Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bolton, J., 1971, Small firms report of the committee of inquiry on small firms, London, HMSO.
Department of Trade and Industry (DTI), 2002, ‘Information Security Breaches Survey’, p. 20; ukonlineforbusiness.gov.uk/cms/template/infor-security.jsp?id=213097 (January 8, 2003).
Huston. B, 2002, ‘A Higher view of Defense in Depth’ www.itworld.comh/nl/securitystrat/02202002/ (February 20, 2002).
Shoniregun, C. A., Chochliouros, I. P., Laperche, B., Logvynovskiy, O., and Spiliopoulou-Chochliouros, A., 2004, Questioning the Boundary Issues of Internet Security, e-Centre for Infonomics: London.
Shoniregun, C. A., 2003, ‘Are existing Internet security measures guaranteed to protect user identity in the financial services industry?’, International Journal of Services, Technology and Management (I.TSTM), Volume 4, pp. 194–215.
Rights and permissions
Copyright information
© 2005 Springer Science+Business Media, Inc.
About this chapter
Cite this chapter
(2005). Analysis of Results. In: Impacts and Risk Assessment of Technology for Internet Security. Advances in Information Security, vol 17. Springer, Boston, MA. https://doi.org/10.1007/0-387-26334-9_5
Download citation
DOI: https://doi.org/10.1007/0-387-26334-9_5
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-24343-6
Online ISBN: 978-0-387-26334-2
eBook Packages: Computer ScienceComputer Science (R0)