Search

Your search keyword '"e-security"' showing total 41 results

Search Constraints

Start Over You searched for: Descriptor "e-security" Remove constraint Descriptor: "e-security"
41 results on '"e-security"'

Search Results

1. Does perceived behavioral control mediate customers' innovativeness and continuance intention of e-money? The moderating role of perceived risk and e-security.

2. Exploring the customer e-loyalty of millennials when purchasing footwear online in South Africa

3. The effect of online deception on behavioral intention towards e-tailers: the mediating role of e-shopping value and e-trust.

4. Online Signature Recognition: A Biologically Inspired Feature Vector Splitting Approach.

7. E-commerce no setor do vestuário: Alterações do consumo no pós-pandemia em Portugal.

8. Identifying effective factors in implementing einsurance and its impact on competitive advantage and profitability in selected insurance companies.

9. User Acceptance of Biometrics in E-banking to improve Security.

10. Handwriting Biometrics: Applications and Future Trends in e-Security and e-Health.

11. ORGANIZATION OF INFORMATION SECURITY IN E-GOVERNMENT AS MEANS OF INFORMATION RIGHTS PROTECTION.

13. Consumers Data: When the Private Goes Public : An exploratory study on consumers’ concerns in the public and private spheres of e-commerce.

15. Coopetition as an Emerging Trend in Research: Perspectives for Safety & Security.

16. Trasformazione digitale e open government: una panoramica delle questioni giuridiche

17. Personal digital bodyguards for e-security, e-learning and e-health: A prospective survey.

18. Coopetition as an Emerging Trend in Research: Perspectives for Safety & Security

20. Security Threats and Measures in E-learning in Pakistan: A Review.

22. Privacy and security in e-commerce

23. Electronic Government Procurement Implementation Types : Options for Africa

24. ELEKTRONİK TİCARETTE GÜVENLİĞİN TÜKETİCİLERİN İNTERNET ÜZERİNDEN ALIŞVERİŞ YAPMA TUTUMLARINA ETKİSİ: KOCAELİ ÖRNEĞİ.

25. A HUMAN IRIS RECOGNITION TECHNIQUES TO ENHANCE E-SECURITY ENVIRONMENT USING WAVELET TRASFORM.

26. The Converging Technology Revolution and Human Capital: Potential and Implications for South Asia

27. Global Experiences from Regulatory Sandboxes

28. A Model for Improving e-Security in Australian Universities.

29. A Copyright Protection using Watermarking Algorithm.

30. EU homeland security: citizens or suspects?

31. The Regulation of Digital Trade : Key Policies and International Trends

32. Advancing Digital Financial Inclusion in ASEAN : Policy and Regulatory Enablers

33. Ukraine e-Government Assessment

34. Financial Sector’s Cybersecurity : Regulations and Supervision

35. Privacy by Design : Current Practices in Estonia, India, and Austria

36. Block Chain : Opportunities for Private Enterprises in Emerging Market

37. A Model for Improving e-Security in Australian Universities

38. Privatnost i sigurnost u elektroničkom poslovanju

40. BT to offer customers encryption service for data.

Catalog

Books, media, physical & digital resources