Spelling suggestions: "subject:"commerce - security"" "subject:"ecommerce - security""
21 |
Elektroninės komercijos saugumas / ECommerce securityBudrionis, Andrius 09 July 2011 (has links)
Darbe nagrinėjami šiuo metu rinkoje naudojami elektroninių atsiskaitymų modeliai ir jų saugumo problemos. Kadangi elektroninių transakcijų metu operuojama svarbiais ir konfidencialiais duomenimis, aukštesnio saugumo lygio užtikrinimo problema visada išlieka itin aktuali. Darbe išnagrinėtos dažniausiai sutinkamos elektroninių atsiskaitymų schemos (tiesioginis atsiskaitymas ir atsiskaitymas per Paypal sistemą), jų saugumo užtikrinimo principai, technikos ir spragos. Atsižvelgiant į dabartinius rinkos poreikius ir informacijos saugumo spragas šiuo metu naudojamuose modeliuose, suprojektuotas aukštesnio saugumo lygio elektroninių atsiskaitymų modelis ir realizuotas šio sprendimo prototipas. Šio prototipo projektas ir realizacija gali būti naudojamos kaip rekomendacijos kūrėjams, tobulinantiems elektroninių atsiskaitymų modelių saugumą. / The work deals with electronic payment models used in the market and their security problems. As electronic transactions operate with important and confidential data, ensuring higher level of security is always an actual issue. The study generally concerns the main electronic payment schemes (direct payment and payment through Paypal), their safety principles, technical decisions and security ensuring gaps. Considering the current market needs and information security gaps in current eCommerce models, a new, ensuring higher level of security in electronic payments, model was designed and a prototype of this decision was implemented. The prototype design and implementation may be used as recommendations for developers, improving electronic payment security models.
|
22 |
The factors that influence electronic payment adoption by SMEs in two cities of China.Hu, Guo Dong. January 2008 (has links)
<p>This study will refer specifically to the reasons why SMEs are not willing to use e-payment as their first-choice method: the reasons hampering e-payment adoption.</p>
|
23 |
The factors that influence electronic payment adoption by SMEs in two cities of China.Hu, Guo Dong. January 2008 (has links)
<p>This study will refer specifically to the reasons why SMEs are not willing to use e-payment as their first-choice method: the reasons hampering e-payment adoption.</p>
|
24 |
The status of information security in South AfricaWarricker, Anina M. 03 1900 (has links)
Thesis (MPhil)--Stellenbosch University, 2005. / ENGLISH ABSTRACT: The business and social environments are increasingly reliant on the information
network, and the quality and integrity of the information to effectively conduct
transactions, and "survive" in the new economy. These information networks facilitate
communication and transactions between customers, suppliers, partners, and
employees. Emerging technologies further encourage the extension of network
boundaries beyond the branch office, to private homes, airports, and even the comer
coffee shop, e.g. wireless internet access. Although technology advances contribute to
significant increases in productivity, convenience, and competitive advantage, it also
increases the risk of attacks on the integrity and confidentiality of any information
interaction. One of the key questions is how to achieve the right level of information
network security and implement effective protection systems, without impacting
productivity by excessively restricting the flow of information.
The issue of information security is not a localised problem, but a problem on global
scale, and South African businesses are no less at risk than any other geographically
located business. The risk of information security is even greater if aspects like
globalisation are taken into account, and the growing inter-connectedness of the global
business environment. The central question is: How does the South African business
environment view information security, their perceived success in implementing
information security measures, and their view of future trends in information security.
Ingenue- Consulting is a global business focusing on technology consulting services,
across a wide range of industries and technologies. Information security has been
identified by Ingenue Consulting to be a global problem, and primary research into this
business issue have been undertaken in different locations globally, e.g. Australia and South African executive level survey of what the perception and importance are of
information security, of business leaders across public and private industries.
Ingenue Consulting has an in-house research facility, and tasked them with conducting
a survey in South Africa. The survey results can then be compared with global trends,
and applied in the business environment, to highlight the impact of information security
risks, and to help businesses to change and improve their information security
processes and technologies. The research department started out doing an extensive
literature study to identify global and local trends in information security, and to assist in
the compilation of the survey questionnaire. A sample group of "blue chip" businesses
across all industries was targeted at executive level to conduct a research survey - fifty
interviews were conducted. The raw data was collated and analysed to formulate an
opinion of the information security practices and perceptions of the business
environment in South Africa.
The survey confirmed that the South African market risks in terms of information
security are very similar to global trends. Some of the key trends are: Information
security agreements are normally signed at the onset of employment, but rarely
updated or highlighted to ensure continued support and implementation. This is almost
contradictory to the fact that information security are taken seriously by the executive
level, and often discussed at board level. The mobility of information with the
emergence of wireless networks is a key issue for most businesses - as information
security is at its most vulnerable.
Most of the respondents rated themselves ahead of the curve and their competitors -
overestimation of competencies, could lead to larger future risks. The sensitive nature
of information security industry makes benchmarking against local or global players
difficult due to the sensitive nature -limited willingness to participate in a consultative
forum. Companies that outsouree IT tend to "wash their hands off' security issues as the responsibility of the outsourcing vendor. Most local businesses haven't got a worldly
view - they do not have an active process to find out what their peers are doing locally
or globally, they rely mostly on vendor and consulting advice, or media coverage. / AFRIKAANSE OPSOMMING: Die besigheids en sosiale omgewings is toenemend afhanklik van die inligtings
netwerke, en die kwaliteit en integriteit van inligting om transaksies effektief uit te voer,
en om te "oorleef" in die nuwe ekonomie. Inligtings netwerke fasiliteer kommunikasie
en transaksies tussen kliente, verskaffers, vennote, en werknemers. Nuwe tegnologiee
verder veskuif netwerk grense, wyer as die tak-kantoor, na private huise, lughawens, of
die koffie kafee - deur middel van draadlose internet toegang. Alhoewel tegnologie
ontwikkelings bydra tot verbeterde produktiwiteit, en gemak van gebruik - dra dit ook by
tot groter gevaar van aanvalle op die integriteit en konfidensialiteit van enige inligtings
transaksie. Een van die sleutel vrae is hoe om die regte vlak van inligting netwerk
sekuriteit te bereik, en om die regte beskermings metodes te implementeer - sonder
om die produtiwiteit te inhibeer.
Die inligting sekuritets vraagstuk is nie bloot 'n lokale vraagstuk nie, maar van globale
skaal, en Suid-Afrikaanse besighede is nie minder in gevaar as enige ander besigheid
in 'n ander lande nie, veral nie as aspekte soos globaliseering in ag geneem word nie.
Die sentrale vraag is: Hoe sien die Suid-Afrikaanse besigheids wereld inligtings
sekuriteit, en die waargenome sukses met die implementering van inligtings sekuriteit
prosesse, en ook hoe hul die toekoms sien van inligtings sekuriteit.
Ingenue* Consulting is 'n wereldwye besigheid, gefokus op tegnologie konsultasie
dienste, oor 'n wye reeks industriee en tegnologiee. Inligting sekuriteit is deur Ingenue
Consulting ge-identifiseer as 'n globale probleem, en primere navorsing in die area is al
onderneem in verskillende geografiee, soos Australie en die Verenigde Koninkryk. Die
Suid-Afrikaanse tak van Ingenue het vroeg in 2004 besluit om 'n lokale studie te doen
oor top bestuur se persepsies van inligting sekuriteits risikos, in beide die publieke en
privaat besigheids wereld. Die interne navorsings afdeling van Ingenue Consulting in Suid-Afrika is gevra om die
nodige studie te ondeneem, om dit dan met globale studies te vergelyk, en te kan
bepaal waar gapings mag wees, en hoe om die gapings aan te spreek. Die navorsings
afdeling het begin deur 'n ekstensiewe literatuur studie te doen, as hulp tot die
samestelling van die vrae-lys. 'n Teiken groep van top Suid-Afrikaanse besighede,
verteenwoordigend van alle industriee is genader om 'n onderhoud toe te staan om die
vrae-lys te voltooi - vyftig onderhoude was voltooi. Die rou data is gekollekteer en
geanaliseer, om 'n opinie te formuleer oor die inligtings sekuriteit persepsies en
praktyke van die besigheids omgewing in Suid-Afrika.
Die navorsing het bevestig dat die Suid-Afrikaanse mark baie dieselfde is as ander
geografiese markte - in terme van inligting sekuriteit. Van die sleutel konklusies is:
Inligting sekuriteit ooreenkomste word meestal geteken met die aanvangs van diens,
maar bitter selde dan weer opgevolg of hernu - dit is byna kontradikterend dat top
bestuur ook baie besorg is oor inligting sekuriteit, en dat dit dikwels by raads
vergaderings bespreek word. Die mobiliteit van inligting is 'n groeiende bekommernis,
omrede inligting dan nog meer op risiko is.
Meeste respondente sien hulself as beter of meer gevorderd as hul kompeteerders - 'n
oor-estimasie van sukses in inligtings sekuriteit kan lei tot groter probleme in die
toekoms. Die sensitiewe natuur van inligting sekuriteit maak ope vergelyking van
gedetaileerde prosesse moeilik - en meeste besighede is nie bereid om deel te neem
aan algemene gesprekke nie. Terwyl besighede wat hul tegnologie afdeling deur 'n
derde party bestuur, neem geen verantwoordelikheid vir hul inligtings sekuriteit nie. 'n
Groter bekommernis is dat besighede in Suid-Afrika nie 'n aktiewe proses het om op
hoogte bly van wat die beste opsies is in inligtings sekuriteit nie, of wat hul
teenstanders doen nie - maar vertrou op die advies van verkoops en konsultasie
maatskappye, of media berigte.
|
25 |
Um modelo para tratamento de confiança sobre transações de E-business. / A model for handling trust over E-business transactions.PILLATT, Fábio Roberto. 27 August 2018 (has links)
Submitted by Johnny Rodrigues (johnnyrodrigues@ufcg.edu.br) on 2018-08-27T16:51:30Z
No. of bitstreams: 1
FÁBIO ROBERTO PILLATT - DISSERTAÇÃO PPGCC 2002..pdf: 1041756 bytes, checksum: fc86922162194a17563dd44222e08596 (MD5) / Made available in DSpace on 2018-08-27T16:51:30Z (GMT). No. of bitstreams: 1
FÁBIO ROBERTO PILLATT - DISSERTAÇÃO PPGCC 2002..pdf: 1041756 bytes, checksum: fc86922162194a17563dd44222e08596 (MD5)
Previous issue date: 2002-08-29 / Ao se avaliar o atual cenário de negócios, percebe-se que o e-business tem se convertido
numa peça fundamental para o fortalecimento da cadeia de valor das atividades
tradicionais de negócios. Porém, a velocidade do crescimento do e-business no cenário
mundial ainda depende de vários fatores, dentre os quais cita-se a confiabilidade sobre
as transações. Este trabalho apresenta uma alternativa para se obter e mensurar
relacionamentos de confiança sobre as atividades de negociação virtual, propondo um
modelo de confiança para avaliação do nível de confiabilidade atribuído a cada
transação. A forma como o modelo deverá ser implementado também é indicada e
comentada. / When evaluating today business environment, it is noticed that e-business technologies
are being outlined as fundamental pieces to strengthen the value chain of traditional
business activities. Furthermore, the growth of e-business technologies in the global
market depends on several factors and transactions' reliability is one of them. This
dissertation presents an alternative to obtain and measure trust relationships on virtual
activity of negotiation, proposing a trust model for evaluation of the reliability level
assigned to a given transaction. Also it is described how the model is being
implemented and how to apply it.
|
26 |
Segurança na internet: a percepção do usuário como fator de restrição ao crescimento do comércio eletrônico no BrasilCernev, Adrian Kemmer 01 April 2002 (has links)
Made available in DSpace on 2010-04-20T20:14:31Z (GMT). No. of bitstreams: 0
Previous issue date: 2002-04-01T00:00:00Z / Electronic commerce is already a Brazilian reality. However, this modality of electronic business hasn't yet achieved its full potential, especially referring to business-to-consumer (B2C) transactions. Several factors are pointed as restrictions to its growth, but none is more on the spot, or more controversial than Internet security, especially on electronic transactions. This research analyzes security matters from an Internet user 's point of view, since lhe Web user 's security perception leads to trust, and trust ajJects electronic purchase decisions, including how much he or she will buy through Internet. Internet security, often taken as the biggest problem in digital world, is now alternatively understood as an ecommerce foundation, and consequently, a huge competitive advantage for e-business. / O comércio eletrônico já é uma realidade brasileira. Contudo, esta modalidade de negócio eletrônico ainda não atingiu o seu pleno potencial, especialmente nas negociações orientadas para o consumidor (B2C). Vários fatores são apontados como restrições ao seu crescimento, mas nenhum deles é tão destacado e controvertido quanto a segurança na Internet, especialmente nas transações eletrônicas. Este trabalho analisa a questão da segurança do ponto de vista dos usuários de Internet, uma vez que a percepção de segurança dos internautas determina a sua confiança, e a sua confiança influencia a sua decisão de compra eletrônica e a abrangência das compras realizadas através da Internet. A segurança, vista freqüentemente como a grande vilã no mundo digital, passa a ser entendida alternativamente como um dos fundamentos do comércio eletrônico e, conseqüentemente, uma grande vantagem competitiva para os negócios eletrônicos.
|
27 |
Towards a model for ensuring optimal interoperability between the security systems of trading partners in a business-to-business e-commerce contextPather, Maree 25 August 2009 (has links)
A vast range of controls/countermeasures exists for implementing security on information systems connected to the Internet. For the practitioner attempting to implement an integrated solution between trading partners operating across the Internet, this has serious implications in respect of interoperability between the security systems of the trading partners. The problem is exacerbated by the range of specification options within each control. This research is an attempt to find a set of relevant controls and specifications towards a framework for ensuring optimal interoperability between trading partners in this context. Since a policy-based, layered approach is advocated, which allows each trading partner to address localized risks independently, no exhaustive risk analysis is attempted. The focus is on infrastructure that is simultaneously optimally secure and provides optimal interoperability. It should also be scalable, allowing for additional security controls to be added whenever deemed necessary. / Computing / M. Sc. (Information Systems)
|
28 |
The factors that influence electronic payment adoption by SMEs in two cities of ChinaHu, Guo Dong January 2008 (has links)
Magister Commercii (Information Management) - MCom(IM) / This study will refer specifically to the reasons why SMEs are not willing to use e-payment as their first-choice method: the reasons hampering e-payment adoption. / South Africa
|
29 |
A secure mobile agent e-commerce protocolYu, Min-Chieh 09 December 2015 (has links)
Indiana University-Purdue University Indianapolis (IUPUI) / There are many advantages of mobile agent such as delegation of tasks, asynchronous processing, adaptable service in interfaces, and code shipping. Mobile agents can be utilized in many areas such as electronic commerce, information retrieval, network management, etc. The main problem with mobile agents is security. The three basic security design goals of a system are confidentiality, integrity, and availability. The goal of this thesis concerns the property of secure purchasing by mobile agents. First present Jalal's anonymous authentication protocol. Next, we construct our single mobile agent protocol based on Jalal's authentication technique. Also, we add some addition cryptography techniques to make the data more secure during its migration. Lastly, we build a multiple mobile agent protocol based on the single mobile agent protocol. Here, the multiple mobile agents are capable to make the decision and purchase the item for user.
|
30 |
Internet-based electronic payment systemsKortekaas, Birgit Friederike 01 January 2002 (has links)
As today, the traditional payment systems of cash, cheques and credit cards are being
supplemented by electronic cheques, electronic credit card-based systems, and token-based
systems, online security is of utmost importance and one of the biggest criteria
used for evaluating electronic payment systems. Electronic payment systems must
guarantee the essential security requirements: confidentiality, privacy, integrity,
availability. authentication, non-repudiation as well as anonymity and trust. This paper
compares the various payment systems (both traditional and electronic) available today
mainly according to their security aspects. Secure processing can be accomplished
including access controls and detection techniques, such as, encrypted communication
channels, user and/or message authentication, symmetric and asymmetric encryption,
digital certificates and firewalls. These effective security measures, which are outlined in
detail in this paper, will protect the information and payment systems against security
risks that currently threaten the Internet / Computing / M.Sc. (Information Systems)
|
Page generated in 0.0484 seconds