

Publisher: Taylor & Francis Ltd
ISSN: 0736-6981
Source: EDPACS, Vol.50, Iss.1, 2014-07, pp. : 1-10
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Related content


Privacy and Security Part II: It's Personal
EDPACS, Vol. 50, Iss. 2, 2014-08 ,pp. :


SourceOECD Science & Information Technology, Vol. 2012, Iss. 6, 2012-10 ,pp. :


Privacy and Security Part III: Worlds in Collision
EDPACS, Vol. 50, Iss. 3, 2014-09 ,pp. :


Web Security and Privacy: An American Perspective
By Camp L. Jean
The Information Society, Vol. 15, Iss. 4, 1999-10 ,pp. :