Communication Security in UK Law

  • Library Security: Better Communication, Safer Facilities
    • Nbr. 34-3, June 2016
    • The Electronic Library
    • 550-551
  • Security through numbers? Experimentally assessing the impact of numerical arguments in security communication
    • Nbr. 20-2, May 2018
    • British Journal of Politics and International Relations
    Numerical arguments are increasingly present in security communication and are widely assumed to possess a distinct capacity to make an argument convincing, thereby contributing to the dynamics of ...
  • Social-media-based risk communication for data co-security on the cloud
    • Nbr. 120-3, January 2020
    • Industrial Management & Data Systems
    • 442-463
    Purpose: Cloud computing has disrupted the information technology (IT) industry. Associated benefits such as flexibility, payment on an on-demand basis and the lack of no need for IT staff are amon...
  • Whistleblowing, National Security and the Constitutional Freedom of Political Communication
    • Nbr. 46-3, September 2018
    • Federal Law Review
    Whistleblowers promote the values of responsible government and the rule of law by drawing attention to criminal or other forms of wrongdoing in publicly accountable organisations. This article exp...
  • Evaluating the impact of information security on enhancing the business decision‐making process
    • Nbr. 9-1, March 2013
    • World Journal of Entrepreneurship, Management and Sustainable Development
    • 55-64
    Purpose: In today's digital economy, information secrecy is one of the essential apprehensions for businesses. Because of the uncertainty and multiple interpretations, most of the reviewed literatu...
    ...... effects of the proposed five independent variables:information security rules and regulations, secured internal and external business communication,security consciousness management support, business security culture, and superior deterrent effortson efficient information security, the ......
  • Top ten issues for a consortium migrating to a client/server system
    • Nbr. 18-2, June 2000
    • Library Hi Tech
    • 166-171
    This article presents ten issues in migrating a multi‐type library consortium to a shared client/server library system. The issues have been selected as especially pertinent to a consortium and des...
    ...... staffing; (6) commu-nication; (7) system maintenance; (8) security issues; (9)telecommunications network; and (10) commitment ofmember ... interface design;(4) training;(5) consortium staffing;(6) communication;(7) system maintenance;(8) security issues;(9) telecommunications network; ......
  • IBS '83
    • Nbr. 83-9/10, September 1983
    • Industrial Management & Data Systems
    • 3-4
    Britain's largest and most comprehensive exhibition of office equipment and services, the International Business Show, throws wide its doors at the National Exhibition Centre in Birmingham on Octob...
    ...... furniture to audio visual aids, microfilm, computers, inter-communication and security systems. Everything, in fact, that the modern business could ......
  • DO YOU COMMUNICATE?
    • Nbr. 14-2, February 1993
    • Library Management
    • 19-23
    Libraries play a vital part in the communication network but there are a number of problems associated with library use, including location, cataloguing systems, absence of guiding, security system...
    ......All libraries play a vital part in the communication network, which is now inherent in any developed society, and aim to ...Library security can also deter potential users. From a practical point of view, security ......
  • Social security coordination in Association Agreements
    • Nbr. 20-2, June 2018
    • European Journal of Social Security
    In March 2012, the European Commission adopted a Communication on the external dimension of EU social security coordination. On the one hand, the Commission explained that social security coordinat...
    ...... in sight? Katharina Eisele European Parliamentary Research Service, Brussels Abstract In March 2012, the European Commission adopted a Communication on the external dimension of EU social security coordination. On the one hand, the Commission explained that social security coordination between the ......
  • Internet‐based ICT adoption: evidence from Malaysian SMEs
    • Nbr. 109-2, March 2009
    • Industrial Management & Data Systems
    • 224-244
    Purpose: The purpose of this paper is to investigate the innovative characteristics, benefits, and barriers influencing internet‐based information and communications technology (ICT) adoption among...
    ......communications technology (ICT) adoptionamong the small and medium enterprises ...However, security continues to be a major barrier. Finding on costas a barrier is mixed. The ......
  • See all results

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT