Found: 45
Select item for more details and to access through your institution.
PERCEIVED TECHNOLOGY TRUST AMONG BUSINESS OWNERS: A STUDY OF E-BUSINESS ADOPTION IN SARAWAK'S SMES.
- Published in:
- e-BANGI Journal, 2019, v. 16, n. 3, p. 1
- By:
- Publication type:
- Article
E-commerce: A merchant's perspective on innovative solutions in payments.
- Published in:
- Journal of Payments Strategy & Systems, 2018, v. 12, n. 1, p. 58
- By:
- Publication type:
- Article
Attacks on 'a provably secure and efficient authentication scheme for access control in mobile pay-TV systems'.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 2, p. 1525, doi. 10.1007/s11042-017-4377-7
- By:
- Publication type:
- Article
Privacy as a right or as a commodity in the online world: the limits of regulatory reform and self-regulation.
- Published in:
- Electronic Commerce Research, 2017, v. 17, n. 2, p. 185, doi. 10.1007/s10660-015-9187-2
- By:
- Publication type:
- Article
Digitalisation: Shaping the retail payment markets while posing new challenges to authorities.
- Published in:
- Journal of Payments Strategy & Systems, 2017, p. 42
- By:
- Publication type:
- Article
An ultra-lightweight RFID authentication scheme for mobile commerce.
- Published in:
- Peer-to-Peer Networking & Applications, 2017, v. 10, n. 2, p. 368, doi. 10.1007/s12083-016-0443-6
- By:
- Publication type:
- Article
NEW YEAR'S RESOLUTION: IMPROVE YOUR PASSWORDS.
- Published in:
- Journal of the Missouri Bar, 2017, v. 73, n. 1, p. 32
- By:
- Publication type:
- Article
Security of Smart Banking Applications in Slovakia.
- Published in:
- Journal of Theoretical & Applied Electronic Commerce Research, 2017, v. 12, n. 1, p. 42, doi. 10.4067/S0718-18762017000100004
- By:
- Publication type:
- Article
INTERNET SHOPPING: FACTORS INFLUENCING STUDENTS BUYING INTENTION ONLINE.
- Published in:
- CLEAR International Journal of Research in Commerce & Management, 2016, v. 7, n. 6, p. 47
- By:
- Publication type:
- Article
PHISHING AND E-COMMERCE: AN INFORMATION SECURITY MANAGEMENT PROBLEM.
- Published in:
- Journal of Defense Resources Management, 2016, v. 7, n. 1, p. 129
- By:
- Publication type:
- Article
E-COMMERCE: TRANSACTION SECURITY ISSUE AND CHALLENGES.
- Published in:
- CLEAR International Journal of Research in Commerce & Management, 2016, v. 7, n. 2, p. 91
- By:
- Publication type:
- Article
Analysis of Perceived Security in B2C Electronic Commerce Website.
- Published in:
- Metallurgical & Mining Industry, 2015, n. 8, p. 129
- By:
- Publication type:
- Article
PERSONALIZED E-SERVICES: CONSUMER PRIVACY CONCERN AND INFORMATION SHARING.
- Published in:
- Social Behavior & Personality: an international journal, 2015, v. 43, n. 5, p. 729, doi. 10.2224/sbp.2015.43.5.729
- By:
- Publication type:
- Article
NEW TIMES, NEW STRATEGIES: PROPOSAL FOR AN ADDITIONAL DIMENSION TO THE 4 P'S FOR E-COMMERCE DOT-COM.
- Published in:
- Revista de Gestão da Tecnologia e Sistemas de Informação / Journal of Information Systems & Technology Management, 2015, v. 12, n. 1, p. 107, doi. 10.4301/S1807-17752015000100006
- By:
- Publication type:
- Article
Cyber skills for a vibrant and secure UK.
- Published in:
- Education Journal, 2014, n. 220, p. 6
- Publication type:
- Article
Towards online security: Key drivers of poor user behaviour and recommendations for appropriate interventions.
- Published in:
- South African Journal of Business Management, 2014, v. 45, n. 4, p. 21, doi. 10.4102/sajbm.v45i4.138
- By:
- Publication type:
- Article
A Secure and Efficient Authentication Scheme for E-coupon Systems.
- Published in:
- Wireless Personal Communications, 2014, v. 77, n. 4, p. 2981, doi. 10.1007/s11277-014-1680-8
- By:
- Publication type:
- Article
The Effect of Trust on Customers' Online Repurchase Intention in Consumer-to-Consumer Electronic Commerce.
- Published in:
- Journal of Organizational & End User Computing, 2014, v. 26, n. 3, p. 65, doi. 10.4018/joeuc.2014070104
- By:
- Publication type:
- Article
Caveat Emptor: A Perspective on Consumer Privacy Online.
- Published in:
- Surveillance & Society, 2012, v. 10, n. 3/4, p. 351, doi. 10.24908/ss.v10i3/4.4530
- By:
- Publication type:
- Article
Credit Card Fraud Detection Using Hidden Markov Model.
- Published in:
- International Journal of Advanced Research in Computer Science, 2012, v. 3, n. 3, p. 816
- By:
- Publication type:
- Article
THE SECURITY AND PRIVACY ISSUES AS ONE OF THE BARRIERS IMPEDING THE E-BUSINESS DEVELOPMENT IN ALBANIA.
- Published in:
- Scientific Annals of the 'Alexandru Ioan Cuza' University of Iasi: Economic Sciences Series, 2012, v. 59, n. 1, p. 353, doi. 10.2478/v10316-012-0024-7
- By:
- Publication type:
- Article
An embedded DSP hardware encryption module for secure e-commerce transactions.
- Published in:
- Security & Communication Networks, 2011, v. 4, n. 8, p. 902, doi. 10.1002/sec.221
- By:
- Publication type:
- Article
Security Issues in E-Commerce: an Overview.
- Published in:
- International Review on Computers & Software, 2010, v. 5, n. 5, p. 575
- By:
- Publication type:
- Article
Phone + Internet Café = Secure Banking? You Betcha.
- Published in:
- IEEE Internet Computing, 2009, v. 13, n. 6, p. 4, doi. 10.1109/MIC.2009.134
- By:
- Publication type:
- Article
SECURITY AND TRUST IN E-BUSINESS: PROBLEMS AND PROSPECTS.
- Published in:
- International Journal of Electronic Business Management, 2009, v. 7, n. 3, p. 151
- By:
- Publication type:
- Article
Undercover Purchases on eBay and Craigslist Reveal a Market for Sensitive and Stolen United States Military Items.
- Published in:
- 2009
- By:
- Publication type:
- Excerpt
Application of PCFA in Analyzing Network Security Events Influencing E- Commerce Development.
- Published in:
- International Journal of Intelligent Information Technology Application, 2009, v. 2, n. 4, p. 177
- By:
- Publication type:
- Article
Mobile Web services authentication using SAML and 3GPP generic bootstrapping architecture.
- Published in:
- International Journal of Information Security, 2009, v. 8, n. 2, p. 77, doi. 10.1007/s10207-008-0065-y
- By:
- Publication type:
- Article
E-Business Security Architectures.
- Published in:
- Informatica Economica, 2009, v. 13, n. 1, p. 137
- By:
- Publication type:
- Article
A Reputation-Based Trust Evaluation Model for P2P E-Commerce.
- Published in:
- International Journal of Distributed Sensor Networks, 2009, v. 5, n. 1, p. 39, doi. 10.1080/15501320802533467
- By:
- Publication type:
- Article
Achieving evenhandedness in certified email system for contract signing.
- Published in:
- International Journal of Information Security, 2008, v. 7, n. 6, p. 383, doi. 10.1007/s10207-008-0056-z
- By:
- Publication type:
- Article
Net support.
- Published in:
- OECD Observer, 2008, n. 268, p. 8
- Publication type:
- Article
Online identity theft.
- Published in:
- OECD Observer, 2008, n. 268, p. 12
- By:
- Publication type:
- Article
How Strong Are Your Passwords?
- Published in:
- Strategic Finance, 2008, v. 89, n. 11, p. 42
- By:
- Publication type:
- Article
The International Journal of Information Security Special Issue on privacy, security and trust technologies and E-business services.
- Published in:
- International Journal of Information Security, 2007, v. 6, n. 5, p. 285, doi. 10.1007/s10207-007-0036-8
- By:
- Publication type:
- Article
The Role of SSL in Cybersecurity.
- Published in:
- IT Professional, 2007, v. 9, n. 2, p. 22, doi. 10.1109/MITP.2007.41
- By:
- Publication type:
- Article
A DISTRIBUTED REPUTATION MANAGEMENT SCHEME FOR MOBILE AGENT-BASED APPLICATIONS.
- Published in:
- Journal of Electronic Commerce Research, 2006, v. 7, n. 3, p. 154
- By:
- Publication type:
- Article
e-Commerce.
- Published in:
- e-Service Journal, 2003, v. 2, n. 2, p. 25, doi. 10.2979/ESJ.2003.2.2.25
- By:
- Publication type:
- Article
TWENTY QUESTIONS ON E-COMMERCE SECURITY.
- Published in:
- CPA Journal, 2002, v. 72, n. 1, p. 60
- By:
- Publication type:
- Article
The Federal Commission and Electronic Commerce Security Policy: A Viable Solution?
- Published in:
- Business & Society Review (00453609), 2001, v. 106, n. 2, p. 161, doi. 10.1111/0045-3609.00108
- By:
- Publication type:
- Article
E-business alarmist.
- Published in:
- IIE Solutions, 2000, v. 32, n. 11, p. 13
- Publication type:
- Article
ecommerce dilemma: CONTROLLING what you SELL.
- Published in:
- EMedia Magazine, 2000, v. 13, n. 9, p. 37
- By:
- Publication type:
- Article
4 Security, Cryptography and Electronic Commerce.
- Published in:
- Hume Papers on Public Policy, 1999, v. 7, n. 4, p. 57
- Publication type:
- Article
Auditor Liability for Electronic Commerce Transaction Assurance: The CPA/CA Webtrust.
- Published in:
- American Business Law Journal, 1999, v. 36, n. 3, p. 479, doi. 10.1111/j.1744-1714.1999.tb01022.x
- By:
- Publication type:
- Article
AICPA/CICA unveil new assurance service.
- Published in:
- CPA Journal, 1997, v. 67, n. 11, p. 9
- Publication type:
- Article