Keywords
- Credit Card
- Transmission Control Protocol
- International Standard Organisation
- Business Operation
- Risk Assessment Model
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Dutton, H., 1999, Society on the Line, Information Politics in the Digital Age, Oxford University Press.
Husein, F., Gausrab, A., and Bensaci, E., 2002, ‘Mobile Commerce-Business model for success’, University of Ottwa’s Excutive MBA, January, p.4; www.cata.ca/china/documents/mobilepresent.pdf (September 23, 2003)
Keen, P., Mougayar, W. and Torregrossa, T., 1998, The Business Internet and Intranets: Manager’s Guide to Key Terms and Concepts, Boston: Harvard Business School Press, USA.
Kroll, E., 1994, The Whole Internet: User’s Guide and Catalogue, 2nd ed., O’Reilly & Associates, Inc. USA.
LaCroix, T., and Witty, J., 2003, ‘Trends in Information Security: Security Update 2003’, www.google.com/search?hl=en&ie=UTF-8&oe=UTF8&q=Trends+in+Information+Security%3A+Security+Update+2003 (February 27, 2004).
Levi, A., 2003, ‘How secure is secure Web browsing?’, Communication of the ACM, July, p.152.
Liston, G., 2003, ‘eSecurity4Britain’, Business Europe Newsfeed, BusinessEurope.com; www.esecurity4britain.org (December 2, 2003).
Neumann, P., 2003, ‘Risks in Trusting Untrustworthiness’, Communication of the ACM, September, p. 120.
Orwell, G., 1939, Coming up for Air. William Heinemann Ltd.
Shoniregun, C. A., and Midwood, G. P., 2004, ‘An Investigation of Inevitable Sectorial Bias In E-Tailing(eT)’, in the Proceedings of Hawaii International Conference on Business, Honolulu, Hawaii, USA, June, pp. 2657–2663.
Stamp, M., 2004, ‘Risks of Manoculture’, Communication of the ACM, March, p. 120.
Wool, A., 2000, ‘Why security standards sometimes fail’, Communication of the ACM, December, p. 144.
Rights and permissions
Copyright information
© 2005 Springer Science+Business Media, Inc.
About this chapter
Cite this chapter
(2005). Conclusion. In: Impacts and Risk Assessment of Technology for Internet Security. Advances in Information Security, vol 17. Springer, Boston, MA. https://doi.org/10.1007/0-387-26334-9_7
Download citation
DOI: https://doi.org/10.1007/0-387-26334-9_7
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-24343-6
Online ISBN: 978-0-387-26334-2
eBook Packages: Computer ScienceComputer Science (R0)