LEADER 03178nam 2200625Ia 450 001 9910784763603321 005 20200520144314.0 010 $a1-281-14395-2 010 $a9786611143954 010 $a1-84663-675-2 035 $a(CKB)1000000000402667 035 $a(EBL)328767 035 $a(OCoLC)192043445 035 $a(SSID)ssj0000672387 035 $a(PQKBManifestationID)11365133 035 $a(PQKBTitleCode)TC0000672387 035 $a(PQKBWorkID)10636082 035 $a(PQKB)11133605 035 $a(MiAaPQ)EBC328767 035 $a(Au-PeEL)EBL328767 035 $a(CaPaEBR)ebr10211647 035 $a(EXLCZ)991000000000402667 100 $a19830128d2007 uy 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr 200 04$aThe electronic library$hVolume 25, Number 5$iWorld Wide Web applications in South Africa$b[electronic resource] 210 $a[Bradford, England] $cEmerald$d2007 215 $a1 online resource (148 pages) 225 1 $aThe electronic library,$x0264-0473 ;$vv. 25, no. 5 300 $aDescription based upon print version of record. 311 $a1-84663-674-4 320 $aIncludes bibliographical references. 327 $aCover; CONTENTS; EDITORIAL ADVISORY BOARD; World Wide Web research investigated at annual conference in South Africa (www.zaw3.co.za); RAT online: martial arts learning resources; A framework of anti-phishing measures aimed at protecting the online consumer's identity; Malware: the new legal risk; Web access for IT staff: a developing world perspective on web abuse; Using journal use study feedback to improve accessibility; A study on the model to link the Korean University Library OPAC with search portals; Elucidating user behavior of mobile learning 327 $aE-book reading groups: interacting with e-books in public libraries A study of the information literacy capabilities of the Kuwaiti police officers; Book reviews 330 $aThis ebook contains a group of papers selected from the 2006 ZA-WWW conference, which is endorsed as a Regional Conference by the IW3C2.The papers selected not only show the scope and breadth of research being undertaken on the World Wide Web, but perhaps more importantly they also demonstrate the that South African ideas and activities play no small role in the development and use of the Web. To this end, Butler discusses the growing phenomena of phishing and how we should be protecting ourselves; in the same vein Etsebeth discusses malware and cyber risk, while Seymour and Naasden look at the... 410 0$aElectronic library ;$vv. 25, no. 5. 606 $aLibraries$xAutomation 606 $aLibrary science$xData processing 606 $aMicrocomputers 606 $aMinicomputers 615 0$aLibraries$xAutomation. 615 0$aLibrary science$xData processing. 615 0$aMicrocomputers. 615 0$aMinicomputers. 676 $a025.020285 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910784763603321 996 $aElectronic library$91759060 997 $aUNINA