ExLibris header image
SFX Logo
Title: Privacy Information Security Classification for Internet of Things Based on Internet Data
Source:

International Journal of Distributed Sensor Networks [1550-1329] Xiaofeng Lu, Zhaowei yr:2015


Collapse list of basic services Basic
Sorry, no full text available...
Please use the document delivery service (see below)  
Holding information
Holdings in library search engine ALBERT GO
Document delivery
Request document via Library/Bibliothek GO
Users interested in this article also expressed an interest in the following:
1. Changchit, C. "Online Privacy, Information Security and Security Investment." Journal of Information Privacy & Security 6.1 (2010): 1-2. Link to SFX for this item
2. Karat, C. "Usable Privacy and Security for Personal Information Management." Communications of the ACM 49.1 (2006): 56-7. Link to SFX for this item
3. Afzal, W. "Rethinking information privacy‐security: Does it really matter?" Proceedings of the ASIS annual meeting 50.1 (2013): 1-10. Link to Full Text for this item Link to SFX for this item
4. Moloney, M. "Online privacy: Measuring individuals' concerns." Lecture notes in computer science 2008. 21-30. Link to SFX for this item
5. Bradford, M. "Personal credit information." Business information review 24.4 (2007): 253-256. Link to Full Text for this item Link to SFX for this item
6. "A privacy and information security governance model." Briefings on HIPAA. 17.6: 5-. Link to SFX for this item
7. "Evolutionary Personal Information Management." ITNOW 56.2 (2014): 51-51. Link to SFX for this item
8. Lin, X. "Security and privacy in emerging information technologies." Security and communication networks 5.1 (2012): 1-2. Link to SFX for this item
9. Romanosky, S. "Do data breach disclosure laws reduce identity theft?" Journal of Policy Analysis and Management 30.2 (2011): 256-286. Link to Full Text for this item Link to SFX for this item
10. Lee, M. "The impact of information security failure on customer behaviors: A study on a large-scale hacking incident on the internet." Information Systems Frontiers 14.2: 1-19. Link to SFX for this item
11. Whittaker, S. "Email in personal information management." Communications of the ACM 49.1 (2006): 68-73. Link to SFX for this item
12. Gorman, G.E., G. "Who am I, and where's my money? Issues in online security." Online Information Review 31.5 (2007): 561-565. Link to SFX for this item
13. "Information security and technical issues of cloud storage services: a qualitative study on university students in Hong Kong." Library hi tech. . Link to SFX for this item
14. Li, Z. "The Study on Credit Information Interactive System of Regional Logistics Trade." Information Management, Innovation Management and Industrial Engineering, 2009 International Conference on 348-350. Link to Full Text for this item Link to SFX for this item
15. Boehme-Neßler, V. "Privacy: a matter of democracy. Why democracy needs privacy and data protection." International Data Privacy Law 6.3 (2016): 222-229. Link to SFX for this item
16. Chunghun, L. "Understanding information security stress: focusing on the type of information security compliance activity." Computers & security 59 (2016): 60-70. Link to SFX for this item
17. Yuan, Elaine J. "“Privacy” in Semantic Networks on Chinese Social Media: The Case of Sina Weibo." Journal of communication 63.6 (2013): 1011-1031. Link to SFX for this item
18. Taddicken, M. "Selbstoffenbarung im Social Web." Publizistik 56.3 (2011): 281-303. Link to SFX for this item
19. Boone, A. "Return of the Phone Phreakers: Business Communications Security in the Age of IP." Security 48.4 (2011): 50-52. Link to SFX for this item
20. John, John C. "Social Media and Privacy." Air medical journal 29.3 (2010): 104-107. Link to SFX for this item
View More...
View Less...
Select All Clear All

Expand list of advanced services Advanced