Management view of Internet electronic commerce security

被引:0
|
作者
Baseline Software, Inc, Sausalito, United States [1 ]
机构
来源
Comput Secur | / 4卷 / 316-320期
关键词
Electronic publishing - Public policy - Risk assessment - Societies and institutions - Telecommunication services - User interfaces - Wide area networks;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] Toward a unified view of electronic commerce
    Riggins, FJ
    Rhee, HS
    COMMUNICATIONS OF THE ACM, 1998, 41 (10) : 88 - 95
  • [32] Capitalizing on electronic commerce - The role of the Internet in electronic markets
    Senn, JA
    INFORMATION SYSTEMS MANAGEMENT, 1996, 13 (03) : 15 - 24
  • [33] A security architecture for electronic commerce applications
    De Win, B
    Van den Bergh, J
    Matthijs, F
    De Decker, B
    Joosen, W
    INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES, 2000, 47 : 491 - 500
  • [34] Realization of Information Security in Electronic Commerce
    Li Fu-Guo
    Dong Yu-Jie
    THIRD INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY (ISCSCT 2010), 2010, : 14 - 16
  • [35] Research on the Security System of Electronic Commerce
    He Quanxiu
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE OF MANAGEMENT SCIENCE AND INFORMATION SYSTEM, VOLS 1-4, 2009, : 161 - 164
  • [36] Security: The Achilles heel of electronic commerce
    Backhouse, JP
    SOCIETY, 1998, 35 (04) : 28 - 31
  • [37] Security: The achilles heel of electronic commerce
    James P. Backhouse
    Society, 1998, 35 : 28 - 31
  • [38] A novel workflow management model based on mobile agents for Internet electronic commerce
    Wu, G
    Wu, QY
    Wang, HM
    36TH INTERNATIONAL CONFERENCE ON TECHNOLOGY OF OBJECT-ORIENTED LANGUAGES AND SYSTEMS, PROCEEDINGS, 2000, : 182 - 187
  • [39] AOL allies for security and electronic commerce
    不详
    DATABASE, 1996, 19 (04): : 79 - 79
  • [40] Research on Network Security in Electronic Commerce
    Gu Yue-sheng
    Li Yan-cui
    Chen Xiao-jing
    2010 SECOND ETP/IITA WORLD CONGRESS IN APPLIED COMPUTING, COMPUTER SCIENCE, AND COMPUTER ENGINEERING, 2010, : 175 - 178