UNI-MB - logo
UMNIK - logo
 

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UM. For full access, REGISTER.

2 3 4 5 6
hits: 3,189,700
31.
  • Algorithms of Oppression Algorithms of Oppression
    Noble, Safiya Umoja 02/2018
    eBook

    As seen in "a NULL" Wired and "a NULL" Time A revealing look at how negative biases against women of color are embedded in search engine results and algorithms Run a Google search for "black ...
Full text
32.
Full text
33.
  • Virtual Knowledge Virtual Knowledge
    Wouters, Paul; Beaulieu, Anne; Scharnhorst, Andrea ... 2012, 20121019, 2019-06-20, 20130101
    eBook

    Today we are witnessing dramatic changes in the way scientific and scholarly knowledge is created, codified, and communicated. This transformation is connected to the use of digital technologies and ...
Full text
34.
  • Indexing and Retrieval of N... Indexing and Retrieval of Non-Text Information
    Neal, Diane Rasmussen 2012, 2012-10-30
    eBook
    Open access

    The scope of this volume will encompass a collection of research papers related to indexing and retrieval of online non-text information. In recent years, the Internet has seen an exponential ...
Full text
35.
Full text

PDF
36.
Full text
37.
  • Privacy in the Digital Age:... Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems
    Bélanger, France; Crossler, Robert E. MIS quarterly, 12/2011, Volume: 35, Issue: 4
    Journal Article
    Peer reviewed
    Open access

    Information privacy refers to the desire of individuals to control or have some influence over data about themselves. Advances in information technology have raised concerns about information privacy ...
Full text

PDF
38.
  • Cybersecurity Leadership De... Cybersecurity Leadership Demystified
    Ozkaya, Erdal; Abdulhayoglu, Melih 2022
    eBook

    This book is a quick-paced guide that focuses on the core concepts and knowledge, in just enough words, to help aspiring as well as existing CISOs learn about vital tasks in an easy way. This book ...
Full text
39.
  • State of the Information Pr... State of the Information Privacy Literature: Where are We Now And Where Should We Go?
    Pavlou, Paul A. MIS quarterly, 2011, Volume: 35, Issue: 4
    Journal Article
    Peer reviewed

    While information privacy has been studied in multiple disciplines over the years, the advent of the information age has both elevated the importance of privacy in theory and practice, and increased ...
Full text
40.
  • How to perform and report a... How to perform and report an impactful analysis using partial least squares: Guidelines for confirmatory and explanatory IS research
    Benitez, Jose; Henseler, Jörg; Castillo, Ana ... Information & management, March 2020, 2020-03-00, 2020-03, Volume: 57, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    •PLS-PM has been subject to many improvements in last years.•Prior PLS guidelines have not covered the entire recent developments.•We explain how to perform and report an up-to-date empirical ...
Full text

PDF
2 3 4 5 6
hits: 3,189,700

Load filters