Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Information control")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Origin

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 747

  • Page / 30
Export

Selection :

  • and

Three-dimensional context-aware tailoring of informationGRONLI, Tor-Morten; GHINEA, George.Online information review (Print). 2010, Vol 34, Num 6, pp 892-906, issn 1468-4527, 15 p.Article

The nastiness of dataSEADLE, Michael.Library hi tech. 2009, Vol 27, Num 3, pp 333-337, issn 0737-8831, 5 p.Article

Open Collides Information Everything With ControlARNOLD, Stephen E.Online searcher. 2013, Vol 37, Num 4, pp 49-51, issn 2324-9684, 3 p.Article

Knowledge/information security : Political engineering in knowledge securityRYAN, Julie J. C. H.VINE. Very informal newsletter on library automation. 2006, Vol 36, Num 3, pp 265-266, issn 0305-5728, 2 p.Article

A decision theoretic approach to combining information filteringBINUN, Alexander; SHAPIRA, Bracha; ELOVICI, Yuval et al.Online information review (Print). 2009, Vol 33, Num 5, pp 920-942, issn 1468-4527, 23 p.Article

Malware : the new legal riskETSEBETH, Verine.Electronic library. 2007, Vol 25, Num 5, pp 534-542, issn 0264-0473, 9 p.Article

Perception of risk and the strategic impact of existing IT on information security strategy at board level : Issues in online securityMCFADZEAN, Elspeth; EZINGEARD, Jean-Noel; BIRCHALL, David et al.Online information review (Print). 2007, Vol 31, Num 5, pp 622-660, issn 1468-4527, 39 p.Article

A strategic modeling technique for information security risk assessmentMISRA, Subhas C; KUMAR, Vinod; KUMAR, Uma et al.Information management & computer security. 2007, Vol 15, Num 1, pp 64-77, issn 0968-5227, 14 p.Article

A theoretical exploration of information behaviour: a power perspectiveMUTSHEWA, Athulang.Aslib proceedings : New information perspectives. 2007, Vol 59, Num 3, pp 249-263, 15 p.Article

Sharing and hiding online secrets: Using social relation and tag ontology in social software access controlLIU, Chi-Lun.Online information review (Print). 2010, Vol 34, Num 3, pp 377-394, issn 1468-4527, 18 p.Article

Censure et culture = Censorship and cultureBERTRAND, Anne-Marie.Bulletin des bibliothèques de France (Imprimé). 2004, Vol 49, Num 4, pp 130-131, issn 0006-2006, 2 p.Article

Ancora sulla censuraREVELLI, Carlo.Biblioteche oggi. 2013, Vol 31, Num 5, pp 62-65, issn 0392-8586, 4 p.Article

A framework of anti-phishing measures aimed at protecting the online consumer's identityBUTLER, Rika.Electronic library. 2007, Vol 25, Num 5, pp 517-533, issn 0264-0473, 17 p.Article

Collection Building of School Libraries in Kuwait: Censorship or SelectionALQUDSI-GHABRA, Taghreed M.The International information & library review (Print). 2014, Vol 46, Num 1-2, pp 74-83, issn 1057-2317, 10 p.Article

Information structures to secure control of globally rigid formationsEREN, Tolga; WHITELEY, Walter; MORSE, A. Stephen et al.American Control Conference. 2004, pp 4945-4950, isbn 0-7803-8335-4, 6 p.Conference Paper

Brave.Net.World : the Internet as a disinformation superhighway ?FLORIDI, L.Electronic library. 1996, Vol 14, Num 6, pp 509-514, issn 0264-0473Article

Semantic modeling of internal controls in database designPRABUDDHA DE; ARUN SEN.Journal of management information systems. 1988, Vol 5, Num 2, pp 39-56, issn 0742-1222Article

Simple, robust and highly concurrent B-trees with node deletionLOMET, David.International Conference on data engineering. 2004, pp 18-28, isbn 0-7695-2065-0, 1Vol, 11 p.Conference Paper

Share based measures for itemsetsCARTER, C. L; HAMILTON, H. J; CERCONE, N et al.Lecture notes in computer science. 1997, pp 14-24, issn 0302-9743, isbn 3-540-63223-9Conference Paper

UNTERSUCHUNGEN ZUR PUNKUEBERTRAGUNG = RECHERCHES SUR LA TRANSMISSION DE POINTSSIGLE M.1982; BILDMESS. LUFTBILDWES.; ISSN 0006-2421; DEU; DA. 1982; VOL. 50; NO 3; PP. 91-100; ABS. ENG/FRE; BIBL. 10 REF.Article

MODIFICATION DE L'ALGORITHME DE CONTROLE HORIZONTALGRABOWSKA U; PARFINIEWICZ J; JAKUBIAK B et al.1977; PRZEGL. GEOFIZ.; POLSKA; DA. 1977; VOL. 22; NO 3-4; PP. 259-262; ABS. ANGL.; BIBL. 6 REF.Article

Information in the national liberation struggle : modelling the case of Namibia (1966-1990)STURGES, Paul; KATJIHINGUA, Mbenae; MCHOMBU, Kingo et al.Journal of documentation. 2005, Vol 61, Num 6, pp 735-750, issn 0022-0418, 16 p.Article

Formulating information systems risk management strategies through cultural theoryTSOHOU, Aggeliki; KARYDA, Maria; KOKOLAKIS, Spyros et al.Information management & computer security. 2006, Vol 14, Num 2-3, pp 198-217, issn 0968-5227, 20 p.Article

Geographic relevanceRAPER, Jonathan.Journal of documentation. 2007, Vol 63, Num 6, pp 836-852, issn 0022-0418, 17 p.Article

Information security : management's effect on culture and policyKNAPP, Kenneth J; MARSHALL, Thomas E; RAINER, R. Kelly et al.Information management & computer security. 2006, Vol 14, Num 1, pp 24-36, issn 0968-5227, 13 p.Article

  • Page / 30