E-commerce security: advice from experts
From a distance, the concept of e-commerce security seems simple. Just allow authorized people to transact business securely and efficiently through the Internet, and keep unauthorized people away from valuable information. But in today's impersonal and global economy, how can a business or org...
Gespeichert in:
Körperschaft: | |
---|---|
Weitere Verfasser: | |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pa. :
IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),
c2004.
|
Schriftenreihe: | IT solutions series.
|
Schlagworte: | |
Online-Zugang: | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-241-1 |
Zusammenfassung: | From a distance, the concept of e-commerce security seems simple. Just allow authorized people to transact business securely and efficiently through the Internet, and keep unauthorized people away from valuable information. But in today's impersonal and global economy, how can a business or organization really know who they are really allowing into their systems? And how can they be sure unauthorized people are always kept out? In a highly interconnected and transaction-driven world, deciding who should be kept out or included is becoming more difficult every day. Due in part to interdependent global economic conditions, international terrorism concerns and human ingenuity involved with misusing technology for ill gotten gains, e-commerce security is neither simple nor static. |
Beschreibung: | electronic texts (xiv, 176 p.) : digital files. Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 1591402425 (ebook) 9781591402428 (ebook) |
Zugangseinschränkungen: | Restricted to subscribers or individual electronic text purchasers. |
Internformat
MARC
LEADER | 00000nam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00000661 | ||
003 | IGIG | ||
005 | 20100714155726.0 | ||
006 | m e d | ||
007 | cr bn||||m|||a | ||
008 | 100626s2004 pau fob 001 0 eng d | ||
010 | |z 2003025969 | ||
020 | |a 1591402425 (ebook) | ||
020 | |a 9781591402428 (ebook) | ||
020 | |z 1591402417 (pbk.) | ||
020 | |z 9781591402411 (pbk.) | ||
024 | 7 | |a 10.4018/978-1-59140-241-1 |2 doi | |
035 | |a (CaBNVSL)gtp00541788 | ||
035 | |a (OCoLC)456152841 | ||
040 | |a CaBNVSL |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a HF5548.32 |b .E1864 2004e | |
082 | 7 | |a 658.4/78 |2 22 | |
245 | 0 | 0 | |a E-commerce security |h [electronic resource] |b advice from experts |c Mehdi Khosrow-Pour. |
260 | |a Hershey, Pa. : |b IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), |c c2004. | ||
300 | |a electronic texts (xiv, 176 p.) : |b digital files. | ||
490 | 1 | |a IT solutions series | |
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Section I. Introduction -- 1. An overview / Mehdi Khosrow-Pour -- | |
505 | 0 | |a Section II. Expert opinions -- 2. Learning from practice / Mehdi Khosrow-Pour -- | |
505 | 0 | |a Section III. Expert writings -- 3. How one niche player in the internet security field fulfills an important role / Troy J. Strader ... et al. -- 4. Personal information privacy and EC: a security conundrum / Edward J. Szewczak -- 5. Developing secure e-commerce in China / Michelle Fong -- 6. Identifying and managing new forms of commerce risk and security / Dieter Fink -- 7. E-commerce security and the law / Assafa Endeshaw -- 8. Rethinking e-commerce security in the digital economy: a pragmatic and strategic perspective / Mahesh S. Raisinghani -- 9. Security and the importance of trust in the Australian automotive industry / Pauline Ratnasingam -- 10. E-commerce security planning / Daniel L. Ruggles -- | |
505 | 0 | |a Section IV. Glossary and index -- Glossary -- Index. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | 3 | |a From a distance, the concept of e-commerce security seems simple. Just allow authorized people to transact business securely and efficiently through the Internet, and keep unauthorized people away from valuable information. But in today's impersonal and global economy, how can a business or organization really know who they are really allowing into their systems? And how can they be sure unauthorized people are always kept out? In a highly interconnected and transaction-driven world, deciding who should be kept out or included is becoming more difficult every day. Due in part to interdependent global economic conditions, international terrorism concerns and human ingenuity involved with misusing technology for ill gotten gains, e-commerce security is neither simple nor static. | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | |a Title from PDF t.p. (viewed on June 26, 2010). | ||
650 | 0 | |a Electronic commerce |x Security measures. | |
700 | 1 | |a Khosrowpour, Mehdi |d 1951- | |
710 | 2 | |a IGI Global. | |
776 | 0 | |c (Original) |z 1591402417 |z 9781591402411 |w (DLC) 2003025969 | |
830 | 0 | |a IT solutions series. | |
856 | 4 | 8 | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-241-1 |
912 | |a ZDB-98-IGB | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-98-IGB-00000661 |
---|---|
_version_ | 1816797074564317184 |
adam_text | |
any_adam_object | |
author2 | Khosrowpour, Mehdi 1951- |
author2_role | |
author2_variant | m k mk |
author_corporate | IGI Global |
author_corporate_role | |
author_facet | Khosrowpour, Mehdi 1951- IGI Global |
author_sort | Khosrowpour, Mehdi 1951- |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | H - Social Science |
callnumber-label | HF5548 |
callnumber-raw | HF5548.32 .E1864 2004e |
callnumber-search | HF5548.32 .E1864 2004e |
callnumber-sort | HF 45548.32 E1864 42004E |
callnumber-subject | HF - Commerce |
collection | ZDB-98-IGB |
contents | Section I. Introduction -- 1. An overview / Mehdi Khosrow-Pour -- Section II. Expert opinions -- 2. Learning from practice / Mehdi Khosrow-Pour -- Section III. Expert writings -- 3. How one niche player in the internet security field fulfills an important role / Troy J. Strader ... et al. -- 4. Personal information privacy and EC: a security conundrum / Edward J. Szewczak -- 5. Developing secure e-commerce in China / Michelle Fong -- 6. Identifying and managing new forms of commerce risk and security / Dieter Fink -- 7. E-commerce security and the law / Assafa Endeshaw -- 8. Rethinking e-commerce security in the digital economy: a pragmatic and strategic perspective / Mahesh S. Raisinghani -- 9. Security and the importance of trust in the Australian automotive industry / Pauline Ratnasingam -- 10. E-commerce security planning / Daniel L. Ruggles -- Section IV. Glossary and index -- Glossary -- Index. |
ctrlnum | (CaBNVSL)gtp00541788 (OCoLC)456152841 |
dewey-full | 658.4/78 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/78 |
dewey-search | 658.4/78 |
dewey-sort | 3658.4 278 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03343nam a2200469 a 4500</leader><controlfield tag="001">ZDB-98-IGB-00000661</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20100714155726.0</controlfield><controlfield tag="006">m e d </controlfield><controlfield tag="007">cr bn||||m|||a</controlfield><controlfield tag="008">100626s2004 pau fob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2003025969</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1591402425 (ebook)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781591402428 (ebook)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1591402417 (pbk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781591402411 (pbk.)</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-59140-241-1</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)gtp00541788</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)456152841</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HF5548.32</subfield><subfield code="b">.E1864 2004e</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">658.4/78</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">E-commerce security</subfield><subfield code="h">[electronic resource] </subfield><subfield code="b">advice from experts </subfield><subfield code="c">Mehdi Khosrow-Pour.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Hershey, Pa. :</subfield><subfield code="b">IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),</subfield><subfield code="c">c2004.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">electronic texts (xiv, 176 p.) :</subfield><subfield code="b">digital files.</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">IT solutions series</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Section I. Introduction -- 1. An overview / Mehdi Khosrow-Pour -- </subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Section II. Expert opinions -- 2. Learning from practice / Mehdi Khosrow-Pour -- </subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Section III. Expert writings -- 3. How one niche player in the internet security field fulfills an important role / Troy J. Strader ... et al. -- 4. Personal information privacy and EC: a security conundrum / Edward J. Szewczak -- 5. Developing secure e-commerce in China / Michelle Fong -- 6. Identifying and managing new forms of commerce risk and security / Dieter Fink -- 7. E-commerce security and the law / Assafa Endeshaw -- 8. Rethinking e-commerce security in the digital economy: a pragmatic and strategic perspective / Mahesh S. Raisinghani -- 9. Security and the importance of trust in the Australian automotive industry / Pauline Ratnasingam -- 10. E-commerce security planning / Daniel L. Ruggles -- </subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Section IV. Glossary and index -- Glossary -- Index.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">From a distance, the concept of e-commerce security seems simple. Just allow authorized people to transact business securely and efficiently through the Internet, and keep unauthorized people away from valuable information. But in today's impersonal and global economy, how can a business or organization really know who they are really allowing into their systems? And how can they be sure unauthorized people are always kept out? In a highly interconnected and transaction-driven world, deciding who should be kept out or included is becoming more difficult every day. Due in part to interdependent global economic conditions, international terrorism concerns and human ingenuity involved with misusing technology for ill gotten gains, e-commerce security is neither simple nor static.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Title from PDF t.p. (viewed on June 26, 2010).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic commerce</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Khosrowpour, Mehdi</subfield><subfield code="d">1951-</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global.</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">(Original)</subfield><subfield code="z">1591402417</subfield><subfield code="z">9781591402411</subfield><subfield code="w">(DLC) 2003025969</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">IT solutions series.</subfield></datafield><datafield tag="856" ind1="4" ind2="8"><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-241-1</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-98-IGB-00000661 |
illustrated | Not Illustrated |
indexdate | 2024-11-26T14:51:47Z |
institution | BVB |
isbn | 1591402425 (ebook) 9781591402428 (ebook) |
language | English |
oclc_num | 456152841 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS |
owner_facet | DE-863 DE-BY-FWS |
physical | electronic texts (xiv, 176 p.) : digital files. Also available in print. |
psigel | ZDB-98-IGB |
publishDate | 2004 |
publishDateSearch | 2004 |
publishDateSort | 2004 |
publisher | IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), |
record_format | marc |
series | IT solutions series. |
series2 | IT solutions series |
spelling | E-commerce security [electronic resource] advice from experts Mehdi Khosrow-Pour. Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), c2004. electronic texts (xiv, 176 p.) : digital files. IT solutions series Includes bibliographical references and index. Section I. Introduction -- 1. An overview / Mehdi Khosrow-Pour -- Section II. Expert opinions -- 2. Learning from practice / Mehdi Khosrow-Pour -- Section III. Expert writings -- 3. How one niche player in the internet security field fulfills an important role / Troy J. Strader ... et al. -- 4. Personal information privacy and EC: a security conundrum / Edward J. Szewczak -- 5. Developing secure e-commerce in China / Michelle Fong -- 6. Identifying and managing new forms of commerce risk and security / Dieter Fink -- 7. E-commerce security and the law / Assafa Endeshaw -- 8. Rethinking e-commerce security in the digital economy: a pragmatic and strategic perspective / Mahesh S. Raisinghani -- 9. Security and the importance of trust in the Australian automotive industry / Pauline Ratnasingam -- 10. E-commerce security planning / Daniel L. Ruggles -- Section IV. Glossary and index -- Glossary -- Index. Restricted to subscribers or individual electronic text purchasers. From a distance, the concept of e-commerce security seems simple. Just allow authorized people to transact business securely and efficiently through the Internet, and keep unauthorized people away from valuable information. But in today's impersonal and global economy, how can a business or organization really know who they are really allowing into their systems? And how can they be sure unauthorized people are always kept out? In a highly interconnected and transaction-driven world, deciding who should be kept out or included is becoming more difficult every day. Due in part to interdependent global economic conditions, international terrorism concerns and human ingenuity involved with misusing technology for ill gotten gains, e-commerce security is neither simple nor static. Also available in print. Mode of access: World Wide Web. Title from PDF t.p. (viewed on June 26, 2010). Electronic commerce Security measures. Khosrowpour, Mehdi 1951- IGI Global. (Original) 1591402417 9781591402411 (DLC) 2003025969 IT solutions series. http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-241-1 |
spellingShingle | E-commerce security advice from experts IT solutions series. Section I. Introduction -- 1. An overview / Mehdi Khosrow-Pour -- Section II. Expert opinions -- 2. Learning from practice / Mehdi Khosrow-Pour -- Section III. Expert writings -- 3. How one niche player in the internet security field fulfills an important role / Troy J. Strader ... et al. -- 4. Personal information privacy and EC: a security conundrum / Edward J. Szewczak -- 5. Developing secure e-commerce in China / Michelle Fong -- 6. Identifying and managing new forms of commerce risk and security / Dieter Fink -- 7. E-commerce security and the law / Assafa Endeshaw -- 8. Rethinking e-commerce security in the digital economy: a pragmatic and strategic perspective / Mahesh S. Raisinghani -- 9. Security and the importance of trust in the Australian automotive industry / Pauline Ratnasingam -- 10. E-commerce security planning / Daniel L. Ruggles -- Section IV. Glossary and index -- Glossary -- Index. Electronic commerce Security measures. |
title | E-commerce security advice from experts |
title_auth | E-commerce security advice from experts |
title_exact_search | E-commerce security advice from experts |
title_full | E-commerce security [electronic resource] advice from experts Mehdi Khosrow-Pour. |
title_fullStr | E-commerce security [electronic resource] advice from experts Mehdi Khosrow-Pour. |
title_full_unstemmed | E-commerce security [electronic resource] advice from experts Mehdi Khosrow-Pour. |
title_short | E-commerce security |
title_sort | e commerce security advice from experts |
title_sub | advice from experts |
topic | Electronic commerce Security measures. |
topic_facet | Electronic commerce Security measures. |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-241-1 |
work_keys_str_mv | AT khosrowpourmehdi ecommercesecurityadvicefromexperts AT igiglobal ecommercesecurityadvicefromexperts |