Internet United States of America...
Journal Articles
Online Information Review (2004) 28 (5): 356–366.
Published: 01 October 2004
... into the following categories: © Emerald Group Publishing Limited 2004 Computer networks Data security Electronic mail Computer viruses In recent years, the number of worldwide Internet users has continued to rise dramatically as the Internet expands. Together with this growth, serious...
Journal Articles
Online Information Review (2004) 28 (3): 224–234.
Published: 01 June 2004
... the online consumer, corporations must ensure that the security measures taken will ultimately prevail to assure that consumers will continue to use the Internet to satisfy their shopping needs. © Emerald Group Publishing Limited 2004 Crimes Data security Electronic commerce Expectancy theory...
Journal Articles
Online Information Review (2003) 27 (4): 289–290.
Published: 01 August 2003
... . 587 pp. , ISBN: 0910965501   US$29.95 (soft cover) © MCB UP Limited 2003 --> Privacy Data security Naked in Cyberspace … can only be described as an absolute value‐for‐money book! It contains a wealth of information on personal data, where and how to find them, pitfalls...

or Create an Account

Close Modal
Close Modal