Item request has been placed! ×
Item request cannot be made. ×
  Processing Request
Academic Journal

Building a better filter how to create a safer Internet and avoid the litigation trap

  • Authors : Egan, E.; Jucovy, T.

Subjects: Computing and Processing; Information filtering; Information filters

  • Source: IEEE Security & Privacy IEEE Secur. Privacy Security & Privacy, IEEE. 4(3):37-44 Jun, 2006

Record details

×
Academic Journal

Virtual Judgment: Legal Implications of Online Gaming

  • Authors : Kane, S.F.

Subjects: Computing and Processing; Law; Legal factors

  • Source: IEEE Security & Privacy IEEE Secur. Privacy Security & Privacy, IEEE. 7(3):23-28 Jun, 2009

Record details

×
Academic Journal

Forensics Is So "Yesterday"

  • Authors : Caloyannides, M.A.

Subjects: Computing and Processing; Law; Protection

  • Source: IEEE Security & Privacy IEEE Secur. Privacy Security & Privacy, IEEE. 7(2):18-25 Apr, 2009

Record details

×
Academic Journal

Feist and facts: if data is protected will it be more or less available?

  • Authors : Lesk, M.

Subjects: Computing and Processing; Protection; Databases

  • Source: IEEE Security & Privacy IEEE Secur. Privacy Security & Privacy, IEEE. 1(6):68-70 Jan, 2003

Record details

×
Academic Journal

The ChoicePoint Dilemma: How Data Brokers Should Handle the Privacy of Personal Information

  • Authors : Otto, P.N.; Anton, A.I.; Baumer, D.L.

Subjects: Computing and Processing; Data privacy; Companies

  • Source: IEEE Security & Privacy IEEE Secur. Privacy Security & Privacy, IEEE. 5(5):15-23 Jan, 2007

Record details

×
Academic Journal

Cyberinsurance in IT Security Management

  • Authors : Baer, W.S.; Parkinson, A.

Subjects: Computing and Processing; Computer security; Information security

  • Source: IEEE Security & Privacy IEEE Secur. Privacy Security & Privacy, IEEE. 5(3):50-56 Jun, 2007

Record details

×
Academic Journal

News Briefs

  • Authors : Goetz, E.; Jones, G.; Kesler, B.

Subjects: Computing and Processing; Privacy; Computer crime

  • Source: IEEE Security & Privacy IEEE Secur. Privacy Security & Privacy, IEEE. 3(1):9-10 Jan, 2005

Record details

×
Academic Journal

Antispam bills face tough challenges

  • Authors : Goth, G.

Subjects: Computing and Processing; Business; Legislation

  • Source: IEEE Security & Privacy IEEE Secur. Privacy Security & Privacy, IEEE. 1(5):8-9 Jan, 2003

Record details

×
Academic Journal

Averting security missteps in outsourcing

  • Authors : Power, E.M.; Trope, R.L.

Subjects: Computing and Processing; Outsourcing; Data security

  • Source: IEEE Security & Privacy IEEE Secur. Privacy Security & Privacy, IEEE. 3(2):70-73 Apr, 2005

Record details

×
Academic Journal

Ethics in security vulnerability research

  • Authors : Matwyshyn, A.M.; Ang Cui; Keromytis, A.D.

Subjects: Computing and Processing; Ethics; Information security

  • Source: IEEE Security & Privacy IEEE Secur. Privacy Security & Privacy, IEEE. 8(2):67-72 Apr, 2010

Record details

×
  • 1-10 of  15 results for ""business""