EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject:"Computer privacy"
Narrow search

Narrow search

Year of publication
Subject
All
Computer privacy 12 Computer security 5 Data security 3 Internet 3 Android 1 Artificial Intelligence 1 Asia 1 Audit commission 1 Big Data 1 Communications industry 1 Communications technology 1 Complexity 1 Computer Privacy 1 Computer fraud 1 Computer networks 1 Computer systems 1 Consumer behavior 1 Consumer protection 1 Customer care 1 Data integrity 1 Electronic commerce 1 End-user computing 1 Ethics 1 Europe 1 Facebook 1 Fog Computing 1 Google top developers 1 Hacking 1 Human physiology 1 IAP 1 Information disclosure 1 Information systems 1 Intelligence Gathering 1 Latin America 1 Libraries 1 Mobile device security 1 North America 1 Perceptions 1 Permissions 1 Personal computers 1
more ... less ...
Online availability
All
Undetermined 13
Type of publication
All
Article 13
Type of publication (narrower categories)
All
research-article 6 conceptual-paper 2 review 2 review-article 2
Language
All
English 13
Author
All
Al-Ameen, Mahdi Nasrullah 1 Amara Korba, Abdelaziz 1 Chin, Amita G. 1 Ghanemi, Salim 1 Gurung, Anil 1 Harris, Mark A. 1 Horne, Jeremy 1 Hughes-Roberts, Thomas 1 Johnson‐Page, Grace F. 1 Kippenberger, T 1 Mills, Alan 1 Nafaa, Mehdi 1 Nakra, Prema 1 Raja, M.K. 1 Seng, Sovantharith 1 Sturges, Paul 1 Tarrant, Peter 1 Thatcher, R. Scott 1 Warrington, Traci 1 Wright, Matthew 1
more ... less ...
Published in...
All
Information & Computer Security 5 Industrial Management & Data Systems 2 Management Decision 2 International Journal of Fog Computing (IJFC) 1 Journal of Consumer Marketing 1 Online Information Review 1 The Antidote 1
more ... less ...
Source
All
Other ZBW resources 13
Showing 11 - 13 of 13
Cover Image
It's a PC world
Kippenberger, T - In: The Antidote 4 (1999) 2, pp. 19-19
Speculates that, recently, end‐user systems have grown relatively uncontrollable, beyond IT support scope and at end‐user discretion. Predicts that date logic problems are likely to affect all PCs in one way or another, believing that over 90 percent of PCs bought prior to 1997 will fail at...
Persistent link: https://www.econbiz.de/10015018174
Saved in:
Cover Image
Inadequate security encourages the thief
Mills, Alan - In: Industrial Management & Data Systems 95 (1995) 2, pp. 3-5
Reviews the findings of the Audit Commission′s fifth triennial report on computer fraud and abuse, published in October 1994. This shows that, while computer fraud and abuse is a growth industry, many organizations do not seem to take computer security seriously. Also considers a survey...
Persistent link: https://www.econbiz.de/10014824622
Saved in:
Cover Image
Personal Data: The Act Begins to Bite
Tarrant, Peter - In: Industrial Management & Data Systems 90 (1990) 1, pp. 11-14
Managers responsible for personal data held on computer need to be aware of and comply with the terms of the Data Protection Act 1984. Registration and compliance with the eight data protection principles are essential requirements. The role of the Registrar in ensuring enforcement of the Act is...
Persistent link: https://www.econbiz.de/10014824490
Saved in:
  • First
  • Prev
  • 1
  • 2
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...