Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
APWG (Anti-Phishing Working Group), 2004, ‘Proposed solutions to address the threat of email spoofing seams’; www.antiphishing.org (February 11, 2004).
Bailey and Bakos, 1997, The impacts of eC on the efficiency of the economy: OEDC, white paper, London, Stationery Office.
Bellowin, S. M., 1989, ‘Security problems in the TCP/IP protocol suite’, Computer Communications Review.
Block and Seger, 1998, ‘Leveraging eC for competitive advantage: a business val framework’, Proceedings of the 9th International Conference on EDI-IOS, Bled, Slovenia.
eMarketer, 2004, ‘Phishing for sucker’; www.emarketer.com/Article. aspx?l002975Aug (5 July 2004).
eMarketer, 2005a, ‘Spyware Awareness Varied among Execs’; www.emarketer.com/Article. aspx?1003232 (February 7, 2005)
eMarketer, 2005b, ‘Security and Privacy report: What, IT Worry?’; www.emarketer.com/Article.aspx?1003258 (February 20, 2005)
Euretig, K.R., and Whitcomb, S., 2005, ‘WatchGuard Survey Indicates IT Managers View Spyware as Top Network Security Threat in 2005’; www.watchguard.com/press/releases/wg299.asp (January 27, 2005).
Harrison, J., 2003, ‘VPN Technologies — A Comparison’; vnu.bitpipe.com/detail/RES/1046358922_393.html (February 12, 2005).
Kalakota R. and Whinston, A. B., 1998, Electronic Commerce: A Manager’s Guide. Addison Wesley.
Keen, P., 1991, Shaping The Future: Business Design Through IT. Harvard Business Press.
Kerr, K., and Litan, A., 2002, ‘Online Transaction Fraud and Prevention Get More Sophisticated: Companies, Markets, Forces’, Gartnerg online; www.gartnerg2.com/research/rpt-0102-0013.asp (November 6, 2003).
Kosiur, D., 1997, Understanding eC. Microsoft Press.
Landwehr, C. E. and Goldschlag, D. M., 1998, ‘Security issues with Internet access’, in the Proceedings of the IEEE, 85(12):2034–2051.
Lief, V, 1999, ‘Anatomy of new market models’, Forrester Research; www.forrester.com. (February 27, 2004)
McGraw, G. and Felton, E., 1997, Java Security: Hostile Applets: Holes and Antidotes. New York, John Wiley & Son.
Shoniregun, C.A. and Logvynovskiy, O., 2004, ‘Securing XML documents’, the Australian Journal of Information Systems, September 2004, pp. 18–28.
Shoniregun, C. A., Omoegun, A., Brown-West, P. and Logvynovskiy, O., 2004a, ‘Can eCRM and trust improve eC customer base?’, in the Proceedings of the IEEE conference on E-Commerce technology, San Diego, California, USA, pp. 303–310.
Shoniregun, C.A., Chochliouros, I.P., Laperche, B., Logvynovskiy, O. and Spiliopoulou-Chochliourou, A., 2004b, Questioning the Boundary Issues of Internet Security, e-Center for Infonomics: London.
Shoniregun, C.A., 2002, ‘To ignore E-commerce is to allow competitors to steal a lead’. EC NL, June, pp. 8–9.
Shoniregun, C.A., 2003, ‘Are existing Internet security measures guaranteed to protect user identity in the financial services industry?’, International Journal of Services, Technology and Management (IJSTM), 4:194–215.
Stalling, W., 2001, Business Data Communication, 4th edition, Prentice Hall.
Weinstein, L. and Neumann, P., 2003, ‘Risks of content filtering’, Communication of the ACM, November.
Rights and permissions
Copyright information
© 2005 Springer Science+Business Media, Inc.
About this chapter
Cite this chapter
(2005). Impacts of TEI on SMEs. In: Impacts and Risk Assessment of Technology for Internet Security. Advances in Information Security, vol 17. Springer, Boston, MA. https://doi.org/10.1007/0-387-26334-9_2
Download citation
DOI: https://doi.org/10.1007/0-387-26334-9_2
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-24343-6
Online ISBN: 978-0-387-26334-2
eBook Packages: Computer ScienceComputer Science (R0)