SEARCH Articles Figures Tables 1 Differences in Security Handling in Ir brmation Techrwlogy [Publishers Imprint]