Skip to main content

Part of the book series: Advances in Information Security ((ADIS,volume 17))

  • 1000 Accesses

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • APWG (Anti-Phishing Working Group), 2004, ‘Proposed solutions to address the threat of email spoofing seams’; www.antiphishing.org (February 11, 2004).

    Google Scholar 

  • Bailey and Bakos, 1997, The impacts of eC on the efficiency of the economy: OEDC, white paper, London, Stationery Office.

    Google Scholar 

  • Bellowin, S. M., 1989, ‘Security problems in the TCP/IP protocol suite’, Computer Communications Review.

    Google Scholar 

  • Block and Seger, 1998, ‘Leveraging eC for competitive advantage: a business val framework’, Proceedings of the 9th International Conference on EDI-IOS, Bled, Slovenia.

    Google Scholar 

  • eMarketer, 2004, ‘Phishing for sucker’; www.emarketer.com/Article. aspx?l002975Aug (5 July 2004).

    Google Scholar 

  • eMarketer, 2005a, ‘Spyware Awareness Varied among Execs’; www.emarketer.com/Article. aspx?1003232 (February 7, 2005)

    Google Scholar 

  • eMarketer, 2005b, ‘Security and Privacy report: What, IT Worry?’; www.emarketer.com/Article.aspx?1003258 (February 20, 2005)

    Google Scholar 

  • Euretig, K.R., and Whitcomb, S., 2005, ‘WatchGuard Survey Indicates IT Managers View Spyware as Top Network Security Threat in 2005’; www.watchguard.com/press/releases/wg299.asp (January 27, 2005).

    Google Scholar 

  • Harrison, J., 2003, ‘VPN Technologies — A Comparison’; vnu.bitpipe.com/detail/RES/1046358922_393.html (February 12, 2005).

    Google Scholar 

  • Kalakota R. and Whinston, A. B., 1998, Electronic Commerce: A Manager’s Guide. Addison Wesley.

    Google Scholar 

  • Keen, P., 1991, Shaping The Future: Business Design Through IT. Harvard Business Press.

    Google Scholar 

  • Kerr, K., and Litan, A., 2002, ‘Online Transaction Fraud and Prevention Get More Sophisticated: Companies, Markets, Forces’, Gartnerg online; www.gartnerg2.com/research/rpt-0102-0013.asp (November 6, 2003).

    Google Scholar 

  • Kosiur, D., 1997, Understanding eC. Microsoft Press.

    Google Scholar 

  • Landwehr, C. E. and Goldschlag, D. M., 1998, ‘Security issues with Internet access’, in the Proceedings of the IEEE, 85(12):2034–2051.

    Article  Google Scholar 

  • Lief, V, 1999, ‘Anatomy of new market models’, Forrester Research; www.forrester.com. (February 27, 2004)

    Google Scholar 

  • McGraw, G. and Felton, E., 1997, Java Security: Hostile Applets: Holes and Antidotes. New York, John Wiley & Son.

    Google Scholar 

  • Shoniregun, C.A. and Logvynovskiy, O., 2004, ‘Securing XML documents’, the Australian Journal of Information Systems, September 2004, pp. 18–28.

    Google Scholar 

  • Shoniregun, C. A., Omoegun, A., Brown-West, P. and Logvynovskiy, O., 2004a, ‘Can eCRM and trust improve eC customer base?’, in the Proceedings of the IEEE conference on E-Commerce technology, San Diego, California, USA, pp. 303–310.

    Google Scholar 

  • Shoniregun, C.A., Chochliouros, I.P., Laperche, B., Logvynovskiy, O. and Spiliopoulou-Chochliourou, A., 2004b, Questioning the Boundary Issues of Internet Security, e-Center for Infonomics: London.

    Google Scholar 

  • Shoniregun, C.A., 2002, ‘To ignore E-commerce is to allow competitors to steal a lead’. EC NL, June, pp. 8–9.

    Google Scholar 

  • Shoniregun, C.A., 2003, ‘Are existing Internet security measures guaranteed to protect user identity in the financial services industry?’, International Journal of Services, Technology and Management (IJSTM), 4:194–215.

    Article  Google Scholar 

  • Stalling, W., 2001, Business Data Communication, 4th edition, Prentice Hall.

    Google Scholar 

  • Weinstein, L. and Neumann, P., 2003, ‘Risks of content filtering’, Communication of the ACM, November.

    Google Scholar 

Download references

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer Science+Business Media, Inc.

About this chapter

Cite this chapter

(2005). Impacts of TEI on SMEs. In: Impacts and Risk Assessment of Technology for Internet Security. Advances in Information Security, vol 17. Springer, Boston, MA. https://doi.org/10.1007/0-387-26334-9_2

Download citation

  • DOI: https://doi.org/10.1007/0-387-26334-9_2

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-24343-6

  • Online ISBN: 978-0-387-26334-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics