Academic literature on the topic 'Security issues behind E-mail'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security issues behind E-mail.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Security issues behind E-mail"
G, Gopu, and Thangadurai K. "A Study on Security Issues in E-Mail Communication." Shanlax International Journal of Commerce 7, S3 (2019): 90–94. https://doi.org/10.5281/zenodo.2572436.
Full textCR, Rachana. "Data Security in Cloud Computing: A Research Perspective." International Journal of Research and Review 9, no. 11 (2022): 325–30. http://dx.doi.org/10.52403/ijrr.20221144.
Full textVerma, Aanchal N. "Collaborative Security in Wireless Networks and Vulnerabilities Assessment for Fintech E-payment Companies: A Bibliometric Analysis." ADHYAYAN: A JOURNAL OF MANAGEMENT SCIENCES 13, no. 02 (2024): 42–51. http://dx.doi.org/10.21567/adhyayan.v13i2.07.
Full textYogar, Bagaskoro Nur Abu, and Muhammad Akbar Nugraha Sabarna. "Bibliometric Analysis of Research Trends in Data Security and Privacy for E-Government Implementation in Indonesia." Agile Governance and Innovation Measurement Journal 2, no. 1 (2025): 15–25. https://doi.org/10.18196/agimjournal.v2i1.20.
Full textAnwer, Mardin A., Ingo Stengel, and Rina Dinkha Zarro. "User-centered Security for Protecting Patient Privacy for E-health Cloud Computing." Journal of University of Human Development 2, no. 3 (2016): 509. http://dx.doi.org/10.21928/juhd.v2n3y2016.pp509-514.
Full textD. Sandhya rani, Dr.T. Vara Lakshmi, and K. Triveni. "Mobile E-Commerce Evolution an Overview of Online Shopping Trends." International Research Journal on Advanced Engineering and Management (IRJAEM) 2, no. 05 (2024): 1592–95. http://dx.doi.org/10.47392/irjaem.2024.0218.
Full textSolovyanenko, Nina Ivanovna. "Issues of Legal Regulation of the Use of Digital Technologies in Agricultural Business." Сельское хозяйство, no. 3 (March 2020): 46–53. http://dx.doi.org/10.7256/2453-8809.2020.3.35336.
Full textGupta, Sandeep, Attaullah Buriro, and Bruno Crispo. "Demystifying Authentication Concepts in Smartphones: Ways and Types to Secure Access." Mobile Information Systems 2018 (2018): 1–16. http://dx.doi.org/10.1155/2018/2649598.
Full textAsriny, Novendri Isra, Chandra Kusuma Dewa, and Ahmat Luthfi. "Modeling OTP Delivery Notification Status through a Causality Bayesian Network." IJCCS (Indonesian Journal of Computing and Cybernetics Systems) 18, no. 1 (2024): 61. http://dx.doi.org/10.22146/ijccs.90030.
Full textReginald, Reginald. "Performance of Procurement System in Ministries and Institutions through Integration of LKPP e-catalogue and LPSE Electronic Procurement System." Eduvest - Journal of Universal Studies 5, no. 1 (2025): 639–54. https://doi.org/10.59188/eduvest.v5i1.50027.
Full textBooks on the topic "Security issues behind E-mail"
Randolph, Kahn, ed. E-mail rules: A business guide to managing policies, security, and legal issues for E-mail and digital communication. AMACOM, 2003.
Find full textR, Neu C. E-mail communication between government and citizens: Security, policy issues, and next steps. Rand, 1998.
Find full textR, Neu C. E-mail communication between government and citizens: Security, policy issues, and next steps. Rand, 1998.
Find full textE-Mail Rules: A Business Guide to Managing Policies, Security, and Legal Issues for E-Mail and Digital Communication. AMACOM/American Management Association, 2003.
Find full textNeu, C., Robert Anderson, and Tora Bikson. E-mail Communication Between Government and Citizens: Security, Policy Issues and Next Steps. RAND Corporation, 1998. http://dx.doi.org/10.7249/ip178.
Full textFlynn, Nancy, Kahn Esq., Randolph. E-Mail Rules Clearswift Custom Edition: A Business Guide to Managing Policies, Security, and Legal Issues for E-Mail and Digital Communication. AMACOM, 2003.
Find full textOrtiz, Juan Carlos. Private Armed Forces and Global Security. ABC-CLIO, LLC, 2010. http://dx.doi.org/10.5040/9798216001409.
Full textDas, Abhijit. Strategies in GATT and WTO Negotiations. Oxford University PressOxford, 2025. https://doi.org/10.1093/9780198934431.001.0001.
Full textBook chapters on the topic "Security issues behind E-mail"
Mileva, Aleksandra, Vesna Dimitrova, Orhun Kara, and Miodrag J. Mihaljević. "Catalog and Illustrative Examples of Lightweight Cryptographic Primitives." In Security of Ubiquitous Computing Systems. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-10591-4_2.
Full textScaffardi, Lucia, and Giulia Formici. "Introduction: Feeding the Future Sustainably—What Role for Novel Foods and Edible Insects?" In Novel Foods and Edible Insects in the European Union. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-13494-4_1.
Full textYee, George, Yuefei Xu, Larry Korba, and Khalil El-Khatib. "Privacy and Security in E-Learning." In Information Security and Ethics. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-937-3.ch012.
Full textEl-Khatib, Khalil, Larry Korba, Yuefei Xu, and George Yee. "Privacy and Security in E-Learning." In Information Security and Ethics. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-937-3.ch023.
Full textYee, George, Yuefei Xu, Larry Korba, and Khalil El-Khatib. "Privacy and Security in E-Learning." In Advances in Distance Education Technologies. IGI Global, 2007. http://dx.doi.org/10.4018/978-1-59904-376-0.ch003.
Full textMusembe, Carolyne Nyaboke, and Stephen M. Mutula. "Cyberspace Security Threats and Attacks on E-Records Management at Moi University, Eldoret, Kenya." In Advances in Library and Information Science. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-6618-3.ch020.
Full text"Chapter 8. Protecting Your E-Mail and Phone Calls." In Understanding Security Issues. De Gruyter, 2018. http://dx.doi.org/10.1515/9781501506505-008.
Full textMasri Hela, Guitouni Adel, and Krichen Saoussen. "Towards Efficient Information Exchange in Heterogeneous Networks." In NATO Science for Peace and Security Series - E: Human and Societal Dynamics. IOS Press, 2013. https://doi.org/10.3233/978-1-61499-201-1-236.
Full textChen, Lei, Wen-Chen Hu, Ming Yang, and Lei Zhang. "Security and Privacy Issues in Secure E-Mail Standards and Services." In Security and Privacy Assurance in Advancing Technologies. IGI Global, 2011. http://dx.doi.org/10.4018/978-1-60960-200-0.ch013.
Full textLiao, Lijun. "Securing E-Mail Communication with XML Technology." In Handbook of Research on Information Security and Assurance. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-59904-855-0.ch017.
Full textConference papers on the topic "Security issues behind E-mail"
Pyrshev, F., Yuriy Gromov, and Pavel Karasev. "EVALUATION OF THE EFFECTIVENESS OF DIFFERENT METHODS FOR COMBATING SPAM IN COMPUTER NETWORKS." In CHALLENGING ISSUES IN SYSTEMS MODELING AND PROCESSES. FSBE Institution of Higher Education Voronezh State University of Forestry and Technologies named after G.F. Morozov, 2025. https://doi.org/10.58168/cismp2024_226-229.
Full textBadve, Bhargavi, Khushi Gandhi, and Ganesh Jadhav. "Enhancing Organizational Efficiency and Security in Supermarkets: A Case Study of DMart ." In 15th International Conference on Applied Human Factors and Ergonomics (AHFE 2024). AHFE International, 2024. http://dx.doi.org/10.54941/ahfe1004930.
Full textTeodoro Dantas Sartori, Jeanfrank. "From machine knowledge and knowledge management to a unified human-machine theory: proposal for conceptual model." In Intelligent Human Systems Integration (IHSI 2023) Integrating People and Intelligent Systems. AHFE International, 2023. http://dx.doi.org/10.54941/ahfe1002857.
Full textHaroutunian, Mariam, Arsen Margaryan, and Karen Mastoyan. "Secure Online Voting Scheme Using Steganography." In International Conference on Computer Science and Information Technologies. The University of Georgia, 2024. https://doi.org/10.62343/csit.2024.12.
Full textTurino, Maria Antonietta, Pasquale Manco, Piera Maresca, and Roberto Macchiaroli. "Maintenance Data Management: The Potential Effect of Blockchain Technology." In 10th Manufacturing Engineering Society International Conference. Trans Tech Publications Ltd, 2023. http://dx.doi.org/10.4028/p-mykd1j.
Full textKomanovics, Adrienne. "WORKPLACE PRIVACY IN THE EU : THE IMPACT OF EMERGING TECHNOLOGIES ON EMPLOYEE’S FUNDAMENTAL RIGHTS." In International Scientific Conference “Digitalization and Green Transformation of the EU“. Faculty of Law, Josip Juraj Strossmayer University of Osijek, 2023. http://dx.doi.org/10.25234/eclic/27458.
Full textReports on the topic "Security issues behind E-mail"
Gruodis, Alytis, Violeta Jadzgevičienė, Aleksandr Igumenov, Joana Lapkovskaja, and Jonas Žaptorius. INO-PAY Information System Using E-Pay and E-Banking Realizations. Case Study. Vilnius Business College, 2024. https://doi.org/10.57005/ab.2024.2.7.
Full text