Descriptor
Computer Security | 4 |
Information Technology | 4 |
Internet | 3 |
Advertising | 1 |
Banking | 1 |
Business | 1 |
Computer Attitudes | 1 |
Computer Mediated… | 1 |
Computer Networks | 1 |
Computer System Design | 1 |
Computers | 1 |
More ▼ |
Source
Internet Research | 4 |
Author
Bohmann, Kristoffer | 1 |
Broderick, Martha A. | 1 |
Chew, Daniel | 1 |
Gan, Fong Jek | 1 |
Gattiker, Urs E. | 1 |
Gibson, Virginia R. | 1 |
Hong, Pei-lin | 1 |
Li, Jin-sheng | 1 |
Mah, Quee Yong | 1 |
Perlusz, Stefano | 1 |
Reid, Edna | 1 |
More ▼ |
Publication Type
Journal Articles | 4 |
Reports - Research | 2 |
Reports - Descriptive | 1 |
Reports - Evaluative | 1 |
Education Level
Audience
Location
Singapore | 1 |
United States | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating

Broderick, Martha A.; Gibson, Virginia R.; Tarasewich, Peter – Internet Research, 2001
In the United States, electronic signatures recently became as legally binding as printed signatures. Reviews the status of electronic signatures in the United States, and compares it to work done by the United Nations. Summarizes the technology that can be used to implement electronic signatures. Discusses problems and open issues surrounding the…
Descriptors: Computer Security, Federal Legislation, Information Technology, Laws

Sun, Wei-qiang; Li, Jin-sheng; Hong, Pei-lin – Internet Research, 2003
Multicasting is a necessity for a broadband metro-area-network; however security problems exist with current multicast protocols. A stateful multicast access control mechanism, based on MAPE, is proposed. The architecture of MAPE is discussed, as well as the states maintained and messages exchanged. The scheme is flexible and scalable. (Author/AEF)
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Computer System Design

Gattiker, Urs E.; Perlusz, Stefano; Bohmann, Kristoffer – Internet Research, 2000
Illustrates some of the challenges that electronic commerce practitioners and researchers face, focusing on business to business (B2B) transactions. Highlights include a conceptual framework of Web user behavior; purchasing context; socio-demographic characteristics; cultural factors; economic factors; attitudes toward information technology;…
Descriptors: Computer Attitudes, Computer Security, Cultural Influences, Demography

Soh, Christina; Mah, Quee Yong; Gan, Fong Jek; Chew, Daniel; Reid, Edna – Internet Research, 1997
A survey of Singapore-based firms in computer/information technology, hospitality, manufacturing, retail, travel, publishing, and banking/finance that use the Internet for business found that most of the respondents use the Internet for marketing and advertising, customer service and support, information gathering, and, to a lesser degree,…
Descriptors: Advertising, Banking, Business, Computer Security