From a distance, the concept of e-commerce security seems simple. Just allow authorized people to transact business securely and efficiently through the Internet, and keep unauthorized people away from valuable information. But in today's impersonal and global economy, how can a business or organization really know who they are really allowing into their systems? And how can they be sure unauthorized people are always kept out? In a highly interconnected and transaction-driven world, deciding who should be kept out or included is becoming more difficult every day. Due in part to interdependent global economic conditions, international terrorism concerns and human ingenuity involved with misusing technology for ill gotten gains, e-commerce security is neither simple nor static.
The series also serves as a forum for topics that may not have reached a level of maturity to warrant a comprehensive textbook treat ment. The success of this series depends on contributions by researchers and developers such as yourself.
In this book, security experts Hadi Nahari and Ron Krutz provide real security solutions.
This book systematically and integrally introduces the new security management theories and methods in the e-commerce environment.
This book presents concrete precepts on how to achieve these goals. It establishes a framework for business managers to understand the principles of e-commerce security & how to best control & implement it within their organizations.
Essay from the year 2011 in the subject Business economics - Trade and Distribution, grade: A, University of South Central Los Angeles, course: E-Business, language: English, abstract: In order to reassure online consumers that their ...
This report identifies the security vulnerabilities that E-commerce sites face and examines technologies and procedures that can systematically address those vulnerabilities. It aims to help IT professionals develop an effective...
The field of electronic commerce has grown rapidly over the past few years. Major corporations and even small businesses are using electronic commerce as a channel of distribution.
Some online businesses are inadvertently "sharing" data with others when they interoperate systems. This book examines the external threats to a company's system and explains how to react if your system and business goals diverge.
The book also explores encryption algorithms and methods, EDI, micropayment, and multiple aspects of digital money. Like its predecessor, this edition is a general analysis that provides many references to more technical resources.
Examines potential dangers that surround the digital business world, discusses the opportunities in the field of e-commerce security, and describes various types of security and encryption.