References:
1.
F. Westin (1967), Privacy and Freedom, Athenaeum, New York.
2.
Albrechtsen, E. (2007) A qualitative study of user's view on information security.
Computer and Security 26 (4): 276–289.
3.
M. K. Cheung, & M. K. O. Lee (2006), “Understanding Consumer Trust in Internet
Shopping: A Multidisciplinary Approach” Journal of the American
Society for
Information Science and Technology, vol. 57, no. 4, pp. 479-492
4.
Debar H. and Viinikka, J. (2006) Security information
management as an outsourced
service. Computer Security 14 (5): 416–434.
5.
Dhillon, G. (2001) Challenges in managing information security in the new millennium.
In: G. Dhillon (ed.) Information Security Management: Global Challenges in the New
Millennium. Hershey, PA: Idea Group Publishing, pp. 1–8.
6.
Dhillon, G. and Torkzadeh, G. (2006) Values-focused assessment of information
system
security in organizations. Information Systems Journal 16 (3): 293–314.
7.
F. Belanger, J.S. Hiller & W.J. Smith (2002), ( “Trustworthiness in Electronic
Commerce: the Role of Privacy,
Security, and Site Attributes” Journal of Strategic
Information Systems, vol. 11, pp. 245–270
8.
Leach, J. (2003) Improving user security behavior. Computers and Security 22 (8): 685–
692.
9.
N. K. Malhotra, S. S. Kim, J. Agarwal (2004), “Internet Users’ Information Privacy
Concerns (IUIPC): The Construct,
the Scale, and a Causal Model” Information Systems
Research, vol. 15, no. 4, pp. 336-355
10.
Nolan, J. (2005), Best practices for establishing an effective workplace policy for
acceptable computer usage. Information Systems Control Journal 6 (2): 32–35.
11.
Parker, Donn B., (2004) Toward a new framework for information security, in
Computer
Security Handbook, 4th edition, Bosworth, Seymour and Kabay, M. E. (eds.),
John Wiley
and Sons.
12.
Pfleeger, Charles P. (1997) Security in Computing. Prentice Hall.
13.
S. Davies, “Big Brother (1996): Britain’s web of surveillance and the new technological
order”, London. p. 23.
14.
S. Warren, & L. Brandeis (1890), “The Right to Privacy” Harvard Law Review 4.
15.
T. Singh, & M. E. Hill (2003), “Consumer privacy and the Internet in Europe: a view
from Germany” Journal of Consumer Marketing, vol. 20, no. 7. pp. 634-651
16.
V. Shankar, G. L. Urban, & F. Sultan (2002), “Online Trust: a Stakeholder Perspective,
Concepts, Implications, and Future Directions” Journal of Strategic Information Systems,
vol. 11. pp. 325-344
17.
Bradley, Tony.
Introduction to Packet Sniffing
. 2005.
(accessed 5/3/2012)
18.
http://www.centralbank.go.ke/downloads/bsd/annualreports/bsd2010.pdf
(accessed
5/3/2012)
IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 4, No 3, July 2012
ISSN (Online): 1694-0814
www.IJCSI.org
445
Copyright (c) 2012 International Journal of Computer Science Issues. All Rights Reserved.
19.
http://www.cofek.co.ke/index.php?option=com_content&view=article&id=959:mobile-
ohone-now-drives-consumer-spending&catid=1:latest-news
(accessed 8/3/2012)
20.
http://www.fincen.gov/news_room/rp/files/e-cash.pdf
(accessed 5/3/2012)
21.
http://www.information.go.ke/index2.php?option=com_docman&task=doc_view&gid=2
3&Itemid=37
(accessed 5/3/2012)
22.
http://www.internetworldstats.com/emarketing.htm
(accessed 7/3/2012)
23.
http://www.krio.me/internet-security-threats-and-protection-methods/
(accessed
12/2/2012)
24.
http://www.networkworld.com/news/2008/100108-government-sends-auditors-to-
investigate.html?fsrc=rss-security
(accessed 15/3/2012)
25.
http://www.palgrave-journals.com/rm/journal/v13/n1/full/rm20113a.html
(accessed
12/3/2012)
26.
http://www.standardmedia.co.ke/InsidePage.php?id=2000041790&cid=457¤tPage
=1
(report published 29/8/11, Kenya Scores high in electronic banking).(accessed
29/8/2011)
27.
http://www.webroot.com/resources/stateofspyware/excerpt.html
28.
Khusial, McKegney, 2005: e-Commerce security: Attacks and
preventive strategies
http://www.ibm.com/developerworks/websphere/library/techarticles/0504_mckegney/050
4_mckegney.html
(accessed 20/3/2012)
IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 4, No 3, July 2012
ISSN (Online): 1694-0814
www.IJCSI.org
446
Copyright (c) 2012 International Journal of Computer Science Issues. All Rights Reserved.