Journal of Information ManagementVol. 23 iss. 1
1. Construction and Efficiency Evaluation of a Secure Data Access Model in the Cloud Computing Environment
陳志誠;劉用貴;
頁: 1-32
日期: 2016/01
關鍵字: cloud computing;information security;active authentication;multi-level security;distributed data access;
Keywords: cloud computing;information security;active authentication;multi-level security;distributed data access;
摘要: Purpose-Due to the growing intelligent attacks, internet service providers are facing more and more risks. It has become a big concern, especially in the emerging cloud computing environment, whether the service providers have the capability to prop...
瀏覽次數: 28125 下載次數: 13792
引用 導入Endnote
頁: 1-32
日期: 2016/01
關鍵字: cloud computing;information security;active authentication;multi-level security;distributed data access;
Keywords: cloud computing;information security;active authentication;multi-level security;distributed data access;
摘要: Purpose-Due to the growing intelligent attacks, internet service providers are facing more and more risks. It has become a big concern, especially in the emerging cloud computing environment, whether the service providers have the capability to prop...
瀏覽次數: 28125 下載次數: 13792
引用 導入Endnote
楊亨利;孫曉雅;
頁: 33-61
日期: 2016/01
關鍵字: Self-disclosure;Social Network Sites;Facebook;Interpersonal Needs;Extraversion;Narcissism;
Keywords: Self-disclosure;Social Network Sites;Facebook;Interpersonal Needs;Extraversion;Narcissism;
摘要: Purpose-This study tried to understand the influence of self-presentation need, interpersonal need on self-disclosure of ordinary friends and intimate friends at the social network sites. Design/methodology/approach-Sample survey was applied to inv...
瀏覽次數: 23038 下載次數: 878
引用 導入Endnote
頁: 33-61
日期: 2016/01
關鍵字: Self-disclosure;Social Network Sites;Facebook;Interpersonal Needs;Extraversion;Narcissism;
Keywords: Self-disclosure;Social Network Sites;Facebook;Interpersonal Needs;Extraversion;Narcissism;
摘要: Purpose-This study tried to understand the influence of self-presentation need, interpersonal need on self-disclosure of ordinary friends and intimate friends at the social network sites. Design/methodology/approach-Sample survey was applied to inv...
瀏覽次數: 23038 下載次數: 878
引用 導入Endnote
陳岳陽;曾怡靜;
頁: 63-98
日期: 2016/01
關鍵字: Internet compulsive buying tendency;flow theory;fashion orientation;Internet buying;
Keywords: Internet compulsive buying tendency;flow theory;fashion orientation;Internet buying;
摘要: Purpose-Drawing on flow theory, fashion orientation, and motivation factors, this study tried to examine the relationships among related factors with Internet compulsive buying tendency. Design/methodology/approach-The subjects of this study were c...
瀏覽次數: 28596 下載次數: 2381
引用 導入Endnote
頁: 63-98
日期: 2016/01
關鍵字: Internet compulsive buying tendency;flow theory;fashion orientation;Internet buying;
Keywords: Internet compulsive buying tendency;flow theory;fashion orientation;Internet buying;
摘要: Purpose-Drawing on flow theory, fashion orientation, and motivation factors, this study tried to examine the relationships among related factors with Internet compulsive buying tendency. Design/methodology/approach-The subjects of this study were c...
瀏覽次數: 28596 下載次數: 2381
引用 導入Endnote
4. The Study on Exploring the Topics of Cyber Warfare Security and Management: Using Growing Hierarchical Self-Organizing Map
陳良駒;范俊平;謝佳容;
頁: 99-128
日期: 2016/01
關鍵字: cyber warfare;text mining;growing hierarchical self-organizing map;
Keywords: cyber warfare;text mining;growing hierarchical self-organizing map;
摘要: Purpose-In resistance to the enormous threats from the "Cyber Force" over the Internet, this research aims to examine both attacking and defending techniques, as well as the supporting plans from the People's Republic of China (ROC). This study em...
瀏覽次數: 28370 下載次數: 448
引用 導入Endnote
頁: 99-128
日期: 2016/01
關鍵字: cyber warfare;text mining;growing hierarchical self-organizing map;
Keywords: cyber warfare;text mining;growing hierarchical self-organizing map;
摘要: Purpose-In resistance to the enormous threats from the "Cyber Force" over the Internet, this research aims to examine both attacking and defending techniques, as well as the supporting plans from the People's Republic of China (ROC). This study em...
瀏覽次數: 28370 下載次數: 448
引用 導入Endnote