870 resultados para Electronic commerce - Security measures


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Saudi Arabian Small and Medium Enterprises (SMEs) will face fierce competition from new entrants to local markets as a result of their accession to the Word Trade Organisation (WTO), and electronic commerce (e-commerce) technologies can reinforce SME’s competitive edge. This study investigates the state of e-commerce adoption and analyses the factors that determine the extent to which SMEs in Saudi Arabia are inclined towards deploying e-commerce technologies. This could assist future firms in designing effective implementation projects. Seven SMEs’ e-commerce adoption levels are studied as a case. The Technology-Organization-Environment (TOE) framework was used as the major source of inspiration in our analysis of e-commerce adoption amongst Saudi SMEs. In addition to advancing research on e-commerce in Saudi Arabia, this chapter also highlights several directions for future inquiry and implications for managers and policymakers.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Saudi Arabian Small and Medium Enterprises (SMEs) will face fierce competition from new entrants to local markets as a result of their accession to the Word Trade Organisation (WTO), and electronic commerce (e-commerce) technologies can reinforce SME's competitive edge. This study investigates the state of e-commerce adoption and analyses the factors that determine the extent to which SMEs in Saudi Arabia are inclined towards deploying e-commerce technologies. This could assist future firms in designing effective implementation projects. Seven SMEs' e-commerce adoption levels are studied as a case. The Technology-Organization-Environment (TOE) framework was used as the major source of inspiration in our analysis of e-commerce adoption amongst Saudi SMEs. In addition to advancing research on e-commerce in Saudi Arabia, this chapter also highlights several directions for future inquiry and implications for managers and policymakers.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Despite the proliferation of e-commerce adoption by SMEs and the world-wide growth of e-commerce, in general there is a paucity of empirical studies that examine the adoption of e-commerce by SMEs in the Middle East. In this paper, the authors provide insights into the salient e-commerce adoption issues by focusing on Saudi Arabian SMEs. This research was designed using a qualitative approach through in-depth case studies selected from firms in Saudi Arabia. The findings contribute toward a better conceptual and practical understanding of the main factors driving SMEs to adopt e-commerce. The authors find that the level of e-commerce implementation has yet to mature and customer readiness for Internet shopping must improve before e-commerce reaches the levels of maturity seen in other regions of the world. This study highlights directions for future inquiry and implications for information and technology managers and policymakers in developing Arab nations.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Mémoire numérisé par la Direction des bibliothèques de l'Université de Montréal.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Mémoire numérisé par la Direction des bibliothèques de l'Université de Montréal.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A trusted third party introduced in watermarking protocols would decrease the security and affect the implementation of the protocols. In this paper, a new watermarking protocol with an un trusted third party (UTTP) was proposed. Based on the idea of all-o>nothing disclosure of secret (ANDOS), all of the buyer, the seller and the third party didn't know the exact watermark, which was embedded in a digital content for tracing piracy. The proposed protocol pro vided mechanisms to trace piracy and protect customer's right, fn addition, the problem that a seller colluded with UTTP to frame the buyer, namely, the conspiracy problem, could be avoided.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

O comércio eletrônico já é uma realidade brasileira. Contudo, esta modalidade de negócio eletrônico ainda não atingiu o seu pleno potencial, especialmente nas negociações orientadas para o consumidor (B2C). Vários fatores são apontados como restrições ao seu crescimento, mas nenhum deles é tão destacado e controvertido quanto a segurança na Internet, especialmente nas transações eletrônicas. Este trabalho analisa a questão da segurança do ponto de vista dos usuários de Internet, uma vez que a percepção de segurança dos internautas determina a sua confiança, e a sua confiança influencia a sua decisão de compra eletrônica e a abrangência das compras realizadas através da Internet. A segurança, vista freqüentemente como a grande vilã no mundo digital, passa a ser entendida alternativamente como um dos fundamentos do comércio eletrônico e, conseqüentemente, uma grande vantagem competitiva para os negócios eletrônicos.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In settings such as electronic markets where trading partners have conflicting interests and a desire to cooperate, mobile agent mediated negotiation have become very popular. However, agent-based negotiation in electronic commerce involves the exchange of critical and sensitive data that must be highly safeguarded. Therefore, in order to give benefits of quick and safe trading to the trading partners, an approach that secures the information exchanged between the mobile agents during e-Commerce negotiations is needed. To this end, we discuss an approach that we refer to as Multi-Agent Security NEgotiation Protocol (MASNEP). To show that MASNEP protocol is free of attacks and thus the information exchanged throughout electronic negotiation is truly secured, we provide a formal proof on the correctness of the MASNEP.

Relevância:

100.00% 100.00%

Publicador:

Relevância:

100.00% 100.00%

Publicador:

Resumo:

E-commerce security is a complex issue; it is concerned with a number of security risks that can appear at either a technical level or organisational level. This paper uses a systemic framework, the viable system model (VSM) to determine the high level security risks and then uses baseline security methods to determine the lower level security risks.


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Public key cryptography, and with it,the ability to compute digital signatures, have made it possible for electronic commerce to flourish. It is thus unsurprising that the proposed Australian NECS will also utilise digital signatures in its system so as to provide a fully automated process from the creation of electronic land title instrument to the digital signing, and electronic lodgment of these instruments. This necessitates an analysis of the fraud risks raised by the usage of digital signatures because a compromise of the integrity of digital signatures will lead to a compromise of the Torrens system itself. This article will show that digital signatures may in fact offer greater security against fraud than handwritten signatures; but to achieve this, digital signatures require an infrastructure whereby each component is properly implemented and managed.