Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-13 of 13
Keywords: Security
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
The evolution of perceived security: the temporal role of SNS information perceptions
Available to Purchase
Journal:
Internet Research
Internet Research (2018) 28 (4): 1055–1078.
Published: 06 August 2018
... The purpose of this paper is to develop and test a dynamic model of security-based consumer purchasing intentions and empirically addresses gaps in online purchasing theory by examining how loyalty intention may become stronger or weaker over time as a result of prior relationship evaluations...
Journal Articles
Factors affecting consumers’ perception of electronic payment: an empirical analysis
Available to Purchase
Journal:
Internet Research
Internet Research (2013) 23 (4): 465–485.
Published: 09 August 2013
.../approach Literature indicates that factors such as benefits, trust, self‐efficacy, ease of use, and security influence consumers’ perception towards e‐payment. A self‐reporting questionnaire was developed and disseminated to 200 respondents, out of which 183 valid responses were considered for further...
Journal Articles
eCX: a secure infrastructure for e‐course delivery
Available to Purchase
Journal:
Internet Research
Internet Research (2003) 13 (2): 116–125.
Published: 01 May 2003
...Joe C.K. Yau; Lucas C.K. Hui; Bruce Cheung; S.M. Yiu Online education has emerged as one of the major channels for dissemination of learning materials. As more and more organizations offer online distance learning courses, the security concerns of these online education systems become more and more...
Journal Articles
Security for IP multimedia services in the 3GPP third generation mobile system
Available to Purchase
Journal:
Internet Research
Internet Research (2003) 13 (2): 100–106.
Published: 01 May 2003
...G. Horn; D. Kröselberg; K. Müller This paper surveys the security architecture of the IP multimedia core network subsystem (IMS) of the third generation mobile system which is known in Europe as UMTS. The main features of the security architecture include user specific features protecting...
Journal Articles
A stateful multicast access control mechanism for future metro‐area‐networks
Available to Purchase
Journal:
Internet Research
Internet Research (2003) 13 (2): 134–138.
Published: 01 May 2003
...Wei‐qiang Sun; Jin‐sheng Li; Pei‐lin Hong Multicasting is a necessity for a broadband metro‐area‐network. Discusses the security problems with current multicast protocols. To make the multicast delivery infrastructure more secure and reliable, a stateful multicast access control mechanism, based...
Journal Articles
Security of mobile agents on the Internet
Available to Purchase
Journal:
Internet Research
Internet Research (2001) 11 (1): 84–95.
Published: 01 March 2001
... accelerate the process of diffusion of new applications and services in the areas of e‐commerce, network and systems management, and mobile computing. However, the lack of security is one of the main obstacles to a wide diffusion of MA. On the one hand, mobility increases the potential of security breaches...
Journal Articles
Security implications of electronic commerce: a survey of consumers and businesses
Available to Purchase
Journal:
Internet Research
Internet Research (1999) 9 (5): 372–382.
Published: 01 December 1999
...S.M. Furnell; T. Karweni Examines the general requirement for security technologies in order to provide a basis for trust in the e‐commerce environment. The discussion is supported by the findings from two surveys, conducted by the authors, among general Internet users (i.e. potential target...
Journal Articles
A study of student perspectives on Web‐based learning: WebCT in the classroom
Available to Purchase
Journal:
Internet Research
Internet Research (1999) 9 (5): 393–408.
Published: 01 December 1999
... presentation tool are addressed based upon the data collected from Creighton University students over the past 18 months of WebCT use. © MCB UP Limited 1999 WebCT CBT Students Computer‐based training Learning Security It provides instructional tools to support course content...
Journal Articles
Mobile agents for Web‐based systems management
Available to Purchase
Journal:
Internet Research
Internet Research (1999) 9 (5): 360–371.
Published: 01 December 1999
... and modifying system policies at run‐time. MAMAS achieves these objectives by answering the guidelines of both security and compliance to standards. The choice of Java as the implementation language has made it possible to achieve portability, to exploit the language security features, and to provide Web...
Journal Articles
Architectures for secure portable executable content
Available to Purchase
Journal:
Internet Research
Internet Research (1999) 9 (1): 16–24.
Published: 01 March 1999
..., and execute code from a remote computer, provided by both Java and Safe‐Tcl, introduces serious security risks since it enables a malicious remote program to obtain unauthorised access to the downloading system’s resources. In this paper, the two proposed security models are described in detail...
Journal Articles
The importance of trust in electronic commerce
Available to Purchase
Journal:
Internet Research
Internet Research (1998) 8 (4): 313–321.
Published: 01 October 1998
...Pauline Ratnasingham In this paper a new concept “trust”, and how it influences the process of managing the security of an organization operating in an electronic commerce environment has been introduced. Pragmatically, the study suggests awareness for organizations entering into electronic...
Journal Articles
Security considerations of doing business via the Internet: cautions to be considered
Available to Purchase
Journal:
Internet Research
Internet Research (1997) 7 (1): 9–15.
Published: 01 March 1997
...Alicia Aldridge; Michele White; Karen Forcht Looks at the growth and potential of the Internet in relation to security issues. Presently, lack of security is perceived as a major roadblock to doing business on‐line. Risks of system corruption, fraud, theft and viruses point companies to the need...
Journal Articles
Computer abuse: vandalizing the information society
Available to Purchase
Journal:
Internet Research
Internet Research (1997) 7 (1): 61–66.
Published: 01 March 1997
... Hacking Security Society Viruses Global information networks are now an integral part of the way in which modern businesses and economies operate. One of the best examples of the trend, the Internet, is now estimated to extend to over one million computers, connecting 30 million users in more...
