Descriptor
Source
Internet Research | 5 |
Author
Aggelis, George | 1 |
Aldridge, Alicia | 1 |
Bleimann, Udo | 1 |
Evans, M. P. | 1 |
Forcht, Karen | 1 |
Furnell, S. M. | 1 |
Gritzalis, Stefanos | 1 |
Loew, Robert | 1 |
McDonald, Aidan | 1 |
Rowley, Jennifer | 1 |
Spinellis, Diomidis | 1 |
More ▼ |
Publication Type
Journal Articles | 5 |
Reports - Descriptive | 4 |
Reports - Research | 1 |
Education Level
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating

Aldridge, Alicia; White, Michele; Forcht, Karen – Internet Research, 1997
Lack of security is perceived as a major roadblock to doing business online. This article examines system, user, and commercial transaction privacy on the World Wide Web and discusses methods of protection: operating systems security, file and data protection, user education, access restrictions, data authentication, perimeter and transaction…
Descriptors: Access to Information, Business, Computer Security, Government Role

Loew, Robert; Stengel, Ingo; Bleimann, Udo; McDonald, Aidan – Internet Research, 1999
Presents an overview of two projects that concern local area networks and the common point between networks as they relate to network security. Discusses security architectures based on firewall components, packet filters, application gateways, security-management components, an intranet solution, user registration by Web form, and requests for…
Descriptors: Computer Networks, Computer Security, Information Retrieval, Local Area Networks

Rowley, Jennifer – Internet Research, 1996
Internet advertising and commercial activity are increasing. This article examines challenges facing the retail industry on the Internet: location; comparison shopping; security, especially financial transactions; customer base and profile; nature of the shopping experience; and legal and marketplace controls. (PEN)
Descriptors: Advertising, Business, Computer Security, Free Enterprise System

Gritzalis, Stefanos; Aggelis, George; Spinellis, Diomidis – Internet Research, 1999
Discusses downloadable executable content, or mobile code, on the World Wide Web; evaluates the security features offered by the Java and Safe-Tcl programming languages; and describes the basic mechanisms of each of the proposed security models. Presents current implementations, as well as upcoming extensions, and evaluates their efficiency and…
Descriptors: Computer Security, Evaluation Methods, Futures (of Society), Models

Evans, M. P.; Furnell, S. M. – Internet Research, 2000
Explains the background to experimental work intended to measure aspects of the World Wide Web, which inadvertently caused two perceived security breaches on remote systems. Describes the nature of these incidents and considers why, when over 700,000 addresses were sampled, only two sites considered the activity to be an attempt to breach their…
Descriptors: Computer Oriented Programs, Computer Security, Computer System Design, Internet