Language
English
German
^M
Dutch
Spanish
Title:
Privacy Information Security Classification for Internet of Things Based on Internet Data
Source:
International Journal of Distributed Sensor Networks [1550-1329] Xiaofeng Lu, Zhaowei yr:2015
Basic
Sorry, no full text available...
Please use the document delivery service (see below)
Holding information
Holdings in library search engine
ALBERT
Document delivery
Request document via
Library/Bibliothek
Users interested in this article also expressed an interest in the following:
description
1.
Changchit, C.
"Online Privacy, Information Security and Security Investment."
Journal of Information Privacy & Security
6.1 (2010): 1-2.
description
2.
Karat, C.
"Usable Privacy and Security for Personal Information Management."
Communications of the ACM
49.1 (2006): 56-7.
description
3.
Afzal, W.
"Rethinking information privacy‐security: Does it really matter?"
Proceedings of the ASIS annual meeting
50.1 (2013): 1-10.
description
4.
Moloney, M.
"Online privacy: Measuring individuals' concerns."
Lecture notes in computer science
2008. 21-30.
description
5.
Bradford, M.
"Personal credit information."
Business information review
24.4 (2007): 253-256.
description
6.
"A privacy and information security governance model."
Briefings on HIPAA.
17.6: 5-.
description
7.
"Evolutionary Personal Information Management."
ITNOW
56.2 (2014): 51-51.
description
8.
Lin, X.
"Security and privacy in emerging information technologies."
Security and communication networks
5.1 (2012): 1-2.
description
9.
Romanosky, S.
"Do data breach disclosure laws reduce identity theft?"
Journal of Policy Analysis and Management
30.2 (2011): 256-286.
description
10.
Lee, M.
"The impact of information security failure on customer behaviors: A study on a large-scale hacking incident on the internet."
Information Systems Frontiers
14.2: 1-19.
description
11.
Whittaker, S.
"Email in personal information management."
Communications of the ACM
49.1 (2006): 68-73.
description
12.
Gorman, G.E., G.
"Who am I, and where's my money? Issues in online security."
Online Information Review
31.5 (2007): 561-565.
description
13.
"Information security and technical issues of cloud storage services: a qualitative study on university students in Hong Kong."
Library hi tech.
.
description
14.
Li, Z.
"The Study on Credit Information Interactive System of Regional Logistics Trade."
Information Management, Innovation Management and Industrial Engineering, 2009 International Conference on
348-350.
description
15.
Boehme-Neßler, V.
"Privacy: a matter of democracy. Why democracy needs privacy and data protection."
International Data Privacy Law
6.3 (2016): 222-229.
description
16.
Chunghun, L.
"Understanding information security stress: focusing on the type of information security compliance activity."
Computers & security
59 (2016): 60-70.
description
17.
Yuan, Elaine J.
"“Privacy” in Semantic Networks on Chinese Social Media: The Case of Sina Weibo."
Journal of communication
63.6 (2013): 1011-1031.
description
18.
Taddicken, M.
"Selbstoffenbarung im Social Web."
Publizistik
56.3 (2011): 281-303.
description
19.
Boone, A.
"Return of the Phone Phreakers: Business Communications Security in the Age of IP."
Security
48.4 (2011): 50-52.
description
20.
John, John C.
"Social Media and Privacy."
Air medical journal
29.3 (2010): 104-107.
View More...
View Less...
Select All
Clear All
Save Citations
Select Format
EndNote
RefWorks
Reference Manager
ProCite
Submit citation export
Advanced
Author
Other articles by this author? -- in
GeoRef
author:
Xiaofeng Lu, Zhaowei Q
last name
initials
Other articles by this author? -- in
Online Contents Geosciences
author:
Xiaofeng Lu, Zhaowei Q
last name
initials
Web Search
Find related information in
a Web Search Engine
Excite
Google
HotBot
Ixquick
ZOO
Ask
Yahoo!
Bing
Naver
Search Terms:
Search for related information in
Google Scholar
Article Title
Author Name
Journal Title
Other Search
Search Terms:
A service provided by the
Library of the Wissenschaftspark Albert Einstein
, Potsdam, Germany.
© 2005 SFX by Ex Libris Inc.