Security and privacy of electronic banking by



Yüklə 159,16 Kb.
Pdf görüntüsü
səhifə13/13
tarix16.12.2023
ölçüsü159,16 Kb.
#183670
1   ...   5   6   7   8   9   10   11   12   13
security

 
 
 
 
 
 
 
IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 4, No 3, July 2012 
ISSN (Online): 1694-0814 
www.IJCSI.org
444
Copyright (c) 2012 International Journal of Computer Science Issues. All Rights Reserved.


References: 
1.
F. Westin (1967), Privacy and Freedom, Athenaeum, New York. 
2.
Albrechtsen, E. (2007) A qualitative study of user's view on information security. 
Computer and Security 26 (4): 276–289. 
3.
M. K. Cheung, & M. K. O. Lee (2006), “Understanding Consumer Trust in Internet 
Shopping: A Multidisciplinary Approach” Journal of the American Society for 
Information Science and Technology, vol. 57, no. 4, pp. 479-492 
4.
Debar H. and Viinikka, J. (2006) Security information management as an outsourced 
service. Computer Security 14 (5): 416–434. 
5.
Dhillon, G. (2001) Challenges in managing information security in the new millennium. 
In: G. Dhillon (ed.) Information Security Management: Global Challenges in the New 
Millennium. Hershey, PA: Idea Group Publishing, pp. 1–8. 
6.
Dhillon, G. and Torkzadeh, G. (2006) Values-focused assessment of information system 
security in organizations. Information Systems Journal 16 (3): 293–314.
7.
F. Belanger, J.S. Hiller & W.J. Smith (2002), ( “Trustworthiness in Electronic 
Commerce: the Role of Privacy, Security, and Site Attributes” Journal of Strategic 
Information Systems, vol. 11, pp. 245–270 
8.
Leach, J. (2003) Improving user security behavior. Computers and Security 22 (8): 685–
692. 
9.
N. K. Malhotra, S. S. Kim, J. Agarwal (2004), “Internet Users’ Information Privacy 
Concerns (IUIPC): The Construct, the Scale, and a Causal Model” Information Systems 
Research, vol. 15, no. 4, pp. 336-355 
10.
Nolan, J. (2005), Best practices for establishing an effective workplace policy for 
acceptable computer usage. Information Systems Control Journal 6 (2): 32–35. 
11.
Parker, Donn B., (2004) Toward a new framework for information security, in Computer 
Security Handbook, 4th edition, Bosworth, Seymour and Kabay, M. E. (eds.), John Wiley 
and Sons. 
12.
Pfleeger, Charles P. (1997) Security in Computing. Prentice Hall. 
13.
S. Davies, “Big Brother (1996): Britain’s web of surveillance and the new technological 
order”, London. p. 23. 
14.
S. Warren, & L. Brandeis (1890), “The Right to Privacy” Harvard Law Review 4. 
15.
T. Singh, & M. E. Hill (2003), “Consumer privacy and the Internet in Europe: a view 
from Germany” Journal of Consumer Marketing, vol. 20, no. 7. pp. 634-651 
16.
V. Shankar, G. L. Urban, & F. Sultan (2002), “Online Trust: a Stakeholder Perspective, 
Concepts, Implications, and Future Directions” Journal of Strategic Information Systems, 
vol. 11. pp. 325-344 
17.
Bradley, Tony. 
Introduction to Packet Sniffing
. 2005.
 (accessed 5/3/2012) 
18.
 
http://www.centralbank.go.ke/downloads/bsd/annualreports/bsd2010.pdf
 (accessed 
5/3/2012) 
IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 4, No 3, July 2012 
ISSN (Online): 1694-0814 
www.IJCSI.org
445
Copyright (c) 2012 International Journal of Computer Science Issues. All Rights Reserved.


19.
 
http://www.cofek.co.ke/index.php?option=com_content&view=article&id=959:mobile-
ohone-now-drives-consumer-spending&catid=1:latest-news
(accessed 8/3/2012) 
20.
 
http://www.fincen.gov/news_room/rp/files/e-cash.pdf
(accessed 5/3/2012) 
21.
 
http://www.information.go.ke/index2.php?option=com_docman&task=doc_view&gid=2
3&Itemid=37
(accessed 5/3/2012) 
22.
 
http://www.internetworldstats.com/emarketing.htm
 (accessed 7/3/2012) 
23.
 
http://www.krio.me/internet-security-threats-and-protection-methods/
(accessed 
12/2/2012) 
24.
 
http://www.networkworld.com/news/2008/100108-government-sends-auditors-to-
investigate.html?fsrc=rss-security
(accessed 15/3/2012) 
25.
 
http://www.palgrave-journals.com/rm/journal/v13/n1/full/rm20113a.html
(accessed 
12/3/2012) 
26.
 
http://www.standardmedia.co.ke/InsidePage.php?id=2000041790&cid=457¤tPage
=1
 (report published 29/8/11, Kenya Scores high in electronic banking).(accessed 
29/8/2011) 
27.
 
http://www.webroot.com/resources/stateofspyware/excerpt.html
28.
Khusial, McKegney, 2005: e-Commerce security: Attacks and preventive strategies 
http://www.ibm.com/developerworks/websphere/library/techarticles/0504_mckegney/050
4_mckegney.html
(accessed 20/3/2012) 
IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 4, No 3, July 2012 
ISSN (Online): 1694-0814 
www.IJCSI.org
446
Copyright (c) 2012 International Journal of Computer Science Issues. All Rights Reserved.

Yüklə 159,16 Kb.

Dostları ilə paylaş:
1   ...   5   6   7   8   9   10   11   12   13




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©azkurs.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin