Search Results for Data protection. - Narrowed by: Information technology. SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dData$002bprotection.$0026qf$003dSUBJECT$002509Subject$002509Information$002btechnology.$002509Information$002btechnology.$0026ps$003d300?dt=list 2026-05-08T17:09:56Z The IT/digital legal companion : a comprehensive business guide to software, Internet, and IP law : includes contracts and web forms ent://SD_ILS/0/SD_ILS:1189703 2026-05-08T17:09:56Z 2026-05-08T17:09:56Z by&#160;Landy, Gene K.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492560">https://www.sciencedirect.com/science/book/9781597492560</a><br/>Format:&#160;Electronic Resources<br/> Small-Medium Business Information Security Intention Related to Cyberthreat Awareness: A Quantitative Experiment ent://SD_ILS/0/SD_ILS:681276 2026-05-08T17:09:56Z 2026-05-08T17:09:56Z by&#160;Cleveland, Jeffrey, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10815727">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10815727</a><br/>Format:&#160;Books<br/> An Exploratory Qualitative Study: How Middle Managers Influence Information Security Policy Compliance Behaviors in the U.S. Financial Industry ent://SD_ILS/0/SD_ILS:682522 2026-05-08T17:09:56Z 2026-05-08T17:09:56Z by&#160;Emanuelson, Wendy A., author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10826203">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10826203</a><br/>Format:&#160;Books<br/> Legal Ontologies for Protecting Genetic Privacy and Their Enforcement Mechanisms ent://SD_ILS/0/SD_ILS:692047 2026-05-08T17:09:56Z 2026-05-08T17:09:56Z by&#160;Reep, Michael S., author. (orcid)0000-0003-0626-5213<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10811792">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10811792</a><br/>Format:&#160;Books<br/> Information technology serving society ent://SD_ILS/0/SD_ILS:1177259 2026-05-08T17:09:56Z 2026-05-08T17:09:56Z by&#160;Chartrand, Robert Lee, 1928-2010.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780080219790">https://www.sciencedirect.com/science/book/9780080219790</a><br/>Format:&#160;Electronic Resources<br/>