Trust and risk in Internet commerce /:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cambridge, Mass. :
MIT Press,
©2000.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Beschreibung: | 1 online resource (xiii, 279 pages) : illustrations |
Bibliographie: | Includes bibliographical references (pages 263-273) and index. |
ISBN: | 058524927X 9780585249278 9780262032711 0262032716 0262269759 9780262269759 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBU-ocm44953756 | ||
003 | OCoLC | ||
005 | 20240405112445.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 000808s2000 maua ob 001 0 eng d | ||
010 | |z 99052520 | ||
040 | |a N$T |b eng |e pn |c N$T |d OCL |d OCLCQ |d MUQ |d OCLCQ |d YDXCP |d OCLCQ |d EXW |d OCLCQ |d TUU |d OCLCQ |d TNF |d OCLCQ |d ZCU |d OCLCO |d OCLCF |d OCLCQ |d OCLCO |d VVN |d SFB |d B24X7 |d K6U |d OCLCQ |d S3O |d OCLCO |d OCLCQ |d AGLDB |d MWM |d LIV |d OCLCQ |d SAV |d OCLCQ |d ICD |d QT7 |d MNS |d LUE |d OCLCQ |d RCC |d VTS |d CEF |d OCLCQ |d INT |d TOF |d OCLCQ |d COO |d WYU |d OCLCQ |d S9I |d AU@ |d TKN |d OCLCQ |d STF |d BRX |d JZ6 |d UKSSU |d VLY |d UKAHL |d PTL |d UKEHC |d TUHNV |d OCLCO |d OCLCQ |d WGGTC |d M8D |d OCLCO |d OCLCL | ||
019 | |a 47249379 |a 243511099 |a 243511100 |a 318192679 |a 532528908 |a 649203723 |a 728018842 |a 744501135 |a 760289796 |a 961573974 |a 962720349 |a 970726864 |a 1007399425 |a 1020524476 |a 1038555213 |a 1044084357 |a 1049767777 |a 1053042636 |a 1055838664 |a 1056294053 |a 1087208710 |a 1162442854 |a 1188974171 |a 1200057869 |a 1243578144 |a 1252730842 | ||
020 | |a 058524927X |q (electronic bk.) | ||
020 | |a 9780585249278 |q (electronic bk.) | ||
020 | |a 9780262032711 |q (alk. paper) | ||
020 | |a 0262032716 |q (alk. paper) | ||
020 | |a 0262269759 | ||
020 | |a 9780262269759 | ||
020 | |z 0262032716 |q (alk. paper) | ||
035 | |a (OCoLC)44953756 |z (OCoLC)47249379 |z (OCoLC)243511099 |z (OCoLC)243511100 |z (OCoLC)318192679 |z (OCoLC)532528908 |z (OCoLC)649203723 |z (OCoLC)728018842 |z (OCoLC)744501135 |z (OCoLC)760289796 |z (OCoLC)961573974 |z (OCoLC)962720349 |z (OCoLC)970726864 |z (OCoLC)1007399425 |z (OCoLC)1020524476 |z (OCoLC)1038555213 |z (OCoLC)1044084357 |z (OCoLC)1049767777 |z (OCoLC)1053042636 |z (OCoLC)1055838664 |z (OCoLC)1056294053 |z (OCoLC)1087208710 |z (OCoLC)1162442854 |z (OCoLC)1188974171 |z (OCoLC)1200057869 |z (OCoLC)1243578144 |z (OCoLC)1252730842 | ||
050 | 4 | |a HF5548.32 |b .C355 2000eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 21 | |
049 | |a MAIN | ||
100 | 1 | |a Camp, L. Jean. | |
245 | 1 | 0 | |a Trust and risk in Internet commerce / |c L. Jean Camp. |
260 | |a Cambridge, Mass. : |b MIT Press, |c ©2000. | ||
300 | |a 1 online resource (xiii, 279 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file | ||
347 | |b PDF | ||
504 | |a Includes bibliographical references (pages 263-273) and index. | ||
505 | 0 | 0 | |t The Internet -- |t What Is the Internet? -- |t What Are Its Origins? -- |t Where Is the Internet? -- |t Who Is on the Internet? -- |t How Does the Internet Work? -- |t Layers of Protocol and Stages of a Transaction -- |t Commercial Transactions -- |t Evaluating Information On-line -- |t Pricing and Quality in Internet Commerce -- |t Convergence and the Internet -- |t Money -- |t Functions of Money -- |t Digital Information Money -- |t Money Vendors -- |t Basic Cryptography -- |t Private Key Cryptography -- |t Public Key Cryptography -- |t Hash Functions -- |t Security Goals -- |t Threats to Electronic Information Systems -- |t Confidentiality -- |t Availability -- |t Scalability -- |t Authentication -- |t Integrity -- |t Nonrepudiation -- |t Key Management Is Trust Management -- |t Symmetric Key Management -- |t Asymmetric Key Management -- |t Digital Certificates -- |t Key Length -- |t Pseudonymity and Anonymity -- |t Microdata Security -- |t Privacy Perspectives -- |t Law Enforcement: Trust Us -- |t The Business Community: Trust Me -- |t System Designers: Ignore Me -- |t Social Critics: Trust for the Common Good -- |t Europeans: Limit Trust -- |t Privacy in Law, Privacy in Practice -- |t State Law -- |t Federal Law -- |t Privacy and Information Technology -- |t Data Reporting: Trusting the Government -- |t Required Information Reporting -- |t Reporting Examples -- |t Reconsidering Requirements -- |t Cryptography Policy -- |t Disclosure Summary -- |t Transactions -- |t Reliability -- |t Scalability -- |t Divisibility -- |t Interoperability -- |t Open Systems, Standards, and Protocols -- |t Examination of Internet Commerce Systems -- |t Distinctions among Commerce Systems. |
588 | 0 | |a Print version record. | |
546 | |a English. | ||
650 | 0 | |a Electronic commerce |x Security measures. | |
650 | 0 | |a Internet |x Security measures. | |
650 | 0 | |a Business enterprises |x Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh95010367 | |
650 | 6 | |a Commerce électronique |x Sécurité |x Mesures. | |
650 | 6 | |a Internet |x Sécurité |x Mesures. | |
650 | 6 | |a Entreprises |x Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Business enterprises |x Computer networks |x Security measures |2 fast | |
650 | 7 | |a Electronic commerce |x Security measures |2 fast | |
650 | 7 | |a Internet |x Security measures |2 fast | |
650 | 7 | |a Elektronisk handel. |2 sao | |
758 | |i has work: |a Trust and risk in internet commerce (Text) |1 https://id.oclc.org/worldcat/entity/E39PCYJCqYTgHBgtvmGG8v6mgq |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Camp, L. Jean. |t Trust and risk in Internet commerce. |d Cambridge, Mass. : MIT Press, ©2000 |z 0262032716 |w (DLC) 99052520 |w (OCoLC)42680458 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBU |q FWS_PDA_EBU |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=34347 |3 Volltext |
936 | |a BATCHLOAD | ||
938 | |a Askews and Holts Library Services |b ASKH |n AH37586269 | ||
938 | |a Books 24x7 |b B247 |n bkb00000406 | ||
938 | |a EBSCOhost |b EBSC |n 34347 | ||
938 | |a YBP Library Services |b YANK |n 2316258 | ||
938 | |a YBP Library Services |b YANK |n 10837337 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBU | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBU-ocm44953756 |
---|---|
_version_ | 1804748422762201088 |
adam_text | |
any_adam_object | |
author | Camp, L. Jean |
author_facet | Camp, L. Jean |
author_role | |
author_sort | Camp, L. Jean |
author_variant | l j c lj ljc |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | H - Social Science |
callnumber-label | HF5548 |
callnumber-raw | HF5548.32 .C355 2000eb |
callnumber-search | HF5548.32 .C355 2000eb |
callnumber-sort | HF 45548.32 C355 42000EB |
callnumber-subject | HF - Commerce |
collection | ZDB-4-EBU |
contents | The Internet -- What Is the Internet? -- What Are Its Origins? -- Where Is the Internet? -- Who Is on the Internet? -- How Does the Internet Work? -- Layers of Protocol and Stages of a Transaction -- Commercial Transactions -- Evaluating Information On-line -- Pricing and Quality in Internet Commerce -- Convergence and the Internet -- Money -- Functions of Money -- Digital Information Money -- Money Vendors -- Basic Cryptography -- Private Key Cryptography -- Public Key Cryptography -- Hash Functions -- Security Goals -- Threats to Electronic Information Systems -- Confidentiality -- Availability -- Scalability -- Authentication -- Integrity -- Nonrepudiation -- Key Management Is Trust Management -- Symmetric Key Management -- Asymmetric Key Management -- Digital Certificates -- Key Length -- Pseudonymity and Anonymity -- Microdata Security -- Privacy Perspectives -- Law Enforcement: Trust Us -- The Business Community: Trust Me -- System Designers: Ignore Me -- Social Critics: Trust for the Common Good -- Europeans: Limit Trust -- Privacy in Law, Privacy in Practice -- State Law -- Federal Law -- Privacy and Information Technology -- Data Reporting: Trusting the Government -- Required Information Reporting -- Reporting Examples -- Reconsidering Requirements -- Cryptography Policy -- Disclosure Summary -- Transactions -- Reliability -- Divisibility -- Interoperability -- Open Systems, Standards, and Protocols -- Examination of Internet Commerce Systems -- Distinctions among Commerce Systems. |
ctrlnum | (OCoLC)44953756 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05681cam a2200733 a 4500</leader><controlfield tag="001">ZDB-4-EBU-ocm44953756 </controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20240405112445.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">000808s2000 maua ob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 99052520 </subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">OCL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">MUQ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">EXW</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">TUU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">TNF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">ZCU</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">VVN</subfield><subfield code="d">SFB</subfield><subfield code="d">B24X7</subfield><subfield code="d">K6U</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">S3O</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AGLDB</subfield><subfield code="d">MWM</subfield><subfield code="d">LIV</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">SAV</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">ICD</subfield><subfield code="d">QT7</subfield><subfield code="d">MNS</subfield><subfield code="d">LUE</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">RCC</subfield><subfield code="d">VTS</subfield><subfield code="d">CEF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">INT</subfield><subfield code="d">TOF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">COO</subfield><subfield code="d">WYU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">S9I</subfield><subfield code="d">AU@</subfield><subfield code="d">TKN</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">STF</subfield><subfield code="d">BRX</subfield><subfield code="d">JZ6</subfield><subfield code="d">UKSSU</subfield><subfield code="d">VLY</subfield><subfield code="d">UKAHL</subfield><subfield code="d">PTL</subfield><subfield code="d">UKEHC</subfield><subfield code="d">TUHNV</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WGGTC</subfield><subfield code="d">M8D</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">47249379</subfield><subfield code="a">243511099</subfield><subfield code="a">243511100</subfield><subfield code="a">318192679</subfield><subfield code="a">532528908</subfield><subfield code="a">649203723</subfield><subfield code="a">728018842</subfield><subfield code="a">744501135</subfield><subfield code="a">760289796</subfield><subfield code="a">961573974</subfield><subfield code="a">962720349</subfield><subfield code="a">970726864</subfield><subfield code="a">1007399425</subfield><subfield code="a">1020524476</subfield><subfield code="a">1038555213</subfield><subfield code="a">1044084357</subfield><subfield code="a">1049767777</subfield><subfield code="a">1053042636</subfield><subfield code="a">1055838664</subfield><subfield code="a">1056294053</subfield><subfield code="a">1087208710</subfield><subfield code="a">1162442854</subfield><subfield code="a">1188974171</subfield><subfield code="a">1200057869</subfield><subfield code="a">1243578144</subfield><subfield code="a">1252730842</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">058524927X</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780585249278</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780262032711</subfield><subfield code="q">(alk. paper)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0262032716</subfield><subfield code="q">(alk. paper)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0262269759</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780262269759</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">0262032716</subfield><subfield code="q">(alk. paper)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)44953756</subfield><subfield code="z">(OCoLC)47249379</subfield><subfield code="z">(OCoLC)243511099</subfield><subfield code="z">(OCoLC)243511100</subfield><subfield code="z">(OCoLC)318192679</subfield><subfield code="z">(OCoLC)532528908</subfield><subfield code="z">(OCoLC)649203723</subfield><subfield code="z">(OCoLC)728018842</subfield><subfield code="z">(OCoLC)744501135</subfield><subfield code="z">(OCoLC)760289796</subfield><subfield code="z">(OCoLC)961573974</subfield><subfield code="z">(OCoLC)962720349</subfield><subfield code="z">(OCoLC)970726864</subfield><subfield code="z">(OCoLC)1007399425</subfield><subfield code="z">(OCoLC)1020524476</subfield><subfield code="z">(OCoLC)1038555213</subfield><subfield code="z">(OCoLC)1044084357</subfield><subfield code="z">(OCoLC)1049767777</subfield><subfield code="z">(OCoLC)1053042636</subfield><subfield code="z">(OCoLC)1055838664</subfield><subfield code="z">(OCoLC)1056294053</subfield><subfield code="z">(OCoLC)1087208710</subfield><subfield code="z">(OCoLC)1162442854</subfield><subfield code="z">(OCoLC)1188974171</subfield><subfield code="z">(OCoLC)1200057869</subfield><subfield code="z">(OCoLC)1243578144</subfield><subfield code="z">(OCoLC)1252730842</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HF5548.32</subfield><subfield code="b">.C355 2000eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">21</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Camp, L. Jean.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Trust and risk in Internet commerce /</subfield><subfield code="c">L. Jean Camp.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Cambridge, Mass. :</subfield><subfield code="b">MIT Press,</subfield><subfield code="c">©2000.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xiii, 279 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="b">PDF</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (pages 263-273) and index.</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">The Internet --</subfield><subfield code="t">What Is the Internet? --</subfield><subfield code="t">What Are Its Origins? --</subfield><subfield code="t">Where Is the Internet? --</subfield><subfield code="t">Who Is on the Internet? --</subfield><subfield code="t">How Does the Internet Work? --</subfield><subfield code="t">Layers of Protocol and Stages of a Transaction --</subfield><subfield code="t">Commercial Transactions --</subfield><subfield code="t">Evaluating Information On-line --</subfield><subfield code="t">Pricing and Quality in Internet Commerce --</subfield><subfield code="t">Convergence and the Internet --</subfield><subfield code="t">Money --</subfield><subfield code="t">Functions of Money --</subfield><subfield code="t">Digital Information Money --</subfield><subfield code="t">Money Vendors --</subfield><subfield code="t">Basic Cryptography --</subfield><subfield code="t">Private Key Cryptography --</subfield><subfield code="t">Public Key Cryptography --</subfield><subfield code="t">Hash Functions --</subfield><subfield code="t">Security Goals --</subfield><subfield code="t">Threats to Electronic Information Systems --</subfield><subfield code="t">Confidentiality --</subfield><subfield code="t">Availability --</subfield><subfield code="t">Scalability --</subfield><subfield code="t">Authentication --</subfield><subfield code="t">Integrity --</subfield><subfield code="t">Nonrepudiation --</subfield><subfield code="t">Key Management Is Trust Management --</subfield><subfield code="t">Symmetric Key Management --</subfield><subfield code="t">Asymmetric Key Management --</subfield><subfield code="t">Digital Certificates --</subfield><subfield code="t">Key Length --</subfield><subfield code="t">Pseudonymity and Anonymity --</subfield><subfield code="t">Microdata Security --</subfield><subfield code="t">Privacy Perspectives --</subfield><subfield code="t">Law Enforcement: Trust Us --</subfield><subfield code="t">The Business Community: Trust Me --</subfield><subfield code="t">System Designers: Ignore Me --</subfield><subfield code="t">Social Critics: Trust for the Common Good --</subfield><subfield code="t">Europeans: Limit Trust --</subfield><subfield code="t">Privacy in Law, Privacy in Practice --</subfield><subfield code="t">State Law --</subfield><subfield code="t">Federal Law --</subfield><subfield code="t">Privacy and Information Technology --</subfield><subfield code="t">Data Reporting: Trusting the Government --</subfield><subfield code="t">Required Information Reporting --</subfield><subfield code="t">Reporting Examples --</subfield><subfield code="t">Reconsidering Requirements --</subfield><subfield code="t">Cryptography Policy --</subfield><subfield code="t">Disclosure Summary --</subfield><subfield code="t">Transactions --</subfield><subfield code="t">Reliability --</subfield><subfield code="t">Scalability --</subfield><subfield code="t">Divisibility --</subfield><subfield code="t">Interoperability --</subfield><subfield code="t">Open Systems, Standards, and Protocols --</subfield><subfield code="t">Examination of Internet Commerce Systems --</subfield><subfield code="t">Distinctions among Commerce Systems.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic commerce</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh95010367</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Commerce électronique</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Internet</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Entreprises</subfield><subfield code="x">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Electronic commerce</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Elektronisk handel.</subfield><subfield code="2">sao</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Trust and risk in internet commerce (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCYJCqYTgHBgtvmGG8v6mgq</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Camp, L. Jean.</subfield><subfield code="t">Trust and risk in Internet commerce.</subfield><subfield code="d">Cambridge, Mass. : MIT Press, ©2000</subfield><subfield code="z">0262032716</subfield><subfield code="w">(DLC) 99052520</subfield><subfield code="w">(OCoLC)42680458</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBU</subfield><subfield code="q">FWS_PDA_EBU</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=34347</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="936" ind1=" " ind2=" "><subfield code="a">BATCHLOAD</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH37586269</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Books 24x7</subfield><subfield code="b">B247</subfield><subfield code="n">bkb00000406</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">34347</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2316258</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">10837337</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBU</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBU-ocm44953756 |
illustrated | Illustrated |
indexdate | 2024-07-16T15:03:37Z |
institution | BVB |
isbn | 058524927X 9780585249278 9780262032711 0262032716 0262269759 9780262269759 |
language | English |
oclc_num | 44953756 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xiii, 279 pages) : illustrations |
psigel | ZDB-4-EBU |
publishDate | 2000 |
publishDateSearch | 2000 |
publishDateSort | 2000 |
publisher | MIT Press, |
record_format | marc |
spelling | Camp, L. Jean. Trust and risk in Internet commerce / L. Jean Camp. Cambridge, Mass. : MIT Press, ©2000. 1 online resource (xiii, 279 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier text file Includes bibliographical references (pages 263-273) and index. The Internet -- What Is the Internet? -- What Are Its Origins? -- Where Is the Internet? -- Who Is on the Internet? -- How Does the Internet Work? -- Layers of Protocol and Stages of a Transaction -- Commercial Transactions -- Evaluating Information On-line -- Pricing and Quality in Internet Commerce -- Convergence and the Internet -- Money -- Functions of Money -- Digital Information Money -- Money Vendors -- Basic Cryptography -- Private Key Cryptography -- Public Key Cryptography -- Hash Functions -- Security Goals -- Threats to Electronic Information Systems -- Confidentiality -- Availability -- Scalability -- Authentication -- Integrity -- Nonrepudiation -- Key Management Is Trust Management -- Symmetric Key Management -- Asymmetric Key Management -- Digital Certificates -- Key Length -- Pseudonymity and Anonymity -- Microdata Security -- Privacy Perspectives -- Law Enforcement: Trust Us -- The Business Community: Trust Me -- System Designers: Ignore Me -- Social Critics: Trust for the Common Good -- Europeans: Limit Trust -- Privacy in Law, Privacy in Practice -- State Law -- Federal Law -- Privacy and Information Technology -- Data Reporting: Trusting the Government -- Required Information Reporting -- Reporting Examples -- Reconsidering Requirements -- Cryptography Policy -- Disclosure Summary -- Transactions -- Reliability -- Scalability -- Divisibility -- Interoperability -- Open Systems, Standards, and Protocols -- Examination of Internet Commerce Systems -- Distinctions among Commerce Systems. Print version record. English. Electronic commerce Security measures. Internet Security measures. Business enterprises Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh95010367 Commerce électronique Sécurité Mesures. Internet Sécurité Mesures. Entreprises Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Business enterprises Computer networks Security measures fast Electronic commerce Security measures fast Internet Security measures fast Elektronisk handel. sao has work: Trust and risk in internet commerce (Text) https://id.oclc.org/worldcat/entity/E39PCYJCqYTgHBgtvmGG8v6mgq https://id.oclc.org/worldcat/ontology/hasWork Print version: Camp, L. Jean. Trust and risk in Internet commerce. Cambridge, Mass. : MIT Press, ©2000 0262032716 (DLC) 99052520 (OCoLC)42680458 FWS01 ZDB-4-EBU FWS_PDA_EBU https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=34347 Volltext |
spellingShingle | Camp, L. Jean Trust and risk in Internet commerce / The Internet -- What Is the Internet? -- What Are Its Origins? -- Where Is the Internet? -- Who Is on the Internet? -- How Does the Internet Work? -- Layers of Protocol and Stages of a Transaction -- Commercial Transactions -- Evaluating Information On-line -- Pricing and Quality in Internet Commerce -- Convergence and the Internet -- Money -- Functions of Money -- Digital Information Money -- Money Vendors -- Basic Cryptography -- Private Key Cryptography -- Public Key Cryptography -- Hash Functions -- Security Goals -- Threats to Electronic Information Systems -- Confidentiality -- Availability -- Scalability -- Authentication -- Integrity -- Nonrepudiation -- Key Management Is Trust Management -- Symmetric Key Management -- Asymmetric Key Management -- Digital Certificates -- Key Length -- Pseudonymity and Anonymity -- Microdata Security -- Privacy Perspectives -- Law Enforcement: Trust Us -- The Business Community: Trust Me -- System Designers: Ignore Me -- Social Critics: Trust for the Common Good -- Europeans: Limit Trust -- Privacy in Law, Privacy in Practice -- State Law -- Federal Law -- Privacy and Information Technology -- Data Reporting: Trusting the Government -- Required Information Reporting -- Reporting Examples -- Reconsidering Requirements -- Cryptography Policy -- Disclosure Summary -- Transactions -- Reliability -- Divisibility -- Interoperability -- Open Systems, Standards, and Protocols -- Examination of Internet Commerce Systems -- Distinctions among Commerce Systems. Electronic commerce Security measures. Internet Security measures. Business enterprises Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh95010367 Commerce électronique Sécurité Mesures. Internet Sécurité Mesures. Entreprises Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Business enterprises Computer networks Security measures fast Electronic commerce Security measures fast Internet Security measures fast Elektronisk handel. sao |
subject_GND | http://id.loc.gov/authorities/subjects/sh95010367 |
title | Trust and risk in Internet commerce / |
title_alt | The Internet -- What Is the Internet? -- What Are Its Origins? -- Where Is the Internet? -- Who Is on the Internet? -- How Does the Internet Work? -- Layers of Protocol and Stages of a Transaction -- Commercial Transactions -- Evaluating Information On-line -- Pricing and Quality in Internet Commerce -- Convergence and the Internet -- Money -- Functions of Money -- Digital Information Money -- Money Vendors -- Basic Cryptography -- Private Key Cryptography -- Public Key Cryptography -- Hash Functions -- Security Goals -- Threats to Electronic Information Systems -- Confidentiality -- Availability -- Scalability -- Authentication -- Integrity -- Nonrepudiation -- Key Management Is Trust Management -- Symmetric Key Management -- Asymmetric Key Management -- Digital Certificates -- Key Length -- Pseudonymity and Anonymity -- Microdata Security -- Privacy Perspectives -- Law Enforcement: Trust Us -- The Business Community: Trust Me -- System Designers: Ignore Me -- Social Critics: Trust for the Common Good -- Europeans: Limit Trust -- Privacy in Law, Privacy in Practice -- State Law -- Federal Law -- Privacy and Information Technology -- Data Reporting: Trusting the Government -- Required Information Reporting -- Reporting Examples -- Reconsidering Requirements -- Cryptography Policy -- Disclosure Summary -- Transactions -- Reliability -- Divisibility -- Interoperability -- Open Systems, Standards, and Protocols -- Examination of Internet Commerce Systems -- Distinctions among Commerce Systems. |
title_auth | Trust and risk in Internet commerce / |
title_exact_search | Trust and risk in Internet commerce / |
title_full | Trust and risk in Internet commerce / L. Jean Camp. |
title_fullStr | Trust and risk in Internet commerce / L. Jean Camp. |
title_full_unstemmed | Trust and risk in Internet commerce / L. Jean Camp. |
title_short | Trust and risk in Internet commerce / |
title_sort | trust and risk in internet commerce |
topic | Electronic commerce Security measures. Internet Security measures. Business enterprises Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh95010367 Commerce électronique Sécurité Mesures. Internet Sécurité Mesures. Entreprises Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Business enterprises Computer networks Security measures fast Electronic commerce Security measures fast Internet Security measures fast Elektronisk handel. sao |
topic_facet | Electronic commerce Security measures. Internet Security measures. Business enterprises Computer networks Security measures. Commerce électronique Sécurité Mesures. Internet Sécurité Mesures. Entreprises Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Business enterprises Computer networks Security measures Electronic commerce Security measures Internet Security measures Elektronisk handel. |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=34347 |
work_keys_str_mv | AT campljean trustandriskininternetcommerce |