1. Implementing successful G2B initiatives in the HKSAR: An empirical evaluation of G2B websites. Issue 3 (2014) Authors: Other Names: Special Editor. Journal: Journal of information, communication & ethics in society Issue: Volume 12:Issue 3(2014) Page Start: 219 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. How do Polish and Indonesian disclose in Facebook?: Differences in online self‐disclosure, need for popularity, need to belong and self‐esteem. Issue 3 (2014) Authors: Other Names: Special Editor. Journal: Journal of information, communication & ethics in society Issue: Volume 12:Issue 3(2014) Page Start: 195 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. Sustainable development, e‐learning and Web 3.0: A descriptive literature review. Issue 3 (2014) Authors: Other Names: Special Editor. Journal: Journal of information, communication & ethics in society Issue: Volume 12:Issue 3(2014) Page Start: 157 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. The engagement of social media technologies by undergraduate informatics students for academic purpose in Malaysia. Issue 3 (2014) Authors: Other Names: Special Editor. Journal: Journal of information, communication & ethics in society Issue: Volume 12:Issue 3(2014) Page Start: 177 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. A study of Internet service provider industry stakeholder collaboration in Australia: An institutional perspective. Issue 3 (2014) Authors: Other Names: Special Editor. Journal: Journal of information, communication & ethics in society Issue: Volume 12:Issue 3(2014) Page Start: 245 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
6. New chaotic encryption algorithm based on chaotic sequence and plain text. Issue 3 (1st May 2014) Authors: Wang, Xing‐Yuan; Gu, Sheng‐Xian Journal: IET information security Issue: Volume 8:Issue 3(2014) Page Start: 213 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
7. Genetically derived secure cluster‐based data aggregation in wireless sensor networks. Issue 1 (1st January 2014) Authors: Bhasker, Lathies Journal: IET information security Issue: Volume 8:Issue 1(2014) Page Start: 1 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
8. Comments on 'Fair (t, n) threshold secret sharing scheme'. Issue 6 (1st November 2014) Authors: Harn, Lein Journal: IET information security Issue: Volume 8:Issue 6(2014) Page Start: 303 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
9. Chinese remainder Theorem based centralised group key management for secure multicast communication. Issue 3 (1st May 2014) Authors: Vijayakumar, Pandi; Bose, Sudan; Kannan, Arputharaj Journal: IET information security Issue: Volume 8:Issue 3(2014) Page Start: 179 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
10. Optimisation‐based collaborative determination of component trustworthiness in service compositions. Issue 6 (17th March 2014) Authors: Elshaafi, Hisain; Botvich, Dmitri Journal: Security and communication networks Issue: Volume 9:Issue 6(2016) Page Start: 513 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗