-
1
-
-
3543024511
-
Security considerations of doing business via the internet: Cautions to be considered
-
Aldridge, A., White, M. and Forch, K. (1997) 'Security considerations of doing business via the internet: Cautions to be considered', Internet Research: Electronic: Networking Applications and Policy, Vol. 7, No. 1, pp.9-15.
-
(1997)
Internet Research: Electronic: Networking Applications and Policy
, vol.7
, Issue.1
, pp. 9-15
-
-
Aldridge, A.1
White, M.2
Forch, K.3
-
2
-
-
5844306659
-
Privacy and security on the internet: How to secure your personal information and company data
-
Attaran, M. and Vanlaar, L. (1999) 'Privacy and security on the internet: How to secure your personal information and company data', Information Management and Computer Security, Vol. 7, No. 5, pp.241-246.
-
(1999)
Information Management and Computer Security
, vol.7
, Issue.5
, pp. 241-246
-
-
Attaran, M.1
Vanlaar, L.2
-
3
-
-
0001698113
-
Designing research for application
-
Calder, B.J., Phillips, L.W. and Tybout, A.M. (1981) 'Designing research for application', Journal of Consumer Research, Vol. 8, pp.197-207.
-
(1981)
Journal of Consumer Research
, vol.8
, pp. 197-207
-
-
Calder, B.J.1
Phillips, L.W.2
Tybout, A.M.3
-
4
-
-
2442654928
-
Perceived information security, financial liability and customer trust in electronic commerce transactions
-
Chellappa, R. and Pavlou, P. (2002) 'Perceived information security, financial liability and customer trust in electronic commerce transactions', Logistics Information Management, Vol. 15, Nos. 4/6, pp.358-368.
-
(2002)
Logistics Information Management
, vol.15
, Issue.4-6
, pp. 358-368
-
-
Chellappa, R.1
Pavlou, P.2
-
5
-
-
85087309562
-
Australian banks' approaches to privacy in an online world
-
Cranitch, G., Nguyen, D. and Nguyen, A. (2007) 'Australian banks' approaches to privacy in an online world', Int. J. Electronic Finance, Vol. 1, No. 4, pp.389-405.
-
(2007)
Int. J. Electronic Finance
, vol.1
, Issue.4
, pp. 389-405
-
-
Cranitch, G.1
Nguyen, D.2
Nguyen, A.3
-
6
-
-
0036064034
-
System insecurity - Firewalls
-
Desai, M., Richards, T. and Embed, T. (2002) 'System insecurity - firewalls', Information Management & Computer Security, Vol. 10, No. 3, pp.135-139.
-
(2002)
Information Management & Computer Security
, vol.10
, Issue.3
, pp. 135-139
-
-
Desai, M.1
Richards, T.2
Embed, T.3
-
7
-
-
64949117107
-
-
The MOSAIC Group, (accessed September 2005).
-
Ein-Dor, P., Goodman, S. and Wolcott, P. (1999) 'The global diffusion of the internet project: The Hashemite Kingdom of Jordan', The MOSAIC Group, http://mosiac.unomaha.edu/Jordan_1999.pdf (accessed September 2005).
-
(1999)
The Global Diffusion of the Internet Project: The Hashemite Kingdom of Jordan
-
-
Ein-Dor, P.1
Goodman, S.2
Wolcott, P.3
-
8
-
-
77957665960
-
Consumer adoption of internet banking in Nigeria
-
Gao, P. and Owolabi, O. (2008) 'Consumer adoption of internet banking in Nigeria', Int. J. Electronic Finance, Vol. 2, No. 3, pp.284-299.
-
(2008)
Int. J. Electronic Finance
, vol.2
, Issue.3
, pp. 284-299
-
-
Gao, P.1
Owolabi, O.2
-
9
-
-
0035780740
-
A digital seal solution for deploying trust on commercial transaction
-
Gritzalls, S. and Gritzlis, D. (2001) 'A digital seal solution for deploying trust on commercial transaction', Information Management and Computer Security, Vol. 9, No. 2, pp.71-79.
-
(2001)
Information Management and Computer Security
, vol.9
, Issue.2
, pp. 71-79
-
-
Gritzalls, S.1
Gritzlis, D.2
-
10
-
-
0034804713
-
Securing e-business applications using smart cards
-
Hamann, E., et al. (2001) 'Securing e-business applications using smart cards', IBM Systems Journal, Vol. 40, No. 3, pp.635-648.
-
(2001)
Ibm Systems Journal
, vol.40
, Issue.3
, pp. 635-648
-
-
Hamann, E.1
-
11
-
-
77957680980
-
The inhibitory factors of implementing internet banks
-
Hung, Y. and Lu, Y. (2008) 'The inhibitory factors of implementing internet banks', Int. J. Electronic Finance, Vol. 2, No. 3, pp.419-432.
-
(2008)
Int. J. Electronic Finance
, vol.2
, Issue.3
, pp. 419-432
-
-
Hung, Y.1
Lu, Y.2
-
12
-
-
25844523931
-
Security for internet banking: A framework
-
Hutchinson, D. and Warren, M. (2003) 'Security for internet banking: A framework', Logistics Information Management, Vol. 16, No. 1, pp.64-73.
-
(2003)
Logistics Information Management
, vol.16
, Issue.1
, pp. 64-73
-
-
Hutchinson, D.1
Warren, M.2
-
14
-
-
1542333606
-
Taxonomy of online game security
-
Ki, J., et al. (2004) 'Taxonomy of online game security', The Electronic Library, Vol. 22, No. 1, pp.65-73.
-
(2004)
The Electronic Library
, vol.22
, Issue.1
, pp. 65-73
-
-
Ki, J.1
-
16
-
-
84986146350
-
Deploying Novell's border manager internet security firewall: A case study
-
Kumar, S. (1999) 'Deploying Novell's border manager internet security firewall: A case study', Campus-Wide Information System, Vol. 16, No. 2, pp.57-62.
-
(1999)
Campus-Wide Information System
, vol.16
, Issue.2
, pp. 57-62
-
-
Kumar, S.1
-
17
-
-
51749124026
-
Understanding the effects of relationships on the intention of a firm to adopt e-banking
-
Kuo, F., Tseng, F. and Liou, D. (2007) 'Understanding the effects of relationships on the intention of a firm to adopt e-banking', Int. J. Electronic Finance, Vol. 1, No. 4, pp.484-501.
-
(2007)
Int. J. Electronic Finance
, vol.1
, Issue.4
, pp. 484-501
-
-
Kuo, F.1
Tseng, F.2
Liou, D.3
-
18
-
-
85091131146
-
Just how safe is safe?
-
Martyn, W. and Guy, D. (2001) 'Just how safe is safe?', Euronet, Vol. 1, No. 13, pp.18-22.
-
(2001)
Euronet
, vol.1
, Issue.13
, pp. 18-22
-
-
Martyn, W.1
Guy, D.2
-
19
-
-
85091189599
-
-
Arescom, BellSouth, Eicon Technology
-
Momut, R., Crawley, L. and Geier, P. (2000) 'DSL security whitepaper', Arescom, BellSouth, Eicon Technology.
-
(2000)
Dsl Security Whitepaper
-
-
Momut, R.1
Crawley, L.2
Geier, P.3
-
21
-
-
1142292685
-
Trust in web-based electronic commerce security
-
Ratnasingham, P. (1998b) 'Trust in web-based electronic commerce security', Information Management & Computer Security, Vol. 6, No. 4, pp.162-166.
-
(1998)
Information Management & Computer Security
, vol.6
, Issue.4
, pp. 162-166
-
-
Ratnasingham, P.1
-
22
-
-
51749090665
-
Is e-banking a competitive weapon? A causal analysis
-
Shih, K. (2008) 'Is e-banking a competitive weapon? A causal analysis', Int. J. Electronic Finance, Vol. 2, No. 2, pp.180-196.
-
(2008)
Int. J. Electronic Finance
, vol.2
, Issue.2
, pp. 180-196
-
-
Shih, K.1
-
24
-
-
8644291627
-
PIDS: A privacy intrusion detection system
-
Venter, H., Oliver, M. and Eloff, J. (2004) 'PIDS: A privacy intrusion detection system', Internet Research, Vol. 14, No. 5, pp.360-365.
-
(2004)
Internet Research
, vol.14
, Issue.5
, pp. 360-365
-
-
Venter, H.1
Oliver, M.2
Eloff, J.3
-
25
-
-
84986134918
-
Certificates and trust in electronic commerce
-
Wilson, S. (1997) 'Certificates and trust in electronic commerce', Information Management and Computer Security, Vol. 5, No. 5, pp.175-181.
-
(1997)
Information Management and Computer Security
, vol.5
, Issue.5
, pp. 175-181
-
-
Wilson, S.1
-
26
-
-
0036239741
-
Security issues in online games
-
Yan, J. and Chio, H. (2002) 'Security issues in online games', The Electronic Library, Vol. 20, No. 2, pp.125-133.
-
(2002)
The Electronic Library
, vol.20
, Issue.2
, pp. 125-133
-
-
Yan, J.1
Chio, H.2
|