Online Business is driven by different systems. The systems consist of commercial activities, legal frameworks, security technologies, information system standards and policies as well as risk management models for assessing and determining strategies for security risk assessment and mitigation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Bibliography and References
(A consice introduction). Westview Press. 107,2000. 2004. A new approach for assessing the maturity of information security Accessed (06/08/04).
Adshead A (2001) Lloyd’s to save £4m with VoIP network, Network
Althos (2001) Publishing Inc., ISBN: 0-9742787-7-7. and Voice compression, 2001.
Arreymbi J, Williams (2006) EEMA presentation on Cybertribes, 16th May, Green Park Reading UK.
Atkinson Ashley Atkinson, Magazine Director, Keycom.
Bregman (2001) Bregman David, Reality check on VoIP (Internet Buchman DH (1994) Risk Analysis - some practical suggestions
Bussgang J.J and Spar D (1996) Harvard Business Review. Means of Exchange and Security enforcement. Pg. 129-131, 131-132
Chapman & Ward (1997) Project Risk Management. Wiley: Chichester. Chartrand, Mark R (2004) Satellite Communication for the non-specialist
Chen T (2004) “Intrusion detection for viruses and worms,” in IEC Annual Review of Communications, vol. 57.
Cisco (2000) Cisco Systems Inc., VoIP Today, 2000.CiscoPress
Collins (2001) Daniel Collins “Carrier Grade Voice Over IP”
Databeam (2004) A Primer on the H.323 Series Standard version 2
Databeam, www.databeam.com/h323/h323primer.html
Davidson (2000) J Davidson, J Peters “Voice over IP fundamentals”
Dean Tamara (2003) Guide to Telecommunication Technology Deception, Fraud
Deremiak EL and Boreman GD (1996) Infrared Detectors and Systems
Dixon M, Robert McCorquodate. Cases and Materials on international law, Blackstone Press Limited. 306, 138, 276
Electro-technical conference, MELECON, V1, P250 - 254. February 2003, P304 - 310.
Ferrie P and Perriot F (2004), Virus Analysis 2, Symantec Security for Internet Telephony, 2000.
Glasson B, Doug Vogel, Peter Bots and Jay Nunmaker.
Glenn et al (1999) Wireless Information Technology for the 21st Century group. Missouri research and education network
Gu X, Dodds SJ (2006) Open Source Publication on Communication Networks and electornic Security. Journal for ICT security synergy in advanced and developing economies Volume 1
Halsall (2001) Fred Halsall “Multimedia Communications” Pearson
Handley et al (2000) SIP: Session Initiation Protocol IETF, Ineternet draft, Harrison G (2004) Videonetworks Network Design, 23rd march, 2004. Harte L (2003) Introduction to IP Telephony. Copyright 2003
Hignera & Haines (1996), Software Risk Management. Technical Report, Software Engineering Institute, Pittsburgh, PA, USA
IBM(2004) Global security KIT, SSL introduction and ikeyman user’s improvement of VoIP applications. Proceedings of the Mediterranean Information Systems and technology in the international office of the future. Chapman & Hall. 30, 31, 34
James M (2004) Voice over IP (How IT works), Computer Shopper
Jones R (1997). Business and Technology Journal. Net can’t catch Cyber criminals Journal
Keen P, Mackintosh R (2001)The Freedom Economy. Gaining the M-commerce Edge in the Era of the Wireless Internet
Koistinen T (1998) IP Telephony. Nokia Communications
Kos, Klepec, Tomaziac (2002) “Techniques for Performance
Krishnamoorthy V (2001) “The Importance of QoS in Broadband
Lee W, Mcknight, Lehr W, Clark D (2001) “Internet Telephony” Copyright
Levi W (2004) Contemporary international law
magazine, November 2004, P4.
Mehta P, Udani S (2001) Overview of Voice over IP Technical report Minoli D, Minoli E (1998) “Delivery Voice over IP Networks” Mirecki F (2002) VoIP Unified Messaging, Technology seminar
Morgan EB (2004) A white Paper on Voice Over IP Packet, MS-CIS-01-31.
Musaj (2006) A holistic definition of IT Security
Information Systems Control (ISACA) Journal volume 3
Networks and Electronic Security. Journal for ICT Security. networks at risk, Network News News, 13 December 2001
NIST (2002) 27 March, technology administration US department NIST lab of commerce
Oni (2001) “The Guide to IP Telephony” ONI(2001).
Onwubiko C (2006) Open Source publication on Communication Networks and Electronic Security Volume 1- Journal for ICT security synergy in advanced and developing economies
Oslon D (2002) Voice over IP: Technical issues, Strategic technology P20.
Project Management Institute (1996) A Guide To Project Management
Body Of Knowledge (PMBOK), Project Institute, Newton Square, PA, USA
Protocol (2004) Protocols, Technical Paper on Protocols
Reitter, Jorg Reitter(2004) “Net Telephony For All” Linux Magazine, Response, USA
Richardson J (2004) Technical Extracts, Keycom.
Robinson NE (2005) Using GIS Tool to assess the vulnerability of the internet. Securing Electronic Business Processes, Vieweg
Rogers G (2001) Rogers Gary, A Gateway from old to the New, Sonus
Rogerson S (1997) Institute for the management of information systems (IMIS) journal. ETHIcol. march 1997. 21
Saleh Alaboodi Saad (2006) Information Systems Control (ISACA) Journal Volume 3.
Schulzrinne H, Rosenberg J (2000) A comparison of SIP and H323
Singleton TW (2006) COBIT - A Key to success as an ICT auditor, Information Systems Control Journal
Shaneck M. An Overview of Buffer Overflow Vulnerabilities and Internet Smart Nigel (2003) Cryptography: An introduction. McGraw-Hill Smith K, Brushteyn D (2004) A Paper on Internet Telephony Stallings W(2003) Network Security Essentials. Pearson Steven J et al (1997) JAVA security model, Sun Micro Systems 1996/97
Symantec (2004) Internet Security Threat Report, Trends for January 1, 2004 - June 30, 2004, Symantec, Volume VI
Telogy Networks. www.telogy.com accessed (06/08/04).
Vittore V (2003) Making the case for IP Telephony, Telephony, v244, n4,
Williams (1995) A classified bibliography of recent research relating to project risk management European Journal Of Operational research 85: 18-38.
Williams G (2003/4) Synchronizing E-Security Kluwer Academic Publishers, Woabank (2000) Research Paper, Butler Group (Research and Wong H, C, Sycara K (1999) “Adding security and trust to Multi-Agent
Additional Bibliography
Alberts, Christopher J; Belmens, Sandra G; Rethia, Richard D, & Wilson, William R. Operationally Critical Threat, Asset, and Vulnerability Evalua-tion (OCTAVE) Framework version 1.0 (CMU/SE 1-99-JR-017), Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, June 1999.
National Security Telecommunications and Information Systems Security Committee. Index of National Security Telecommunications Information Systems Security issuances (NSTSS1 No. 4014) Ft. Mead, MD: NSTISSC secretariat Jan. 1998
Howard, John D & Longstaff, Thomas A. A common language for computer security incidents (SAND 98 -8667). Albuquerque, NM: Sandia National Laboratories 1998
Hatt, Aurthur E; Bosworth, Seymour; Hoyt Douglas B. Computer Secu-rity Handbook, 3rd Edition. New York, NY: John Wiley & Sons, Inc 1995
Parker, Donn B. Fighting Computer Crime. New York, NY: John Wiley & Sons, Inc 1998
Rights and permissions
Copyright information
© 2007 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
(2007). Discussions. In: Online Business Security Systems. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-68850-3_10
Download citation
DOI: https://doi.org/10.1007/978-0-387-68850-3_10
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-35771-3
Online ISBN: 978-0-387-68850-3
eBook Packages: Computer ScienceComputer Science (R0)