Works matching DE "ONLINE social network security"
1
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 4, p. 401, doi. 10.1049/iet-ifs.2018.5286
- Wang, Xiujuan;
- Tang, Haoyang;
- Zheng, Kangfeng;
- Tao, Yuanrui
- Article
2
- IDP: Revista de Internet, Derecho y Politica, 2012, n. 15, p. 76, doi. 10.7238/idp.v0i15.1633
- Article
3
- IDP: Revista de Internet, Derecho y Politica, 2012, n. 15, p. 61, doi. 10.7238/idp.v0i15.1646
- Reigada, Antonio Troncoso
- Article
4
- Journal of Marketing Management, 2017, v. 33, n. 17/18, p. 1465, doi. 10.1080/0267257X.2017.1400994
- Kelly, Louise;
- Kerr, Gayle;
- Drennan, Judy
- Article
5
- 2017
- Hurtubise, Larry;
- Patrick, Michael;
- Stukus, David
- Letter to the Editor
6
- Computer Journal, 2015, v. 58, n. 4, p. 515, doi. 10.1093/comjnl/bxu151
- Article
7
- Information Technology & Management, 2016, v. 17, n. 4, p. 341, doi. 10.1007/s10799-015-0246-0
- James, Tabitha;
- Nottingham, Quinton;
- Collignon, Stephane;
- Warkentin, Merrill;
- Ziegelmayer, Jennifer
- Article
8
- Computers, Materials & Continua, 2019, v. 59, n. 2, p. 533, doi. 10.32604/cmc.2019.05570
- Pingshui Wang;
- Zecheng Wang;
- Tao Chen;
- Qinjuan Ma
- Article
9
- IADIS International Journal on WWW/Internet, 2017, v. 15, n. 1, p. 31
- Ikhalia, Ehinome;
- Serrano, Alan;
- Bell, David;
- Arreymbi, Johannes
- Article
10
- Communication Law & Policy, 2022, v. 27, n. 3/4, p. 167, doi. 10.1080/10811680.2022.2136472
- Sinnreich, Aram;
- Sanchez-Santos, Mariana;
- Perry, Neil W.;
- Aufderheide, Patricia
- Article
11
- IDEA: The Intellectual Property Law Review, 2021, v. 61, n. 2, p. 275
- Article
12
- Electronic Journal of Information Systems Evaluation, 2010, v. 13, n. 2, p. 121
- Hooper, Tony;
- Evans, Tyrone Bard
- Article
13
- Australian Journal of Forensic Sciences, 2016, v. 48, n. 4, p. 469, doi. 10.1080/00450618.2015.1066854
- Norouzizadeh Dezfouli, Farhood;
- Dehghantanha, Ali;
- Eterovic-Soric, Brett;
- Choo, Kim-Kwang Raymond
- Article
14
- Journal of Financial Planning, 2011, v. 24, n. 10, p. 36
- Article
15
- Zer: Journal of Communication Studies / Revista de Estudios de Comunicacion / Komunikazio Ikasketen Aldizkaria, 2015, v. 20, n. 39, p. 163, doi. 10.1387/zer.15531
- Article
16
- CyberPsychology, Behavior & Social Networking, 2018, v. 21, n. 9, p. 556, doi. 10.1089/cyber.2018.0196
- Casado-Aranda, Luis-Alberto;
- Sánchez-Fernández, Juan;
- Montoro-Ríos, Francisco J.
- Article
17
- Regulation, 2018, v. 41, n. 2, p. 80
- Article
18
- Journal of the Association for Information Systems, 2011, v. 12, n. 12, p. 798
- Heng Xu;
- Dinev, Tamara;
- Smith, Jeff;
- Hart, Paul
- Article
19
- Journal of Broadcasting & Electronic Media, 2024, v. 68, n. 5, p. 758, doi. 10.1080/08838151.2024.2407541
- Kang, Hyunjin;
- Shin, Wonsun
- Article
20
- Journal of Big Data, 2018, v. 5, n. 1, p. 1, doi. 10.1186/s40537-018-0147-2
- AlMahmoud, Hind;
- AlKhalifa, Shurug
- Article
21
- Mobile Networks & Applications, 2015, v. 20, n. 6, p. 840, doi. 10.1007/s11036-015-0619-y
- Lyu, Saixia;
- Liu, Jianxun;
- Tang, Mingdong;
- Xu, Yu;
- Chen, Jinjun
- Article
22
- RISTI: Iberian Journal on Information Systems & Technologies / Revista Ibérica de Sistemas e Tecnologias de Informação, 2012, n. 9, p. 59, doi. 10.4304/risti.9.59-73
- Fernández, J. R. Coz;
- Chamorro, E. Fojón;
- Heradio Gil, R.;
- Cerrada Somolinos, J. A.
- Article
23
- Journal of Global Marketing, 2018, v. 31, n. 2, p. 96, doi. 10.1080/08911762.2017.1412552
- Adhikari, Kishalay;
- Panda, Rajeev Kumar
- Article
24
- Data Mining & Knowledge Discovery, 2012, v. 24, n. 3, p. 697, doi. 10.1007/s10618-012-0254-1
- Article
25
- Comunicar, 2014, v. 22, n. 43, p. 123, doi. 10.3916/C43-2014-12
- VANDERHOVEN, ELLEN;
- SCHELLEN, TAMMY;
- VALCKE, MARTIN
- Article
26
- Journal of Law, Information & Science, 2014, v. 23, n. 1, p. 169
- Article
27
- Journal of Law, Information & Science, 2014, v. 23, n. 1, p. 158
- Article
28
- Journal of Law, Information & Science, 2014, v. 23, n. 1, p. 50
- BENNETT, COLIN J.;
- PARSONS, CHRISTOPHER A.;
- MOLNAR, ADAM
- Article
29
- International Journal of Law & Information Technology, 2014, v. 22, n. 3, p. 254, doi. 10.1093/ijlit/eau002
- Wauters, Ellen;
- Lievens, Eva;
- Valcke, Peggy
- Article
30
- Security & Communication Networks, 2016, v. 9, n. 18, p. 5625, doi. 10.1002/sec.1722
- Chen, Jing;
- Zhang, Bowen;
- Chen, Min;
- Yuan, Quan;
- Du, Ruiying
- Article
31
- Security & Communication Networks, 2016, v. 9, n. 15, p. 2686, doi. 10.1002/sec.1261
- Fan, Xiaochen;
- Yang, Panlong;
- Li, Qingyu;
- Liu, Dawei;
- Xiang, Chaocan;
- Zhao, Yonggang
- Article
32
- Security & Communication Networks, 2015, v. 8, n. 17, p. 3191, doi. 10.1002/sec.1244
- Li, Gaoxiang;
- Wu, Di;
- Shen, Junfeng;
- Li, Tingting
- Article
33
- International Journal of Distributed Sensor Networks, 2017, v. 13, n. 2, p. 1, doi. 10.1177/1550147717694170
- He, Yukun;
- Li, Qiang;
- Cao, Jian;
- Ji, Yuede;
- Guo, Dong
- Article
34
- Multimedia Tools & Applications, 2019, v. 78, n. 3, p. 3409, doi. 10.1007/s11042-018-6962-9
- Article
35
- Mathematics (2227-7390), 2018, v. 6, n. 10, p. 177, doi. 10.3390/math6100177
- Zhu, Guang;
- Liu, Hu;
- Feng, Mining
- Article
36
- Contemporary Educational Technology, 2010, v. 1, n. 1, p. 46
- Akbulut, Yavuz;
- Sahin, Yusuf Levent;
- Eristi, Bahadir
- Article
37
- International Journal of Electronic Commerce, 2017, v. 21, n. 2, p. 151, doi. 10.1080/10864415.2016.1234281
- Pan, Yu;
- Wan, Yan;
- Fan, Jing;
- Liu, Bailing;
- Archer, Norm
- Article
38
- Seton Hall Law Review, 2014, v. 44, n. 4, p. 1255
- Article
39
- Sādhanā: Academy Proceedings in Engineering Sciences, 2018, v. 43, n. 9, p. 1, doi. 10.1007/s12046-018-0885-z
- Meena Kowshalya, A;
- Valarmathi, M L
- Article
40
- International Journal of Advanced Research in Computer Science, 2013, v. 4, n. 2, p. 357
- Srivastava, Amrita;
- Verma, Ruchi;
- Yadav, Ram Chandra;
- Venkatesan, S.
- Article
41
- South Carolina Law Review, 2013, v. 64, n. 3, p. 717
- Article
42
- Computers (2073-431X), 2018, v. 7, n. 3, p. 42, doi. 10.3390/computers7030042
- Aghasian, Erfan;
- Garg, Saurabh;
- Montgomery, James
- Article
43
- International Journal of Information Security, 2016, v. 15, n. 5, p. 475, doi. 10.1007/s10207-016-0321-5
- Almaatouq, Abdullah;
- Shmueli, Erez;
- Nouh, Mariam;
- Alabdulkareem, Ahmad;
- Singh, Vivek;
- Alsaleh, Mansour;
- Alarifi, Abdulrahman;
- Alfaris, Anas;
- Pentland, Alex
- Article
44
- IEEE Internet Computing, 2011, v. 15, n. 5, p. 62, doi. 10.1109/MIC.2011.111
- Park, Jaehong;
- Sandhu, Ravi;
- Cheng, Yuan
- Article
45
- IEEE Internet Computing, 2011, v. 15, n. 4, p. 56, doi. 10.1109/MIC.2011.50
- Hongyu Gao;
- Jun Hu;
- Tuo Huang;
- Jingnan Wang;
- Yan Chen
- Article
46
- IEEE Internet Computing, 2011, v. 15, n. 2, p. c3, doi. 10.1109/MIC.2011.32
- Article
47
- Information World / Bilgi Dünyası, 2014, v. 15, n. 2, p. 231
- KÜLCÜ, Özgür;
- HENKOĞLU, Türkay
- Article
48
- Journal of Theoretical & Applied Electronic Commerce Research, 2016, v. 11, n. 2, p. 1, doi. 10.4067/S0718-18762016000200002
- Foltz, C. Bryan;
- Newkirk, Henry E.;
- Schwager, Paul H.
- Article
49
- ITNOW, 2013, v. 55, n. 2, p. 28, doi. 10.1093/itnow/bwt012
- Article
50
- ITNOW, 2013, v. 55, n. 2, p. 26, doi. 10.1093/itnow/bwt011
- Article