{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:01:22Z","timestamp":1754157682358,"version":"3.41.2"},"reference-count":8,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[1999,12,1]],"date-time":"1999-12-01T00:00:00Z","timestamp":944006400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999,12,1]]},"abstract":"<jats:p>More and more people are logging on to the Internet. The increased use of the Internet and the World Wide Web for everyday activities is bringing new threats to personal privacy. Your activities, whether they are passive or active, in Cyberspace can give others a great deal of information about you. This paper gives an overview of where the risks lie, and how to minimize the risk to you and your work.<\/jats:p>","DOI":"10.1108\/09685229910292907","type":"journal-article","created":{"date-parts":[[2002,7,27]],"date-time":"2002-07-27T02:08:10Z","timestamp":1027735690000},"page":"241-247","source":"Crossref","is-referenced-by-count":8,"title":["Privacy and security on the Internet: how to secure your personal information and company data"],"prefix":"10.1108","volume":"7","author":[{"given":"Mohsen","family":"Attaran","sequence":"first","affiliation":[]},{"given":"Ilja","family":"VanLaar","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022031720455048700_B1","unstructured":"Anthes, G. (1993), \u201cIRS uncover bogus access to tax records (Internal Revenue Service\u2019s Atlanta investigation)\u201d, Computerworld, Vol. 27 No. 32, 9 August, p. 15."},{"key":"key2022031720455048700_B2","unstructured":"Business Week (1998), \u201cBusiness Week\/Harris poll: online insecurity\u201d, Business Week, 16 March, p. 102."},{"key":"key2022031720455048700_B3","unstructured":"CommerceNet\/Nielsen Media (1997a), CommerceNet\/Nielsen Media demographic study, Spring, available at <http:\/\/www.commerce.net\/work\/pilot\/nielsen_96\/press_97.html>"},{"key":"key2022031720455048700_B4","unstructured":"CommerceNet\/Nielsen Media (1997b), CommerceNet\/Nielsen Media demographic and electronic commerce study, Fall, 11 December, available at <http:\/\/www.commerce.net\/news\/press\/121197.html>"},{"key":"key2022031720455048700_B5","unstructured":"Federal Trade Commission (1998), Privacy Online: A Report To Congress [Online], available at <http:\/\/www.ftc.gov\/opa\/1998\/9806\/ privacy2.htm>"},{"key":"key2022031720455048700_B6","doi-asserted-by":"crossref","unstructured":"Goldberg, I., Wagner, D. and Brewer, E. (1997), Privacy\u2010enhancing Technologies for the Internet [Online], available at <http:\/\/www.cs.berkeley.edu\/\u223cdaw\/privacy\u2010 compcon97\u2010www\/privacy\u2010html.html>","DOI":"10.21236\/ADA385546"},{"key":"key2022031720455048700_B7","unstructured":"Jupiter Communications (1998), \u201cOnline advertising report\u201d, 22 August 1997, available at <http:\/\/www.jup.com\/digest\/082297\/ advert.shtml>"},{"key":"key2022031720455048700_B8","unstructured":"(The) Nando Times (1996), \u201cStaff and wire reports\u201d, 20 November, New York."}],"container-title":["Information Management &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09685229910292907","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685229910292907\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685229910292907\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:09:53Z","timestamp":1753402193000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/7\/5\/241-247\/187366"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999,12,1]]},"references-count":8,"journal-issue":{"issue":"5","published-print":{"date-parts":[[1999,12,1]]}},"alternative-id":["10.1108\/09685229910292907"],"URL":"https:\/\/doi.org\/10.1108\/09685229910292907","relation":{},"ISSN":["0968-5227"],"issn-type":[{"type":"print","value":"0968-5227"}],"subject":[],"published":{"date-parts":[[1999,12,1]]}}}