Taking the byte out of cookies: privacy, consent, and the Web
Proceedings of the ethics and social impact component on Shaping policy in the information age
Security models for web-based applications
Communications of the ACM
Five dimensions of information security awareness
ACM SIGCAS Computers and Society
Mobile agent security based on payment
ACM SIGOPS Operating Systems Review
A paradigmatic analysis of conventional approaches for developing and managing secure IS
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
Using GSM to enhance e-commerce security
WMC '02 Proceedings of the 2nd international workshop on Mobile commerce
The Dynamics of the Electronic Market: An Evolutionary Game Approach
Information Systems Frontiers
Enhancing the Security of Cookies
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
A methodology for developing trusted information systems: the security requirements analysis phase
Current security management & Ethical issues of information technology
An e-channel development framework for hybrid e-retailers
Managing e-commerce and mobile computing technologies
Internet content filtering using isotonic separation on content category ratings
ACM Transactions on Internet Technology (TOIT)
A review of information security issues and respective research contributions
ACM SIGMIS Database
SBOX: put CGI scripts in a box
ATEC '99 Proceedings of the annual conference on USENIX Annual Technical Conference
eBPSM: a new security paradigm for e-business organisations (e-business process security model)
Proceedings of the ninth international conference on Electronic commerce
Consumer and Business Deception on the Internet: Content Analysis of Documentary Evidence
International Journal of Electronic Commerce
IT-security and privacy: design and use of privacy-enhancing security mechanisms
IT-security and privacy: design and use of privacy-enhancing security mechanisms
Antecedents of Security Pillars in E-Commerce Applications
International Journal of Business Data Communications and Networking
Hi-index | 0.02 |
Learn how to minimize the risks of the Web with this comprehensive guide. It covers browser vulnerabilities, privacy concerns, issues with Java, JavaScript, ActiveX, and plug-ins, digital certificates, cryptography, Web server security, blocking software, censorship technology, and relevant civil and criminal issues.