Communication Security in UK Law
-
Security through numbers? Experimentally assessing the impact of numerical arguments in security communication
Numerical arguments are increasingly present in security communication and are widely assumed to possess a distinct capacity to make an argument convincing, thereby contributing to the dynamics of ...
- Library Security: Better Communication, Safer Facilities
-
Whistleblowing, National Security and the Constitutional Freedom of Political Communication
Whistleblowers promote the values of responsible government and the rule of law by drawing attention to criminal or other forms of wrongdoing in publicly accountable organisations. This article exp...
-
Social-media-based risk communication for data co-security on the cloud
Purpose: Cloud computing has disrupted the information technology (IT) industry. Associated benefits such as flexibility, payment on an on-demand basis and the lack of no need for IT staff are amon...
-
Evaluating the impact of information security on enhancing the business decision‐making process
Purpose: In today's digital economy, information secrecy is one of the essential apprehensions for businesses. Because of the uncertainty and multiple interpretations, most of the reviewed literatu......... effects of the proposed five independent variables:information security rules and regulations, secured internal and external business communication,security consciousness management support, business security culture, and superior deterrent effortson efficient information security, the ......
-
IBS '83
Britain's largest and most comprehensive exhibition of office equipment and services, the International Business Show, throws wide its doors at the National Exhibition Centre in Birmingham on Octob......... furniture to audio visual aids, microfilm, computers, inter-communication and security systems. Everything, in fact, that the modern business could ......
-
Top ten issues for a consortium migrating to a client/server system
This article presents ten issues in migrating a multi‐type library consortium to a shared client/server library system. The issues have been selected as especially pertinent to a consortium and des......... staffing; (6) commu-nication; (7) system maintenance; (8) security issues; (9)telecommunications network; and (10) commitment ofmember ... interface design;(4) training;(5) consortium staffing;(6) communication;(7) system maintenance;(8) security issues;(9) telecommunications network; ......
-
DO YOU COMMUNICATE?
Libraries play a vital part in the communication network but there are a number of problems associated with library use, including location, cataloguing systems, absence of guiding, security system.........All libraries play a vital part in the communication network, which is now inherent in any developed society, and aim to ...Library security can also deter potential users. From a practical point of view, security ......
-
Member States’ social security agreements with India
In a 2012 Communication, the European Commission described the current approach to social security coordination with third countries as ‘patchy’. The European Commission proposed to address that pa.........of a common EU approach . Pauline Melin Maastricht University, Maastricht, the Netherlands . Abstract In a 2012 Communication, the European Commission described the current approach to social ......
-
Social security coordination in Association Agreements
In March 2012, the European Commission adopted a Communication on the external dimension of EU social security coordination. On the one hand, the Commission explained that social security coordinat......... in sight? Katharina Eisele European Parliamentary Research Service, Brussels Abstract In March 2012, the European Commission adopted a Communication on the external dimension of EU social security coordination. On the one hand, the Commission explained that social security coordination between the ......
See all results