Table of contents
A framework for analyzing e‐commerce security
Someswar Kesh, Sam Ramanujan, Sridhar NerurThis paper presents a framework for analyzing e‐commerce security. The framework is developed by analyzing the relationships between e‐commerce security needs, threats…
Private key generation from on‐line handwritten signatures
Hao Feng, Chan Choong Wahn recent years, public key infrastructure (PKI) has emerged as co‐existent with the increasing demand for digital security. A digital signature is created using existing public…
Knowledge and information management in e‐learning environments; the user agent architecture
Kostas Metaxiotis, John Psarras, Stefanos PapastefanatosKnowledge management has recently received considerable attention in the computer information systems community and is continuously gaining interest from industry, enterprises and…
Service level agreements in IP networks
Gaurav Jain, Deepali Singh, Shekhar VermaInternet services are being deployed over an infrastructure that involves co‐operation between multiple organizations and systems. This has necessitated the need for standard…
Issues in cybersecurity; understanding the potential risks associated with hackers/crackers
Alan D. Smith, William T. RuppIt is commonplace to say that the 11 September attacks have changed everything. A global revolution is changing business, and business is changing the world. With unsettling…
Developing e‐business; a strategic approach
John A. Rodgers, David C. Yen, David C. ChouWhile e‐business is often mixed with electronic commerce (e‐commerce), they are completely different concepts. E‐business encompasses e‐commerce as well as many other…