EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject:"Computer privacy"
Narrow search

Narrow search

Year of publication
Subject
All
Computer privacy 12 Computer security 5 Data security 3 Internet 3 Android 1 Artificial Intelligence 1 Asia 1 Audit commission 1 Big Data 1 Communications industry 1 Communications technology 1 Complexity 1 Computer Privacy 1 Computer fraud 1 Computer networks 1 Computer systems 1 Consumer behavior 1 Consumer protection 1 Customer care 1 Data integrity 1 Electronic commerce 1 End-user computing 1 Ethics 1 Europe 1 Facebook 1 Fog Computing 1 Google top developers 1 Hacking 1 Human physiology 1 IAP 1 Information disclosure 1 Information systems 1 Intelligence Gathering 1 Latin America 1 Libraries 1 Mobile device security 1 North America 1 Perceptions 1 Permissions 1 Personal computers 1
more ... less ...
Online availability
All
Undetermined 13
Type of publication
All
Article 13
Type of publication (narrower categories)
All
research-article 6 conceptual-paper 2 review 2 review-article 2
Language
All
English 13
Author
All
Al-Ameen, Mahdi Nasrullah 1 Amara Korba, Abdelaziz 1 Chin, Amita G. 1 Ghanemi, Salim 1 Gurung, Anil 1 Harris, Mark A. 1 Horne, Jeremy 1 Hughes-Roberts, Thomas 1 Johnson‐Page, Grace F. 1 Kippenberger, T 1 Mills, Alan 1 Nafaa, Mehdi 1 Nakra, Prema 1 Raja, M.K. 1 Seng, Sovantharith 1 Sturges, Paul 1 Tarrant, Peter 1 Thatcher, R. Scott 1 Warrington, Traci 1 Wright, Matthew 1
more ... less ...
Published in...
All
Information & Computer Security 5 Industrial Management & Data Systems 2 Management Decision 2 International Journal of Fog Computing (IJFC) 1 Journal of Consumer Marketing 1 Online Information Review 1 The Antidote 1
more ... less ...
Source
All
Other ZBW resources 13
Showing 1 - 10 of 13
Cover Image
A look into user privacy andthird-party applications in Facebook
Seng, Sovantharith; Al-Ameen, Mahdi Nasrullah; Wright, … - In: Information & Computer Security 29 (2021) 2, pp. 283-313
Purpose A huge amount of personal and sensitive data are shared on Facebook, which makes it a prime target for attackers. Adversaries can exploit third-party applications connected to a user’s Facebook profiles (i.e. Facebook apps) to gain access to this personal information. Users’ lack of...
Persistent link: https://www.econbiz.de/10014754817
Saved in:
Cover Image
Social Implications of Big Data and Fog Computing
Horne, Jeremy - In: International Journal of Fog Computing (IJFC) 1 (2018) 2, pp. 1-50
In the last half century, we have gone from storing data on 5¼ inch floppy diskettes to the cloud and now use fog computing. But one should ask why so much data is being collected. Part of the answer is simple in light of scientific projects, but why is there so much data on us? Then, we ask...
Persistent link: https://www.econbiz.de/10012044787
Saved in:
Cover Image
Online privacy and security concerns of consumers
Gurung, Anil; Raja, M.K. - In: Information & Computer Security 24 (2016) 4, pp. 348-371
Purpose Privacy and security concerns of consumers have been touted as one of the hindrances to the growth of e-commerce. These concerns increase the risk perception of consumers. Understanding the consequences of privacy and security concerns and their relationship to risk perceptions may...
Persistent link: https://www.econbiz.de/10014754732
Saved in:
Cover Image
An efficient intrusion detection and prevention framework for ad hoc networks
Amara Korba, Abdelaziz; Nafaa, Mehdi; Ghanemi, Salim - In: Information & Computer Security 24 (2016) 4, pp. 298-325
Purpose Wireless multi-hop ad hoc networks are becoming very attractive and widely deployed in many kinds of communication and networking applications. However, distributed and collaborative routing in such networks makes them vulnerable to various security attacks. This paper aims to design and...
Persistent link: https://www.econbiz.de/10014754806
Saved in:
Cover Image
Consumer trust in Google’s top developers’ apps: an exploratory study
Harris, Mark A.; Chin, Amita G. - In: Information & Computer Security 24 (2016) 5, pp. 474-495
Purpose This paper aims to investigate Google’s top developers’ apps with trust badges to see if they warrant an additional level of trust and confidence from consumers, as stated by Google. Design/methodology/approach Risky app permissions and in-app purchases (IAP) from Google’s top...
Persistent link: https://www.econbiz.de/10014754868
Saved in:
Cover Image
Privacy as a secondary goal problem: an experiment examining control
Hughes-Roberts, Thomas - In: Information & Computer Security 23 (2015) 4, pp. 382-393
Purpose – The purpose of this paper is to report on results of an investigation into the impact of adding privacy salient information (defined through the theory of planned behaviour) into the user interface (UI) of a faux social network. Design/methodology/approach – Participants were asked...
Persistent link: https://www.econbiz.de/10014754850
Saved in:
Cover Image
The E‐Privacy Imperative: Protect Your Customers’ Internet Privacy and Ensure Your Company’s Survival in the Electronic Age
Warrington, Traci - In: Journal of Consumer Marketing 20 (2003) 3, pp. 269-271
Persistent link: https://www.econbiz.de/10014848332
Saved in:
Cover Image
Remember the human: the first rule of netiquette, librarians and the Internet
Sturges, Paul - In: Online Information Review 26 (2002) 3, pp. 209-216
In one of the written versions of netiquette, the first rule is “remember the human”. This is intended to encourage more tolerant and considerate behaviour amongst Internet users. It could also be taken as a reminder to librarians that they should not let the attractions of new technology...
Persistent link: https://www.econbiz.de/10014965309
Saved in:
Cover Image
B2C data privacy policies: current trends
Johnson‐Page, Grace F.; Thatcher, R. Scott - In: Management Decision 39 (2001) 4, pp. 262-272
Reviews 149 business‐to‐consumer (B2C) Web sites in nine countries and across five industries. One wanted to identify patterns that would allow one to draw conclusions about why companies chose to display data privacy policies on their Web sites. Presents an overview of the impact of...
Persistent link: https://www.econbiz.de/10014932223
Saved in:
Cover Image
Consumer privacy rights: CPR and the age of the Internet
Nakra, Prema - In: Management Decision 39 (2001) 4, pp. 272-279
In recent months several high‐profile breaches of consumer privacy have raised public concern about data gathering on the Web. The issue of privacy has led to lawsuits by consumers and consumer advocacy groups and investigations by government regulations. As businesses wrestle with the...
Persistent link: https://www.econbiz.de/10014934939
Saved in:
  • 1
  • 2
  • Next
  • Last
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...