메뉴 건너뛰기




Volumn 3, Issue 2, 2007, Pages 203-221

Strategic aspects of electronic document encryption

Author keywords

Diffusion of innovations theory; E commerce; Encryption; Network security; Security strategy; Services; Standards

Indexed keywords


EID: 34248596042     PISSN: 17408849     EISSN: 17408857     Source Type: Journal    
DOI: 10.1504/IJSS.2007.012929     Document Type: Article
Times cited : (5)

References (38)
  • 1
    • 34248568315 scopus 로고    scopus 로고
    • Available at
    • 'About IDC' (2002) 'IDC research', Available at: http:// www.idcresearch.com/en_US/st/aboutIDC.jhtml
    • (2002) IDC research
    • About IDC'1
  • 2
    • 34248505812 scopus 로고    scopus 로고
    • 'Annual report to congress on foreign economic collection and industrial espionage 2001: key findings' (2002) Office of the National Counterintelligence Executive (NCIX), Available at: http://www.ncix.gov/ docs/fecie_fy0l.pdf
    • 'Annual report to congress on foreign economic collection and industrial espionage 2001: key findings' (2002) Office of the National Counterintelligence Executive (NCIX), Available at: http://www.ncix.gov/ docs/fecie_fy0l.pdf
  • 3
    • 34248508131 scopus 로고    scopus 로고
    • Managing the global risk of economic espionage
    • Best, D.O. (2002) 'Managing the global risk of economic espionage', Security Management, Vol. 46, p.214.
    • (2002) Security Management , vol.46 , pp. 214
    • Best, D.O.1
  • 4
    • 10444224236 scopus 로고    scopus 로고
    • Watch out for wireless rogues
    • Brewin, B. (2002) 'Watch out for wireless rogues', Computerworld, Vol. 36, p.36.
    • (2002) Computerworld , vol.36 , pp. 36
    • Brewin, B.1
  • 5
    • 28144460630 scopus 로고    scopus 로고
    • Department of Computer Science, Australian National University, Available at
    • Clarke, R. (1999) 'A primer in diffusion of innovations theory', Department of Computer Science, Australian National University, Available at: http://www.anu.edu.au/people/Roger.Clarke/SOS/InnDiff.html
    • (1999) A primer in diffusion of innovations theory
    • Clarke, R.1
  • 6
    • 34248565774 scopus 로고    scopus 로고
    • 'Data summaries' (2002) Ecommerce Times, Available at: www.EcomerceTimes.com.
    • 'Data summaries' (2002) Ecommerce Times, Available at: www.EcomerceTimes.com.
  • 7
    • 34248511013 scopus 로고    scopus 로고
    • Securing content in an insecure world
    • Dukart, J.R. (2002) 'Securing content in an insecure world', E-Doc, Vol. 16, p.30.
    • (2002) E-Doc , vol.16 , pp. 30
    • Dukart, J.R.1
  • 8
    • 34248508130 scopus 로고    scopus 로고
    • Being tough, gentle with data security
    • Gartenberg, M. (2002) 'Being tough, gentle with data security', Computerworld, Vol. 36, p.23.
    • (2002) Computerworld , vol.36 , pp. 23
    • Gartenberg, M.1
  • 9
  • 10
    • 0034804713 scopus 로고    scopus 로고
    • Securing e-business applications using smart cards
    • Hamann, E-M., Henn, H., Schack, T. and Seliger, F. (2001) 'Securing e-business applications using smart cards', IBM Systems Journal, Vol. 40, pp.635-647.
    • (2001) IBM Systems Journal , vol.40 , pp. 635-647
    • Hamann, E.-M.1    Henn, H.2    Schack, T.3    Seliger, F.4
  • 11
    • 33644535312 scopus 로고    scopus 로고
    • A framework for analysing cost structures in Business Process Reengineering (BPR)
    • Herath, S.K. and Gupta, A. (2005) 'A framework for analysing cost structures in Business Process Reengineering (BPR)', Int. J. Services and Standards, Vol. 1, pp.494-511.
    • (2005) Int. J. Services and Standards , vol.1 , pp. 494-511
    • Herath, S.K.1    Gupta, A.2
  • 12
    • 34248557256 scopus 로고    scopus 로고
    • Cyber-risks create coverage gaps
    • Harris, D. (2002) 'Cyber-risks create coverage gaps', Best's Review, Vol. 103, p.72.
    • (2002) Best's Review , vol.103 , pp. 72
    • Harris, D.1
  • 13
    • 3142523715 scopus 로고    scopus 로고
    • Industry corner: Smart cards for an information-hungry world
    • Hester, E.D. and Joseph, W.B. (1998) 'Industry corner: smart cards for an information-hungry world', Business Economics, Vol. 33, pp.54-58.
    • (1998) Business Economics , vol.33 , pp. 54-58
    • Hester, E.D.1    Joseph, W.B.2
  • 15
    • 3142587299 scopus 로고    scopus 로고
    • Smart card success requires making new partnerships first: High costs are still associated with products
    • Meckbach, G. (1999) 'Smart card success requires making new partnerships first: high costs are still associated with products', Computer Dealer News, Vol. 15, p.12.
    • (1999) Computer Dealer News , vol.15 , pp. 12
    • Meckbach, G.1
  • 16
    • 34248514696 scopus 로고    scopus 로고
    • 'Protect your documents', (2001) 'Proof of service - electronic Certified Document Delivery'. Available at: http://www.pos-e.com/htmls/ secure.htm
    • 'Protect your documents', (2001) 'Proof of service - electronic Certified Document Delivery'. Available at: http://www.pos-e.com/htmls/ secure.htm
  • 17
    • 34248528851 scopus 로고    scopus 로고
    • WPA tightens wireless security
    • Peckham, R. (2003) 'WPA tightens wireless security', Communications News, Vol. 40, pp.6-8.
    • (2003) Communications News , vol.40 , pp. 6-8
    • Peckham, R.1
  • 18
    • 0003584083 scopus 로고
    • 4th ed, New York: Free Press, Simon & Simon
    • Rogers, E.M. (1995) Diffusion of Innovations (4th ed.). New York: Free Press, Simon & Simon.
    • (1995) Diffusion of Innovations
    • Rogers, E.M.1
  • 19
    • 34248537428 scopus 로고    scopus 로고
    • 'Safeguarding information for the security professional' (2002b) Office of the National Counterintelligence Executive (NCIX), Available at: http://www.nacic.gov/pubs/misc/safeguard.htm
    • 'Safeguarding information for the security professional' (2002b) Office of the National Counterintelligence Executive (NCIX), Available at: http://www.nacic.gov/pubs/misc/safeguard.htm
  • 20
    • 85010559202 scopus 로고    scopus 로고
    • Online privacy policies & diffusion theory perspectives: Security or chaos?
    • Smith, A.D. (2004a) 'Online privacy policies & diffusion theory perspectives: security or chaos?, Services Marketing Quarterly, Vol. 25, pp.53-75.
    • (2004) Services Marketing Quarterly , vol.25 , pp. 53-75
    • Smith, A.D.1
  • 21
    • 4143093509 scopus 로고    scopus 로고
    • Empirical exploration for a Product Data Management (PDA) system at a major telecommunications firm
    • Smith, A.D. (2004b) 'Empirical exploration for a Product Data Management (PDA) system at a major telecommunications firm', Industrial Management & Data Systems, Vol. 104, pp.513-525.
    • (2004) Industrial Management & Data Systems , vol.104 , pp. 513-525
    • Smith, A.D.1
  • 22
    • 33644512614 scopus 로고    scopus 로고
    • Strategic leveraging of videoconferencing & web-enabled conferencing in an information-rich environment
    • Smith, A.D. (2004c) 'Strategic leveraging of videoconferencing & web-enabled conferencing in an information-rich environment', Int. J. Services and Standards, Vol. 1, pp.206-227.
    • (2004) Int. J. Services and Standards , vol.1 , pp. 206-227
    • Smith, A.D.1
  • 23
    • 33745027249 scopus 로고    scopus 로고
    • Exploring the inherent benefits of RFID & automated self-serve checkouts in a B2C environment
    • Smith, A.D. (2005a) 'Exploring the inherent benefits of RFID & automated self-serve checkouts in a B2C environment', Int. J. Business Information Systems, Vol. 1, pp.149-183.
    • (2005) Int. J. Business Information Systems , vol.1 , pp. 149-183
    • Smith, A.D.1
  • 24
    • 33745027520 scopus 로고    scopus 로고
    • Exploring the acceptability of biometrics & fingerprint technologies
    • Smith, A.D. (2005b) 'Exploring the acceptability of biometrics & fingerprint technologies', Int. J. Services and Standards, Vol. 1, pp.453-481.
    • (2005) Int. J. Services and Standards , vol.1 , pp. 453-481
    • Smith, A.D.1
  • 25
    • 85001850091 scopus 로고    scopus 로고
    • Intrinsic & extrinsic values associated with file sharing
    • Smith, A.D. (2006) 'Intrinsic & extrinsic values associated with file sharing', Int. J. Electronic Information Systems, Vol. 2. pp.59-82.
    • (2006) Int. J. Electronic Information Systems , vol.2 , pp. 59-82
    • Smith, A.D.1
  • 27
    • 21244478827 scopus 로고    scopus 로고
    • E-procurement in the health care industry: Enhancing supply chain management
    • Smith, A.D. and Flanegin, F.R. (2004) 'E-procurement in the health care industry: enhancing supply chain management', Int. J. Electronic Healthcare, Vol. 1, pp. 176-198.
    • (2004) Int. J. Electronic Healthcare , vol.1 , pp. 176-198
    • Smith, A.D.1    Flanegin, F.R.2
  • 28
    • 0036063961 scopus 로고    scopus 로고
    • Information management of automated data capture: An overview of technical developments
    • Smith, A.D. and Offodile, F. (2002) 'Information management of automated data capture: an overview of technical developments', Information Management and Computer Security, Vol. 10, pp.109-118.
    • (2002) Information Management and Computer Security , vol.10 , pp. 109-118
    • Smith, A.D.1    Offodile, F.2
  • 29
    • 26444608436 scopus 로고    scopus 로고
    • Combining automatic data capture systems: Smart cards & biometrics
    • Smith, A.D., Rota, D.R. and Turchek, J.C. (2003) 'Combining automatic data capture systems: smart cards & biometrics', Journal of Contemporary Business, Vol. 11, pp.26-36.
    • (2003) Journal of Contemporary Business , vol.11 , pp. 26-36
    • Smith, A.D.1    Rota, D.R.2    Turchek, J.C.3
  • 30
    • 0036063532 scopus 로고    scopus 로고
    • Application Service Providers (ASP): Moving downstream to enhance competitive advantage
    • Smith, A.D. and Rupp, W.T. (2002a) 'Application Service Providers (ASP): moving downstream to enhance competitive advantage', Information Management and Computer Security, Vol. 10, pp.64-72.
    • (2002) Information Management and Computer Security , vol.10 , pp. 64-72
    • Smith, A.D.1    Rupp, W.T.2
  • 31
    • 0036036094 scopus 로고    scopus 로고
    • Issues in cybersecurity: Understanding the potential risks associated with hackers/crackers
    • Smith, A.D. and Rupp, W.T. (2002b) 'Issues in cybersecurity: understanding the potential risks associated with hackers/crackers', Information Management and Computer Security, Vol. 10, pp.178-183.
    • (2002) Information Management and Computer Security , vol.10 , pp. 178-183
    • Smith, A.D.1    Rupp, W.T.2
  • 32
    • 0012129113 scopus 로고    scopus 로고
    • Safe from prying eyes
    • Stijns, W. and Gunton, M. (2000) 'Safe from prying eyes', World Trade, Vol. 13, pp.64-65.
    • (2000) World Trade , vol.13 , pp. 64-65
    • Stijns, W.1    Gunton, M.2
  • 33
    • 77958101658 scopus 로고    scopus 로고
    • Diffusion theory and instructional technology
    • Available at
    • Surry, D.W. (1997) 'Diffusion theory and instructional technology', Instructional Technology Research Online, Available at: http:// www.gsu.edu/~wwwitr/docs/diffusion/.
    • (1997) Instructional Technology Research Online
    • Surry, D.W.1
  • 34
    • 34248568314 scopus 로고    scopus 로고
    • Available at
    • 'SPYRUS PKI Overview' (2002) 'Spyrus' Available at: http:// www.spyrus.com/content/products/pki/overview/index_pg2.asp.
    • (2002) Spyrus
    • SPYRUS PKI, O.1
  • 36
    • 34248511012 scopus 로고    scopus 로고
    • Infowar, Available at
    • Venzke, B.N. (1996) 'Econmic/industrial espionage', Infowar, Available at: http://www.infowar.com/class_2/class2_2.html-ssi
    • (1996) Econmic/industrial espionage
    • Venzke, B.N.1
  • 38
    • 1842530755 scopus 로고    scopus 로고
    • A unified approach to a fair document exchange system
    • Zhang, N., Shi, Q. and Merabti, M (2004) 'A unified approach to a fair document exchange system', The Journal of Systems and Software, Vol. 172, pp.83-91.
    • (2004) The Journal of Systems and Software , vol.172 , pp. 83-91
    • Zhang, N.1    Shi, Q.2    Merabti, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.