Works matching DE "ELECTRONIC commerce security measures"
1
- Globus - An International Journal of Management & IT, 2025, v. 16, n. 2, p. 5, doi. 10.46360/globus.mgt.120251002
- Wu LingXiao;
- Ali, Dhakir Abbas
- Article
2
- Education Journal, 2014, n. 220, p. 6
- Article
3
- Hume Papers on Public Policy, 1999, v. 7, n. 4, p. 57
- Article
4
- Metallurgical & Mining Industry, 2015, n. 8, p. 129
- Article
5
- Social Behavior & Personality: an international journal, 2015, v. 43, n. 5, p. 729, doi. 10.2224/sbp.2015.43.5.729
- SEUNGSIN LEE;
- YOUNGHEE LEE;
- JOING-IN LEE;
- JUNGKUN PARK
- Article
6
- International Journal of Intelligent Information Technology Application, 2009, v. 2, n. 4, p. 177
- Article
8
- Surveillance & Society, 2012, v. 10, n. 3/4, p. 351, doi. 10.24908/ss.v10i3/4.4530
- Margulis, Stephen T.;
- Marx, Gary T.
- Article
9
- Business & Society Review (00453609), 2001, v. 106, n. 2, p. 161, doi. 10.1111/0045-3609.00108
- Article
10
- South African Journal of Business Management, 2014, v. 45, n. 4, p. 21, doi. 10.4102/sajbm.v45i4.138
- Article
11
- Journal of Management Information Systems, 2008, v. 25, n. 1, p. 49, doi. 10.2753/MIS0742-1222250103
- Abbasi, Ahmed;
- Hsinchun Chen;
- Nunamaker Jr., Jay F.
- Article
12
- Informatica Economica, 2009, v. 13, n. 1, p. 137
- Article
13
- Journal of Organizational Computing & Electronic Commerce, 2000, v. 10, n. 4, p. 295, doi. 10.1207/S15327744JOCE1004_07
- Cho, Sungzoon;
- Han, Chigeun;
- Han, Dae Hee;
- Kim, Hyung-Il
- Article
14
- Strategic Finance, 2008, v. 89, n. 11, p. 42
- Article
15
- Electronic Commerce Research, 2017, v. 17, n. 2, p. 185, doi. 10.1007/s10660-015-9187-2
- Walsh, Diana;
- Parisi, James;
- Passerini, Katia
- Article
16
- Scientific Annals of the 'Alexandru Ioan Cuza' University of Iasi: Economic Sciences Series, 2012, v. 59, n. 1, p. 353, doi. 10.2478/v10316-012-0024-7
- Article
17
- International Journal of Distributed Sensor Networks, 2009, v. 5, n. 1, p. 39, doi. 10.1080/15501320802533467
- Liang, Wang;
- Yajun, Guo;
- Mei, Qi
- Article
18
- Revista de Gestão da Tecnologia e Sistemas de Informação / Journal of Information Systems & Technology Management, 2015, v. 12, n. 1, p. 107, doi. 10.4301/S1807-17752015000100006
- Gonetecki Oliveira, Maximiliano;
- Machado Toaldo, Ana Maria
- Article
19
- International Review on Computers & Software, 2010, v. 5, n. 5, p. 575
- Article
20
- Journal of Education for Business, 2012, v. 87, n. 3, p. 136, doi. 10.1080/08832323.2011.582191
- Zhao, JensenJ.;
- Zhao, SherryY.
- Article
21
- Journal of Defense Resources Management, 2016, v. 7, n. 1, p. 129
- SCHEAU, Mircea Constantin;
- ARSENE, Adrian-Liviu;
- DINCA, Gerald
- Article
22
- Security & Communication Networks, 2011, v. 4, n. 8, p. 902, doi. 10.1002/sec.221
- Hu, J.;
- Hoang, X. D.;
- Khalil, I.
- Article
23
- Multimedia Tools & Applications, 2018, v. 77, n. 2, p. 1525, doi. 10.1007/s11042-017-4377-7
- Wu, Hsiao-Ling;
- Chang, Chin-Chen
- Article
24
- Journal of Electronic Commerce Research, 2006, v. 7, n. 3, p. 154
- Bamasak, Omaima;
- Zhang, Ning
- Article
25
- IT Professional, 2007, v. 9, n. 2, p. 22, doi. 10.1109/MITP.2007.41
- Article
26
- International Journal of Electronic Commerce, 2001, v. 6, n. 2, p. 139, doi. 10.1080/10864415.2001.11044238
- Wang, Wenli;
- Hidvégi, Zoltan;
- Whinston, Andrew B.
- Article
27
- Journal of Organizational & End User Computing, 2014, v. 26, n. 3, p. 65, doi. 10.4018/joeuc.2014070104
- Lin Jia;
- Cegielski, Casey;
- Qinsheng Zhang
- Article
28
- EMedia Magazine, 2000, v. 13, n. 9, p. 37
- Boeri, Robert J.;
- Hensel, Martin
- Article
29
- Wireless Personal Communications, 2014, v. 77, n. 4, p. 2981, doi. 10.1007/s11277-014-1680-8
- Chang, Ching-Chun;
- Sun, Chin-Yu
- Article
30
- e-Service Journal, 2003, v. 2, n. 2, p. 25, doi. 10.2979/ESJ.2003.2.2.25
- Ruppel, Cynthia;
- Underwood-Queen, Linda;
- Harrington, Susan J.
- Article
31
- CPA Journal, 2002, v. 72, n. 1, p. 60
- Tribunella, Thomas;
- Colson, Robert H.
- Article
32
- CPA Journal, 1997, v. 67, n. 11, p. 9
- Article
33
- International Journal of Advanced Research in Computer Science, 2012, v. 3, n. 3, p. 816
- Dhok, Shailesh S.;
- Bamnote, G. R.
- Article
34
- IIE Solutions, 2000, v. 32, n. 11, p. 13
- Article
35
- International Journal of Information Security, 2009, v. 8, n. 2, p. 77, doi. 10.1007/s10207-008-0065-y
- Elmufti, Kalid;
- Weerasinghe, Dasun;
- Rajarajan, M.;
- Rakocevic, Veselin;
- Khan, Sanowar;
- MacDonald, John
- Article
36
- International Journal of Information Security, 2008, v. 7, n. 6, p. 383, doi. 10.1007/s10207-008-0056-z
- Imamoto, Kenji;
- Zhou, Jianying;
- Sakurai, Kouichi
- Article
37
- International Journal of Information Security, 2007, v. 6, n. 5, p. 285, doi. 10.1007/s10207-007-0036-8
- Knight, Scott;
- Buffett, Scott;
- Hung, Patrick
- Article
38
- CLEAR International Journal of Research in Commerce & Management, 2016, v. 7, n. 6, p. 47
- Article
39
- CLEAR International Journal of Research in Commerce & Management, 2016, v. 7, n. 2, p. 91
- Article
40
- American Business Law Journal, 1999, v. 36, n. 3, p. 479, doi. 10.1111/j.1744-1714.1999.tb01022.x
- Pacini, Carl;
- Sinason, David
- Article
41
- Journal of Decision Systems, 2017, v. 26, n. 3, p. 256, doi. 10.1080/12460125.2017.1351861
- Article
42
- International Journal of Electronic Business Management, 2009, v. 7, n. 3, p. 151
- Velmurugan, Manivannan Senthil
- Article
43
- IEEE Internet Computing, 2009, v. 13, n. 6, p. 4, doi. 10.1109/MIC.2009.134
- Article
44
- Journal of the Missouri Bar, 2017, v. 73, n. 1, p. 32
- Article
45
- Journal of Theoretical & Applied Electronic Commerce Research, 2017, v. 12, n. 1, p. 42, doi. 10.4067/S0718-18762017000100004
- Article
46
- Critical Discourse Studies, 2007, v. 4, n. 3, p. 311, doi. 10.1080/17405900701656908
- Article
47
- e-BANGI Journal, 2019, v. 16, n. 3, p. 1
- Ngian Ek Tee;
- Wong Poh Ming, Winnie
- Article
48
- Peer-to-Peer Networking & Applications, 2017, v. 10, n. 2, p. 368, doi. 10.1007/s12083-016-0443-6
- Fan, Kai;
- Ge, Nan;
- Gong, Yuanyuan;
- Li, Hui;
- Su, Ruidan;
- Yang, Yintang
- Article
49
- Journal of Payments Strategy & Systems, 2018, v. 12, n. 1, p. 58, doi. 10.69554/kgoa5180
- Article
50
- Journal of Payments Strategy & Systems, 2017, p. 42, doi. 10.69554/neoy8371
- Article