Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Information control")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Origin

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 498

  • Page / 20
Export

Selection :

  • and

Three-dimensional context-aware tailoring of informationGRONLI, Tor-Morten; GHINEA, George.Online information review (Print). 2010, Vol 34, Num 6, pp 892-906, issn 1468-4527, 15 p.Article

The nastiness of dataSEADLE, Michael.Library hi tech. 2009, Vol 27, Num 3, pp 333-337, issn 0737-8831, 5 p.Article

Perception of risk and the strategic impact of existing IT on information security strategy at board level : Issues in online securityMCFADZEAN, Elspeth; EZINGEARD, Jean-Noel; BIRCHALL, David et al.Online information review (Print). 2007, Vol 31, Num 5, pp 622-660, issn 1468-4527, 39 p.Article

A strategic modeling technique for information security risk assessmentMISRA, Subhas C; KUMAR, Vinod; KUMAR, Uma et al.Information management & computer security. 2007, Vol 15, Num 1, pp 64-77, issn 0968-5227, 14 p.Article

A theoretical exploration of information behaviour: a power perspectiveMUTSHEWA, Athulang.Aslib proceedings : New information perspectives. 2007, Vol 59, Num 3, pp 249-263, 15 p.Article

Sharing and hiding online secrets: Using social relation and tag ontology in social software access controlLIU, Chi-Lun.Online information review (Print). 2010, Vol 34, Num 3, pp 377-394, issn 1468-4527, 18 p.Article

Ancora sulla censuraREVELLI, Carlo.Biblioteche oggi. 2013, Vol 31, Num 5, pp 62-65, issn 0392-8586, 4 p.Article

A framework of anti-phishing measures aimed at protecting the online consumer's identityBUTLER, Rika.Electronic library. 2007, Vol 25, Num 5, pp 517-533, issn 0264-0473, 17 p.Article

Collection Building of School Libraries in Kuwait: Censorship or SelectionALQUDSI-GHABRA, Taghreed M.The International information & library review (Print). 2014, Vol 46, Num 1-2, pp 74-83, issn 1057-2317, 10 p.Article

Simple, robust and highly concurrent B-trees with node deletionLOMET, David.International Conference on data engineering. 2004, pp 18-28, isbn 0-7695-2065-0, 1Vol, 11 p.Conference Paper

Share based measures for itemsetsCARTER, C. L; HAMILTON, H. J; CERCONE, N et al.Lecture notes in computer science. 1997, pp 14-24, issn 0302-9743, isbn 3-540-63223-9Conference Paper

UNTERSUCHUNGEN ZUR PUNKUEBERTRAGUNG = RECHERCHES SUR LA TRANSMISSION DE POINTSSIGLE M.1982; BILDMESS. LUFTBILDWES.; ISSN 0006-2421; DEU; DA. 1982; VOL. 50; NO 3; PP. 91-100; ABS. ENG/FRE; BIBL. 10 REF.Article

MODIFICATION DE L'ALGORITHME DE CONTROLE HORIZONTALGRABOWSKA U; PARFINIEWICZ J; JAKUBIAK B et al.1977; PRZEGL. GEOFIZ.; POLSKA; DA. 1977; VOL. 22; NO 3-4; PP. 259-262; ABS. ANGL.; BIBL. 6 REF.Article

Formulating information systems risk management strategies through cultural theoryTSOHOU, Aggeliki; KARYDA, Maria; KOKOLAKIS, Spyros et al.Information management & computer security. 2006, Vol 14, Num 2-3, pp 198-217, issn 0968-5227, 20 p.Article

Geographic relevanceRAPER, Jonathan.Journal of documentation. 2007, Vol 63, Num 6, pp 836-852, issn 0022-0418, 17 p.Article

Information security : management's effect on culture and policyKNAPP, Kenneth J; MARSHALL, Thomas E; RAINER, R. Kelly et al.Information management & computer security. 2006, Vol 14, Num 1, pp 24-36, issn 0968-5227, 13 p.Article

MIFS-ND: A mutual information-based feature selection methodHOQUE, N; BHATTACHARYYA, D. K; KALITA, J. K et al.Expert systems with applications. 2014, Vol 41, Num 14, pp 6371-6385, issn 0957-4174, 15 p.Article

Security challenges in the distributed cloud computingNWOBODO, Ikechukwu; JAHANKHANI, Hossein; EDOH, Aloysius et al.International journal of electronic security and digital forensics (Print). 2014, Vol 6, Num 1, pp 38-51, issn 1751-911X, 14 p.Article

Information-Seeking Control Under Visibility-Based UncertaintyVALENTE, Luca; TSAI, Yen-Hsi R; SOATTO, Stefano et al.Journal of mathematical imaging and vision. 2014, Vol 48, Num 2, pp 339-358, issn 0924-9907, 20 p.Article

The Books Will Still Be in the Library: Narrow Definitions of Censorship in the Discourse of ChallengersKNOX, Emily.Library trends. 2014, Vol 62, Num 4, pp 740-749, issn 0024-2594, 10 p.Article

Beyond obscenity: an analysis of sexual discourse in LIS educational textsHILL, Heather; HARRINGTON, Marni.Journal of documentation. 2014, Vol 70, Num 1, pp 62-73, issn 0022-0418, 12 p.Article

A Quantitative Model and Analysis of Information Confusion in Social NetworksANAND, S; SUBBALAKSHMI, K. P; CHANDRAMOULI, R et al.IEEE transactions on multimedia. 2013, Vol 15, Num 1, pp 207-223, issn 1520-9210, 17 p.Article

Efficiently gathering information in costly domainsRECHES, Shulamit; GAL, Ya'akov; KRAUS, Sarit et al.Decision support systems. 2013, Vol 55, Num 1, pp 326-335, issn 0167-9236, 10 p.Article

Using local conditions to reduce control overheadSHAUKAT, Kahkashan; SYROTIUK, Violet R.Ad hoc networks. 2013, Vol 11, Num 6, pp 1782-1795, issn 1570-8705, 14 p.Article

Online learning for auction mechanism in bandit settingDI HE; WEI CHEN; LIWEI WANG et al.Decision support systems. 2013, Vol 56, pp 379-386, issn 0167-9236, 8 p.Article

  • Page / 20