You are on page 1of 2

c 

    


` 
 
   

Source 1 ʹ Journal Article

Fasli, M.(2007) ͚On agent technology for e-commerce: trust, security and legal issues͛, ^  

     , [online] Available at:


<http://journals.cambridge.org.librouter.hud.ac.uk/action/displayFulltext?type=1&fid=1029320&jid=KE
R&volumeId=22&issueId=01&aid=1029312> [Accessed: 20/10/2010]

This journal article discusses how E-Commerce security issues can be addressed through the use of
cryptography. This article also discusses how the use of agent technology can bring both benefits and
problems to user privacy.

Source 2 ʹ Journal Article

Sharma, K., Singh, A. and Sharma VP. (2009) ͚SMES and cyber security threats in e-commerce͛,  

      
<http://web.ebscohost.com.librouter.hud.ac.uk/ehost/pdfviewer/pdfviewer?vid=3&hid=15&sid=b418c3
a6-bbd1-425e-97b9-487c9eac813a%40sessionmgr12>[Accessed: 20/10/2010]

This journal article clearly defines certain security problems for E-Commerce. It not only details ways to
avoid problems but it also proposes some solutions to problems for Small and Medium Enterprises
(SMES) in E-Commerce.

Source 3 ʹ Book

Smith, G.E., (2004).   


  . NewJersey: John Wiley & Sons

This book details specific threats to E-Commerce websites, in particular threats arising from poor
authentication techniques. The book also details ways to use cryptography to create solutions to these
problems.

Source 4 - Book

Laudon, K.C and Traver, C.G., (2003),


  ! ^   , 2nd ed. Boston:
Pearson Education

This book details the different dimensions of E-Commerce security such as authenticity, privacy and
integrity. Solutions such as, encryption and digital certificates are offered to different security problems
faced by E-Commerce.
Source 5 ʹ Website

IBM, (2003) ^       "  [online]. Available at
<http://www.redbooks.ibm.com/abstracts/tips0266.html?Open>. [Accessed 21\10\2010]

This website discusses user authentication and authorisation issues such as the difference between the
two and why both are required to keep E-Commerce secure.

Source 6 ʹ Book

Carter, J., (2002), #  


   , New Jersey: Pearson Education

This book details security problems that exist within E-Commerce such as protecting information from
unauthorised use that need to considered and how these problems can be solved.

Source 7 ʹ Journal Article

Desmarais, N.,(2000), !$   


  , [online] Available at:
<http://www.emeraldinsight.com.librouter.hud.ac.uk/journals.htm?articleid=861227&show=abstract>[
Accessed 22/10/10]

This journal article discusses fairly complex biometric methods of authenticating a user during an E-
Commerce transaction. This article also discusses using digital certificates and SSL for extra security in E-
Commerce environments.

Source 8 ʹ Journal Article

Al-Slamy, N.M.A, (2008),


   , [online] Available at:
<http://web.ebscohost.com.librouter.hud.ac.uk/ehost/pdfviewer/pdfviewer?vid=2&hid=9&sid=f9a0205
b-92c9-436b-a24b-673d7a430823%40sessionmgr4>[Accessed 22/10/2010]

This journal article discusses methods of securing E-Commerce such through authentication, digital
certificates and cryptography. Each method is discussed in detail and has recommendations for the
usage of security methods.

You might also like