1431. Information privacy and the digital generation gap: An exploratory study. Issue 4 (1st October 2016) Authors: Halperin, Ruth; Dror, Yuval Journal: Journal of information privacy & security Issue: Volume 12:Issue 4(2016) Page Start: 166 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1432. Editorial preface. Issue 4 (1st October 2016) Authors: Bagchi, Editor in Chief, Kallol Journal: Journal of information privacy & security Issue: Volume 12:Issue 4(2016) Page Start: 165 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1433. Perceived deception: Evaluating source credibility and self-efficacy. Issue 4 (1st October 2016) Authors: Ormond, Dustin; Warkentin, Merrill; Johnston, Allen C.; Thompson, Samuel C. Journal: Journal of information privacy & security Issue: Volume 12:Issue 4(2016) Page Start: 197 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1434. Social Physics: How Good Ideas Spread-The Lessons from a New Science, by Alex Pentland: New York, NY, The Penguin Press, 2014, 300 pp., $27.95 (hardcover), ISBN: 978-1-59420-565-1. Issue 4 (1st October 2016) Authors: Arslan, Faruk Journal: Journal of information privacy & security Issue: Volume 12:Issue 4(2016) Page Start: 218 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1435. Ca-NIDS: A network intrusion detection system using combinatorial algorithm approach. Issue 4 (1st October 2016) Authors: Folorunso, Olusegun; Ayo, Femi Emmanuel; Babalola, Y. E. Journal: Journal of information privacy & security Issue: Volume 12:Issue 4(2016) Page Start: 181 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1436. Transactions on large-scale data- and knowledge-centered systems XXXIX : special issue on database- and expert-systems applications /: special issue on database- and expert-systems applications. (2018) Editors: Hameurlain, Abdelkader; Wagner, Roland R; Benslimane, Djamal; Damiani, Ernesto, 1960-; Grosky, William I Other Names: Database and Expert Systems Applications Conference, 28th Record Type: Book Extent: 1 online resource (ix, 227 pages), illustrations (some color) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1437. Regulating new technologies in uncertain times. ([2019]) Editors: Reins, Leonie Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1438. Security controls : evaluation, testing and assessment handbook /: evaluation, testing and assessment handbook. (2015) Authors: Johnson, Leighton Record Type: Book Extent: 1 online resource, illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1439. Microsoft Identity Manager 2016 handbook. (2016) Authors: Steadman, David; Ingalls, Jeff Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1440. Security in fixed and wireless networks. (2016) Authors: (Telecommunications engineer), Schäfer, Günter; Rossberg, Michael Record Type: Book Extent: 1 online resource (624 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗