Skip to Main Content
Keywords: Security
Close
Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Journal Articles
Internet Research (2018) 28 (4): 1055–1078.
Published: 06 August 2018
... The purpose of this paper is to develop and test a dynamic model of security-based consumer purchasing intentions and empirically addresses gaps in online purchasing theory by examining how loyalty intention may become stronger or weaker over time as a result of prior relationship evaluations...
Journal Articles
Internet Research (2013) 23 (4): 465–485.
Published: 09 August 2013
.../approach Literature indicates that factors such as benefits, trust, self‐efficacy, ease of use, and security influence consumers’ perception towards e‐payment. A self‐reporting questionnaire was developed and disseminated to 200 respondents, out of which 183 valid responses were considered for further...
Journal Articles
Internet Research (2003) 13 (2): 116–125.
Published: 01 May 2003
...Joe C.K. Yau; Lucas C.K. Hui; Bruce Cheung; S.M. Yiu Online education has emerged as one of the major channels for dissemination of learning materials. As more and more organizations offer online distance learning courses, the security concerns of these online education systems become more and more...
Journal Articles
Internet Research (2003) 13 (2): 100–106.
Published: 01 May 2003
...G. Horn; D. Kröselberg; K. Müller This paper surveys the security architecture of the IP multimedia core network subsystem (IMS) of the third generation mobile system which is known in Europe as UMTS. The main features of the security architecture include user specific features protecting...
Journal Articles
Internet Research (2003) 13 (2): 134–138.
Published: 01 May 2003
...Wei‐qiang Sun; Jin‐sheng Li; Pei‐lin Hong Multicasting is a necessity for a broadband metro‐area‐network. Discusses the security problems with current multicast protocols. To make the multicast delivery infrastructure more secure and reliable, a stateful multicast access control mechanism, based...
Journal Articles
Internet Research (2001) 11 (1): 84–95.
Published: 01 March 2001
... accelerate the process of diffusion of new applications and services in the areas of e‐commerce, network and systems management, and mobile computing. However, the lack of security is one of the main obstacles to a wide diffusion of MA. On the one hand, mobility increases the potential of security breaches...
Journal Articles
Internet Research (1999) 9 (5): 372–382.
Published: 01 December 1999
...S.M. Furnell; T. Karweni Examines the general requirement for security technologies in order to provide a basis for trust in the e‐commerce environment. The discussion is supported by the findings from two surveys, conducted by the authors, among general Internet users (i.e. potential target...
Journal Articles
Internet Research (1999) 9 (5): 393–408.
Published: 01 December 1999
... presentation tool are addressed based upon the data collected from Creighton University students over the past 18 months of WebCT use. © MCB UP Limited 1999 WebCT CBT Students Computer‐based training Learning Security It provides instructional tools to support course content...
Journal Articles
Internet Research (1999) 9 (5): 360–371.
Published: 01 December 1999
... and modifying system policies at run‐time. MAMAS achieves these objectives by answering the guidelines of both security and compliance to standards. The choice of Java as the implementation language has made it possible to achieve portability, to exploit the language security features, and to provide Web...
Journal Articles
Internet Research (1999) 9 (1): 16–24.
Published: 01 March 1999
..., and execute code from a remote computer, provided by both Java and Safe‐Tcl, introduces serious security risks since it enables a malicious remote program to obtain unauthorised access to the downloading system’s resources. In this paper, the two proposed security models are described in detail...
Journal Articles
Internet Research (1998) 8 (4): 313–321.
Published: 01 October 1998
...Pauline Ratnasingham In this paper a new concept “trust”, and how it influences the process of managing the security of an organization operating in an electronic commerce environment has been introduced. Pragmatically, the study suggests awareness for organizations entering into electronic...
Journal Articles
Internet Research (1997) 7 (1): 9–15.
Published: 01 March 1997
...Alicia Aldridge; Michele White; Karen Forcht Looks at the growth and potential of the Internet in relation to security issues. Presently, lack of security is perceived as a major roadblock to doing business on‐line. Risks of system corruption, fraud, theft and viruses point companies to the need...
Journal Articles
Internet Research (1997) 7 (1): 61–66.
Published: 01 March 1997
... Hacking Security Society Viruses Global information networks are now an integral part of the way in which modern businesses and economies operate. One of the best examples of the trend, the Internet, is now estimated to extend to over one million computers, connecting 30 million users in more...

or Create an Account

Close Modal
Close Modal