-
1
-
-
0001814382
-
Electronic commerce: Building blocks of new business opportunity
-
Applegate, L.M., Holsapple, C.W., Kalakota, R., Radermacher, F.J. and Whinston, A.B. (1996), "Electronic commerce: building blocks of new business opportunity", Journal of Organizational Computing and Electronic Commerce, Vol. 6 No. 1, pp. 1-10.
-
(1996)
Journal of Organizational Computing and Electronic Commerce
, vol.6
, Issue.1
, pp. 1-10
-
-
Applegate, L.M.1
Holsapple, C.W.2
Kalakota, R.3
Radermacher, F.J.4
Whinston, A.B.5
-
2
-
-
0010160404
-
Securing electronic commerce with digital signatures
-
July
-
Bequai, A. (1996), "Securing electronic commerce with digital signatures", Computer Audit Update, July, pp. 28-32.
-
(1996)
Computer Audit Update
, pp. 28-32
-
-
Bequai, A.1
-
3
-
-
0004150519
-
-
John Wiley, New York, NY
-
Bernstein, T. et al. (1996), Internet Security for Business, John Wiley, New York, NY, p. 23.
-
(1996)
Internet Security for Business
, pp. 23
-
-
Bernstein, T.1
-
4
-
-
0030169256
-
Securing the commercial Internet
-
June
-
Bhimani, A. (1996), "Securing the commercial Internet", Communications of the ACM, Vol. 39 No. 6, June, pp. 29-35.
-
(1996)
Communications of the ACM
, vol.39
, Issue.6
, pp. 29-35
-
-
Bhimani, A.1
-
5
-
-
0010100324
-
Information security in electronic commerce
-
Brisbane, Queensland, Australia, 1-5 April
-
Caelli, W.J. (1997), "Information security in electronic commerce", PACIS'97 - The Pacific Asia Conference on Information Systems, Brisbane, Queensland, Australia, 1-5 April, pp. 1-5.
-
(1997)
PACIS'97 - The Pacific Asia Conference on Information Systems
, pp. 1-5
-
-
Caelli, W.J.1
-
7
-
-
0002034110
-
The organizational trust inventory (OTI): Development and validation
-
Kramer, R.M. and Tyler, T.R. (Eds), Sage, Thousand Oaks, CA
-
Cummings, L.L. and Bromiley, P. (1996), "The organizational trust inventory (OTI): development and validation", in Kramer, R.M. and Tyler, T.R. (Eds), Trust in Organizations: Frontiers of Theory and Research, Sage, Thousand Oaks, CA, pp. 302-20.
-
(1996)
Trust in Organizations: Frontiers of Theory and Research
, pp. 302-320
-
-
Cummings, L.L.1
Bromiley, P.2
-
8
-
-
34248982889
-
The effect of motivational orientation upon trust and suspicion
-
Deutch, M. (1960), "The effect of motivational orientation upon trust and suspicion". Human Relations, pp. 123-39.
-
(1960)
Human Relations
, pp. 123-139
-
-
Deutch, M.1
-
9
-
-
0017018484
-
New directions in cryptography
-
June
-
Diffie, D. and Hellman, M. (1976). "New directions in cryptography", IEEE Transactions on Information Theory, Vol. 22 No. 6, June, pp. 644-54.
-
(1976)
IEEE Transactions on Information Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, D.1
Hellman, M.2
-
10
-
-
0003845170
-
-
Prentice Hall PTR, Upper Saddle River, NJ
-
Ford, W. and Baum, M.S. (1997), Secure Electronic Commerce, Prentice Hall PTR, Upper Saddle River, NJ, p. 1.
-
(1997)
Secure Electronic Commerce
, pp. 1
-
-
Ford, W.1
Baum, M.S.2
-
11
-
-
0005475013
-
Does familiarity breed trust? The implications of repeated ties for contractual choice in alliances
-
Gulati, R. (1995), "Does familiarity breed trust? The implications of repeated ties for contractual choice in alliances", Academy of Management Journal, Vol. 38 No. 1, pp. 85-112.
-
(1995)
Academy of Management Journal
, vol.38
, Issue.1
, pp. 85-112
-
-
Gulati, R.1
-
12
-
-
0002812554
-
Trust and the virtual organization
-
May-June
-
Handy, C. (1995), "Trust and the virtual organization", Harvard Business Review, Vol. 73 No. 3, May-June, pp. 40-50.
-
(1995)
Harvard Business Review
, vol.73
, Issue.3
, pp. 40-50
-
-
Handy, C.1
-
13
-
-
0031477959
-
Power and trust: Critical factors in the adoption and use of electronic data interchange
-
January-February
-
Hart, P. and Saunders, C. (1997), "Power and trust: critical factors in the adoption and use of electronic data interchange", Organization Science, Vol. 8 No. 1, January-February, pp. 23-41.
-
(1997)
Organization Science
, vol.8
, Issue.1
, pp. 23-41
-
-
Hart, P.1
Saunders, C.2
-
14
-
-
84991469658
-
-
Internet Mail Consortium, 127 Segre Place, Santa Cruz, CA 95060, (408) 426-9827,_HYPERLINK mailto:phoffman@imc.org_phoffman@imc.org_, SPYRUS, PO Box 1198, Herndon, VA 20172, (703) 435-7344,_HYPERLINK mailto:housley@spyrus.com_housley@spyrus.com_. CDMF
-
Huffman, P., Internet Mail Consortium, 127 Segre Place, Santa Cruz, CA 95060, (408) 426-9827,_HYPERLINK mailto:phoffman@imc.org_phoffman@imc.org_, and Russ Housley, SPYRUS, PO Box 1198, Herndon, VA 20172, (703) 435-7344,_HYPERLINK mailto:housley@spyrus.com_housley@spyrus.com_. CDMF Security, http://www.globecom.net/ietf/draft/drafthoffman-des40-00.shtml
-
-
-
Huffman, P.1
Housley, R.2
-
15
-
-
0010111475
-
Do you read me? The development and maintenance of trust in global virtual teams
-
Communication Processes for Virtual Organizations
-
Jarvenpaa, S.L. and Leidner, D. (1997). "Do you read me? The development and maintenance of trust in global virtual teams", Organization Science, Communication Processes for Virtual Organizations.
-
(1997)
Organization Science
-
-
Jarvenpaa, S.L.1
Leidner, D.2
-
16
-
-
0010187927
-
Tales of the crypto
-
January 12
-
Kerstetter, J. (1998), "Tales of the crypto", PC Week, Vol. 15 No. 2, January 12, p. 1.
-
(1998)
PC Week
, vol.15
, Issue.2
, pp. 1
-
-
Kerstetter, J.1
-
17
-
-
0003025757
-
Trust and technology
-
Sage, Thousand Oaks, CA
-
Kipnis, D. (1996), "Trust and technology", Trust in Organizations: Frontiers of Theory and Research, Sage, Thousand Oaks, CA, pp. 39-50.
-
(1996)
Trust in Organizations: Frontiers of Theory and Research
, pp. 39-50
-
-
Kipnis, D.1
-
18
-
-
0001996935
-
Whither trust?
-
Kramer, R.M. and Tyler, T.R. (Eds), Sage, Thousand Oaks, CA
-
Kramer, R.M. and Tyler, T.R. (1996), "Whither trust?", in Kramer, R.M. and Tyler, T.R. (Eds), Trust in Organizations: Frontiers of Theory and Research, Sage, Thousand Oaks, CA.
-
(1996)
Trust in Organizations: Frontiers of Theory and Research
-
-
Kramer, R.M.1
Tyler, T.R.2
-
19
-
-
0001997475
-
Developing and maintaining trust in work relationships
-
Kramer, R.M. and Tyler, T.R. (Eds), Sage, Thousand Oaks, CA
-
Lewicki, R.J. and Bunker, B.B. (1996), "Developing and maintaining trust in work relationships", in Kramer, R.M. and Tyler, T.R. (Eds), Trust in Organizations: Frontiers of Theory and Research, Sage, Thousand Oaks, CA, pp. 114-39.
-
(1996)
Trust in Organizations: Frontiers of Theory and Research
, pp. 114-139
-
-
Lewicki, R.J.1
Bunker, B.B.2
-
20
-
-
0042495505
-
An integrative model of organizational trust
-
Mayer, R.C., Davis, J.H. and Schoorman, F.D. (1995), "An integrative model of organizational trust", Academy of Management Review, Vol. 20 No. 3, pp. 709-34.
-
(1995)
Academy of Management Review
, vol.20
, Issue.3
, pp. 709-734
-
-
Mayer, R.C.1
Davis, J.H.2
Schoorman, F.D.3
-
21
-
-
0010216076
-
Introduction to computer security
-
Menkus, B. (1992), "Introduction to computer security", Computers and Security, Vol. 11, pp. 121-7.
-
(1992)
Computers and Security
, vol.11
, pp. 121-127
-
-
Menkus, B.1
-
22
-
-
0000708127
-
Organizational responses to crisis - The centrality of trust
-
Sage, Thousand Oaks, CA
-
Mishra, A.K. (1996), "Organizational responses to crisis - the centrality of trust", Trust in Organizations: Frontiers of Theory and Research, Sage, Thousand Oaks, CA, pp. 261-87.
-
(1996)
Trust in Organizations: Frontiers of Theory and Research
, pp. 261-287
-
-
Mishra, A.K.1
-
23
-
-
84968140401
-
Causes of failure in network organizations
-
Summer
-
Miles, R.E and Snow, C.C. (1992), "Causes of failure in network organizations", California Management Review, Summer, pp. 53-72.
-
(1992)
California Management Review
, pp. 53-72
-
-
Miles, R.E.1
Snow, C.C.2
-
24
-
-
0010202848
-
Firewalls
-
February 15
-
Morrissey, P. (1996), "Firewalls", Network Computing, Vol. 7 No. 2, February 15, p. 54.
-
(1996)
Network Computing
, vol.7
, Issue.2
, pp. 54
-
-
Morrissey, P.1
-
25
-
-
0029402715
-
The Internet and EDI
-
November
-
Muiznieks, V. (1995), "The Internet and EDI", Telecommunications, November, pp. 45-8.
-
(1995)
Telecommunications
, pp. 45-48
-
-
Muiznieks, V.1
-
26
-
-
0002379111
-
Face-to-face: Making network organizations work
-
Nohria, N. and Eccles, R.G. (Eds), Harvard Business School Press, Boston, MA
-
Nohria, N. and Eccles, R.G. (1992), "Face-to-face: making network organizations work", in Nohria, N. and Eccles, R.G. (Eds), Networks and Organizations, Harvard Business School Press, Boston, MA, pp. 288-308.
-
(1992)
Networks and Organizations
, pp. 288-308
-
-
Nohria, N.1
Eccles, R.G.2
-
27
-
-
0010216077
-
Evolving internet security methods
-
Pompili, T. (1996) "Evolving internet security methods", PC Magazine,_Hyperlink http://www.zdnet.com/pcmag/ issues/1508/pcmg0076.htm_http://www.zdnet.com/ pcmag/issues/1508/pcmg0076.htm_, April 23 1998.
-
(1996)
PC Magazine
-
-
Pompili, T.1
-
28
-
-
84991479447
-
-
April 23
-
Pompili, T. (1996) "Evolving internet security methods", PC Magazine,_Hyperlink http://www.zdnet.com/pcmag/ issues/1508/pcmg0076.htm_http://www.zdnet.com/pcmag/issues/1508/pcmg0076.htm_, April 23 1998.
-
(1998)
-
-
-
30
-
-
21144469888
-
Business on a handshake
-
October
-
Shapiro, D., Sheppard, B.H. and Cheraskin, L. (1992), "Business on a handshake", The Negotiation Journal, October, pp. 365-78.
-
(1992)
The Negotiation Journal
, pp. 365-378
-
-
Shapiro, D.1
Sheppard, B.H.2
Cheraskin, L.3
-
31
-
-
0010164278
-
Trust needed for on-line commerce
-
Australia, September 27
-
Singh, S. (1997), "Trust needed for on-line commerce", The Age, Australia, September 27, p. 10.
-
(1997)
The Age
, pp. 10
-
-
Singh, S.1
-
32
-
-
0010143532
-
Bodily power
-
February
-
Tunbridge, N. (1998), "Bodily power", Technology Business, February, pp. 36-9.
-
(1998)
Technology Business
, pp. 36-39
-
-
Tunbridge, N.1
-
33
-
-
0001036894
-
Relational aspects of computer-mediated communication: Experimental observations over time
-
March-April
-
Walther, J.B. (1995), "Relational aspects of computer-mediated communication: experimental observations over time", Organization Science, Vol. 6 No. 2, March-April, pp. 186-203.
-
(1995)
Organization Science
, vol.6
, Issue.2
, pp. 186-203
-
-
Walther, J.B.1
|