Skip to main content
  • 574 Accesses

Online Business is driven by different systems. The systems consist of commercial activities, legal frameworks, security technologies, information system standards and policies as well as risk management models for assessing and determining strategies for security risk assessment and mitigation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Bibliography and References

  • (A consice introduction). Westview Press. 107,2000. 2004. A new approach for assessing the maturity of information security Accessed (06/08/04).

    Google Scholar 

  • Adshead A (2001) Lloyd’s to save £4m with VoIP network, Network

    Google Scholar 

  • Althos (2001) Publishing Inc., ISBN: 0-9742787-7-7. and Voice compression, 2001.

    Google Scholar 

  • Arreymbi J, Williams (2006) EEMA presentation on Cybertribes, 16th May, Green Park Reading UK.

    Google Scholar 

  • Atkinson Ashley Atkinson, Magazine Director, Keycom.

    Google Scholar 

  • Bregman (2001) Bregman David, Reality check on VoIP (Internet Buchman DH (1994) Risk Analysis - some practical suggestions

    Google Scholar 

  • Bussgang J.J and Spar D (1996) Harvard Business Review. Means of Exchange and Security enforcement. Pg. 129-131, 131-132

    Google Scholar 

  • Chapman & Ward (1997) Project Risk Management. Wiley: Chichester. Chartrand, Mark R (2004) Satellite Communication for the non-specialist

    Google Scholar 

  • Chen T (2004) “Intrusion detection for viruses and worms,” in IEC Annual Review of Communications, vol. 57.

    Google Scholar 

  • Cisco (2000) Cisco Systems Inc., VoIP Today, 2000.CiscoPress

    Google Scholar 

  • Collins (2001) Daniel Collins “Carrier Grade Voice Over IP”

    Google Scholar 

  • Databeam (2004) A Primer on the H.323 Series Standard version 2

    Google Scholar 

  • Databeam, www.databeam.com/h323/h323primer.html

  • Davidson (2000) J Davidson, J Peters “Voice over IP fundamentals”

    Google Scholar 

  • Dean Tamara (2003) Guide to Telecommunication Technology Deception, Fraud

    Google Scholar 

  • Deremiak EL and Boreman GD (1996) Infrared Detectors and Systems

    Google Scholar 

  • Dixon M, Robert McCorquodate. Cases and Materials on international law, Blackstone Press Limited. 306, 138, 276

    Google Scholar 

  • Electro-technical conference, MELECON, V1, P250 - 254. February 2003, P304 - 310.

    Google Scholar 

  • Ferrie P and Perriot F (2004), Virus Analysis 2, Symantec Security for Internet Telephony, 2000.

    Google Scholar 

  • Glasson B, Doug Vogel, Peter Bots and Jay Nunmaker.

    Google Scholar 

  • Glenn et al (1999) Wireless Information Technology for the 21st Century group. Missouri research and education network

    Google Scholar 

  • Gu X, Dodds SJ (2006) Open Source Publication on Communication Networks and electornic Security. Journal for ICT security synergy in advanced and developing economies Volume 1

    Google Scholar 

  • Halsall (2001) Fred Halsall “Multimedia Communications” Pearson

    Google Scholar 

  • Handley et al (2000) SIP: Session Initiation Protocol IETF, Ineternet draft, Harrison G (2004) Videonetworks Network Design, 23rd march, 2004. Harte L (2003) Introduction to IP Telephony. Copyright 2003

    Google Scholar 

  • Hignera & Haines (1996), Software Risk Management. Technical Report, Software Engineering Institute, Pittsburgh, PA, USA

    Google Scholar 

  • IBM(2004) Global security KIT, SSL introduction and ikeyman user’s improvement of VoIP applications. Proceedings of the Mediterranean Information Systems and technology in the international office of the future. Chapman & Hall. 30, 31, 34

    Google Scholar 

  • James M (2004) Voice over IP (How IT works), Computer Shopper

    Google Scholar 

  • Jones R (1997). Business and Technology Journal. Net can’t catch Cyber criminals Journal

    Google Scholar 

  • Keen P, Mackintosh R (2001)The Freedom Economy. Gaining the M-commerce Edge in the Era of the Wireless Internet

    Google Scholar 

  • Koistinen T (1998) IP Telephony. Nokia Communications

    Google Scholar 

  • Kos, Klepec, Tomaziac (2002) “Techniques for Performance

    Google Scholar 

  • Krishnamoorthy V (2001) “The Importance of QoS in Broadband

    Google Scholar 

  • Lee W, Mcknight, Lehr W, Clark D (2001) “Internet Telephony” Copyright

    Google Scholar 

  • Levi W (2004) Contemporary international law

    Google Scholar 

  • magazine, November 2004, P4.

    Google Scholar 

  • Mehta P, Udani S (2001) Overview of Voice over IP Technical report Minoli D, Minoli E (1998) “Delivery Voice over IP Networks” Mirecki F (2002) VoIP Unified Messaging, Technology seminar

    Google Scholar 

  • Morgan EB (2004) A white Paper on Voice Over IP Packet, MS-CIS-01-31.

    Google Scholar 

  • Musaj (2006) A holistic definition of IT Security

    Google Scholar 

  • Information Systems Control (ISACA) Journal volume 3

    Google Scholar 

  • Networks and Electronic Security. Journal for ICT Security. networks at risk, Network News News, 13 December 2001

    Google Scholar 

  • NIST (2002) 27 March, technology administration US department NIST lab of commerce

    Google Scholar 

  • Oni (2001) “The Guide to IP Telephony” ONI(2001).

    Google Scholar 

  • Onwubiko C (2006) Open Source publication on Communication Networks and Electronic Security Volume 1- Journal for ICT security synergy in advanced and developing economies

    Google Scholar 

  • Oslon D (2002) Voice over IP: Technical issues, Strategic technology P20.

    Google Scholar 

  • Project Management Institute (1996) A Guide To Project Management

    Google Scholar 

  • Body Of Knowledge (PMBOK), Project Institute, Newton Square, PA, USA

    Google Scholar 

  • Protocol (2004) Protocols, Technical Paper on Protocols

    Google Scholar 

  • Reitter, Jorg Reitter(2004) “Net Telephony For All” Linux Magazine, Response, USA

    Google Scholar 

  • Richardson J (2004) Technical Extracts, Keycom.

    Google Scholar 

  • Robinson NE (2005) Using GIS Tool to assess the vulnerability of the internet. Securing Electronic Business Processes, Vieweg

    Google Scholar 

  • Rogers G (2001) Rogers Gary, A Gateway from old to the New, Sonus

    Google Scholar 

  • Rogerson S (1997) Institute for the management of information systems (IMIS) journal. ETHIcol. march 1997. 21

    Google Scholar 

  • Saleh Alaboodi Saad (2006) Information Systems Control (ISACA) Journal Volume 3.

    Google Scholar 

  • Schulzrinne H, Rosenberg J (2000) A comparison of SIP and H323

    Google Scholar 

  • Singleton TW (2006) COBIT - A Key to success as an ICT auditor, Information Systems Control Journal

    Google Scholar 

  • Shaneck M. An Overview of Buffer Overflow Vulnerabilities and Internet Smart Nigel (2003) Cryptography: An introduction. McGraw-Hill Smith K, Brushteyn D (2004) A Paper on Internet Telephony Stallings W(2003) Network Security Essentials. Pearson Steven J et al (1997) JAVA security model, Sun Micro Systems 1996/97

    Google Scholar 

  • Symantec (2004) Internet Security Threat Report, Trends for January 1, 2004 - June 30, 2004, Symantec, Volume VI

    Google Scholar 

  • Telogy Networks. www.telogy.com accessed (06/08/04).

  • Vittore V (2003) Making the case for IP Telephony, Telephony, v244, n4,

    Google Scholar 

  • Williams (1995) A classified bibliography of recent research relating to project risk management European Journal Of Operational research 85: 18-38.

    Google Scholar 

  • Williams G (2003/4) Synchronizing E-Security Kluwer Academic Publishers, Woabank (2000) Research Paper, Butler Group (Research and Wong H, C, Sycara K (1999) “Adding security and trust to Multi-Agent

    Google Scholar 

Additional Bibliography

  1. Alberts, Christopher J; Belmens, Sandra G; Rethia, Richard D, & Wilson, William R. Operationally Critical Threat, Asset, and Vulnerability Evalua-tion (OCTAVE) Framework version 1.0 (CMU/SE 1-99-JR-017), Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, June 1999.

    Google Scholar 

  2. National Security Telecommunications and Information Systems Security Committee. Index of National Security Telecommunications Information Systems Security issuances (NSTSS1 No. 4014) Ft. Mead, MD: NSTISSC secretariat Jan. 1998

    Google Scholar 

  3. Howard, John D & Longstaff, Thomas A. A common language for computer security incidents (SAND 98 -8667). Albuquerque, NM: Sandia National Laboratories 1998

    Google Scholar 

  4. Hatt, Aurthur E; Bosworth, Seymour; Hoyt Douglas B. Computer Secu-rity Handbook, 3rd Edition. New York, NY: John Wiley & Sons, Inc 1995

    Google Scholar 

  5. Parker, Donn B. Fighting Computer Crime. New York, NY: John Wiley & Sons, Inc 1998

    Google Scholar 

Download references

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

(2007). Discussions. In: Online Business Security Systems. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-68850-3_10

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-68850-3_10

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-35771-3

  • Online ISBN: 978-0-387-68850-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics