Open Access. Powered by Scholars. Published by Universities.®
Management Information Systems Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Publication
- Publication Type
Articles 1 - 3 of 3
Full-Text Articles in Management Information Systems
Consumers’ Attitudes Of E-Commerce In China, Hongjiang Xu, Xiaowen Zou, Hengshan Wang
Consumers’ Attitudes Of E-Commerce In China, Hongjiang Xu, Xiaowen Zou, Hengshan Wang
Scholarship and Professional Work - Business
This research studied the problem of B2C and C2C
consumers’ attitudes towards trust of the business
transaction process in China by using the
“Consumer Attitudes towards Trust in the e-
Business Model.” Four factors in the model were
analyzed, privacy, security, financial institution and
trusted seal. From this analysis, the conclusion on
the consumers’ attitudes was drawn.
Enterprise Integrated Security Platform: A Comparison Of Remote Access And Extranet Virtual Private Networks, Emmanuel U. Opara, Jack T. Marchewka
Enterprise Integrated Security Platform: A Comparison Of Remote Access And Extranet Virtual Private Networks, Emmanuel U. Opara, Jack T. Marchewka
Journal of International Technology and Information Management
The Internet has created unprecedented opportunities for both organizations and individuals. However, these opportunities also have created a double-edge sword as organizations attempt to connect trading partners, customers, and remote users while providing adequate security measures that are flexible and cost-effective. This paper explores why secured socket layer (SSL) may be better tool for secured remote access and extranets by comparing it to internet protocol security virtual private networks (IPSec-based VPNs).
Computer Security Checklist For Non-Security Technology Professionals, Chlotia P. Garrison, Roderick B. Posey
Computer Security Checklist For Non-Security Technology Professionals, Chlotia P. Garrison, Roderick B. Posey
Journal of International Technology and Information Management
Networked computers and electronic data storage make computer security a fundamental component of a company’s survival. Security incidents can cause reputation damage, loss customers, or even liability. Companies that are unable or unwilling to hire certified security professionals often rely on non-security IT professionals for assistance. This paper provides a checklist the non-security professional can use to assist the company in the critical areas of conducting risk analysis, performing vulnerability assessments, educating employees and developing computer security policies and procedures