Online Business is driven by different systems. The systems consist of commercial activities, legal frameworks, security technologies, information system standards and policies as well as risk management models for assessing and determining strategies for security risk assessment and mitigation.


Session Initiation Protocol Security Risk Security Technology Address Resolution Protocol Online Business 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Bibliography and References

  1. (A consice introduction). Westview Press. 107,2000. 2004. A new approach for assessing the maturity of information security Accessed (06/08/04).Google Scholar
  2. Adshead A (2001) Lloyd’s to save £4m with VoIP network, NetworkGoogle Scholar
  3. Althos (2001) Publishing Inc., ISBN: 0-9742787-7-7. and Voice compression, 2001.Google Scholar
  4. Arreymbi J, Williams (2006) EEMA presentation on Cybertribes, 16th May, Green Park Reading UK.Google Scholar
  5. Atkinson Ashley Atkinson, Magazine Director, Keycom.Google Scholar
  6. Bregman (2001) Bregman David, Reality check on VoIP (Internet Buchman DH (1994) Risk Analysis - some practical suggestionsGoogle Scholar
  7. Bussgang J.J and Spar D (1996) Harvard Business Review. Means of Exchange and Security enforcement. Pg. 129-131, 131-132Google Scholar
  8. Chapman & Ward (1997) Project Risk Management. Wiley: Chichester. Chartrand, Mark R (2004) Satellite Communication for the non-specialistGoogle Scholar
  9. Chen T (2004) “Intrusion detection for viruses and worms,” in IEC Annual Review of Communications, vol. 57.Google Scholar
  10. Cisco (2000) Cisco Systems Inc., VoIP Today, 2000.CiscoPressGoogle Scholar
  11. Collins (2001) Daniel Collins “Carrier Grade Voice Over IP”Google Scholar
  12. Databeam (2004) A Primer on the H.323 Series Standard version 2Google Scholar
  13. Davidson (2000) J Davidson, J Peters “Voice over IP fundamentals”Google Scholar
  14. Dean Tamara (2003) Guide to Telecommunication Technology Deception, FraudGoogle Scholar
  15. Deremiak EL and Boreman GD (1996) Infrared Detectors and SystemsGoogle Scholar
  16. Dixon M, Robert McCorquodate. Cases and Materials on international law, Blackstone Press Limited. 306, 138, 276Google Scholar
  17. Electro-technical conference, MELECON, V1, P250 - 254. February 2003, P304 - 310.Google Scholar
  18. Ferrie P and Perriot F (2004), Virus Analysis 2, Symantec Security for Internet Telephony, 2000.Google Scholar
  19. Glasson B, Doug Vogel, Peter Bots and Jay Nunmaker.Google Scholar
  20. Glenn et al (1999) Wireless Information Technology for the 21st Century group. Missouri research and education networkGoogle Scholar
  21. Gu X, Dodds SJ (2006) Open Source Publication on Communication Networks and electornic Security. Journal for ICT security synergy in advanced and developing economies Volume 1Google Scholar
  22. Halsall (2001) Fred Halsall “Multimedia Communications” PearsonGoogle Scholar
  23. Handley et al (2000) SIP: Session Initiation Protocol IETF, Ineternet draft, Harrison G (2004) Videonetworks Network Design, 23rd march, 2004. Harte L (2003) Introduction to IP Telephony. Copyright 2003Google Scholar
  24. Hignera & Haines (1996), Software Risk Management. Technical Report, Software Engineering Institute, Pittsburgh, PA, USAGoogle Scholar
  25. IBM(2004) Global security KIT, SSL introduction and ikeyman user’s improvement of VoIP applications. Proceedings of the Mediterranean Information Systems and technology in the international office of the future. Chapman & Hall. 30, 31, 34Google Scholar
  26. James M (2004) Voice over IP (How IT works), Computer ShopperGoogle Scholar
  27. Jones R (1997). Business and Technology Journal. Net can’t catch Cyber criminals JournalGoogle Scholar
  28. Keen P, Mackintosh R (2001)The Freedom Economy. Gaining the M-commerce Edge in the Era of the Wireless InternetGoogle Scholar
  29. Koistinen T (1998) IP Telephony. Nokia CommunicationsGoogle Scholar
  30. Kos, Klepec, Tomaziac (2002) “Techniques for PerformanceGoogle Scholar
  31. Krishnamoorthy V (2001) “The Importance of QoS in BroadbandGoogle Scholar
  32. Lee W, Mcknight, Lehr W, Clark D (2001) “Internet Telephony” CopyrightGoogle Scholar
  33. Levi W (2004) Contemporary international lawGoogle Scholar
  34. magazine, November 2004, P4.Google Scholar
  35. Mehta P, Udani S (2001) Overview of Voice over IP Technical report Minoli D, Minoli E (1998) “Delivery Voice over IP Networks” Mirecki F (2002) VoIP Unified Messaging, Technology seminarGoogle Scholar
  36. Morgan EB (2004) A white Paper on Voice Over IP Packet, MS-CIS-01-31.Google Scholar
  37. Musaj (2006) A holistic definition of IT SecurityGoogle Scholar
  38. Information Systems Control (ISACA) Journal volume 3Google Scholar
  39. Networks and Electronic Security. Journal for ICT Security. networks at risk, Network News News, 13 December 2001Google Scholar
  40. NIST (2002) 27 March, technology administration US department NIST lab of commerceGoogle Scholar
  41. Oni (2001) “The Guide to IP Telephony” ONI(2001).Google Scholar
  42. Onwubiko C (2006) Open Source publication on Communication Networks and Electronic Security Volume 1- Journal for ICT security synergy in advanced and developing economiesGoogle Scholar
  43. Oslon D (2002) Voice over IP: Technical issues, Strategic technology P20.Google Scholar
  44. Project Management Institute (1996) A Guide To Project ManagementGoogle Scholar
  45. Body Of Knowledge (PMBOK), Project Institute, Newton Square, PA, USAGoogle Scholar
  46. Protocol (2004) Protocols, Technical Paper on ProtocolsGoogle Scholar
  47. Reitter, Jorg Reitter(2004) “Net Telephony For All” Linux Magazine, Response, USAGoogle Scholar
  48. Richardson J (2004) Technical Extracts, Keycom.Google Scholar
  49. Robinson NE (2005) Using GIS Tool to assess the vulnerability of the internet. Securing Electronic Business Processes, ViewegGoogle Scholar
  50. Rogers G (2001) Rogers Gary, A Gateway from old to the New, SonusGoogle Scholar
  51. Rogerson S (1997) Institute for the management of information systems (IMIS) journal. ETHIcol. march 1997. 21Google Scholar
  52. Saleh Alaboodi Saad (2006) Information Systems Control (ISACA) Journal Volume 3.Google Scholar
  53. Schulzrinne H, Rosenberg J (2000) A comparison of SIP and H323Google Scholar
  54. Singleton TW (2006) COBIT - A Key to success as an ICT auditor, Information Systems Control JournalGoogle Scholar
  55. Shaneck M. An Overview of Buffer Overflow Vulnerabilities and Internet Smart Nigel (2003) Cryptography: An introduction. McGraw-Hill Smith K, Brushteyn D (2004) A Paper on Internet Telephony Stallings W(2003) Network Security Essentials. Pearson Steven J et al (1997) JAVA security model, Sun Micro Systems 1996/97Google Scholar
  56. Symantec (2004) Internet Security Threat Report, Trends for January 1, 2004 - June 30, 2004, Symantec, Volume VIGoogle Scholar
  57. Telogy Networks. accessed (06/08/04).
  58. Vittore V (2003) Making the case for IP Telephony, Telephony, v244, n4,Google Scholar
  59. Williams (1995) A classified bibliography of recent research relating to project risk management European Journal Of Operational research 85: 18-38.Google Scholar
  60. Williams G (2003/4) Synchronizing E-Security Kluwer Academic Publishers, Woabank (2000) Research Paper, Butler Group (Research and Wong H, C, Sycara K (1999) “Adding security and trust to Multi-AgentGoogle Scholar

Additional Bibliography

  1. 1.
    Alberts, Christopher J; Belmens, Sandra G; Rethia, Richard D, & Wilson, William R. Operationally Critical Threat, Asset, and Vulnerability Evalua-tion (OCTAVE) Framework version 1.0 (CMU/SE 1-99-JR-017), Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, June 1999.Google Scholar
  2. 2.
    National Security Telecommunications and Information Systems Security Committee. Index of National Security Telecommunications Information Systems Security issuances (NSTSS1 No. 4014) Ft. Mead, MD: NSTISSC secretariat Jan. 1998Google Scholar
  3. 3.
    Howard, John D & Longstaff, Thomas A. A common language for computer security incidents (SAND 98 -8667). Albuquerque, NM: Sandia National Laboratories 1998Google Scholar
  4. 4.
    Hatt, Aurthur E; Bosworth, Seymour; Hoyt Douglas B. Computer Secu-rity Handbook, 3rd Edition. New York, NY: John Wiley & Sons, Inc 1995Google Scholar
  5. 5.
    Parker, Donn B. Fighting Computer Crime. New York, NY: John Wiley & Sons, Inc 1998Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2007

Personalised recommendations