|Total results: 95||
|Cloud Computing in Case-Based Pedagogy: An Information Systems Success Perspective
Charlie C. Chen.
Case-based pedagogy has evolved as an important tool for enhancing students’ analytical thinking and problem solving skills, as well as fostering the ability to make decisions under conditions of uncertainty. Due to the rapid development of technologies that allow collaboration and interaction despite...
Security and Trust of Public Key Cryptography for HIP and HIP Multicast
Amir K.C, Harri Forsgren, Kaj Grahn, Timo Karvi, Göran Pulkkis.
Host Identity Protocol (HIP) gives cryptographically verifiable identities to hosts. These identities are based on public key cryptography and consist of public and private keys. Public keys can be stored, together with corresponding IP addresses, in DNS servers. When entities are negotiating on a HIP...
Evaluation of Information Security Controls in Organizations by Grey Relational Analysis
Angel R. Otero, Abdel Ejnioui, Carlos E. Otero, Gurvirender Tejay.
In an era where dependence of information systems is significantly high, the threat of incidents related to information security that could jeopardize the information held by is becoming critical. Alarming facts within the literature point to inadequacies in information security practices, particularly...
Trust and Technology in B2B E-Commerce: Practices and Strategies for Assurance
Muneesh Kumar, Mamta Sareen.
As the use of technology has considerably increased in B2B e-commerce, it becomes imperative to address the issues of trust that emerge in the context of technology.Trust and Technology in B2B E-Commerce: Practices and Strategies for Assurance focuses on various trust issues that emerge from deployment...
Theoretical Foundations and Literature Review
This chapter raises the conceptual issues concerning different concepts relating to technology and trust in B2B e-Commerce. It makes an attempt to organize the contributions of various scholars in this regard in order to build a framework of understanding of the trust and technology issues in B2B...
Trust Theories and Models of E-Commerce
The literature on relationship between trust and e-commerce draws heavily on the insight provided by various theories and models of human behavior. A number of trust models have been proposed by various scholars to give a comprehensive view of the concept of trust and its antecedents. This chapter...
Trust and Technology Model
The previous chapter provided a background of the underlying theories and trust models in e-commerce. While each of these models has made significant contribution, their perspectives were different. There is a need for a single model that explains the relationship between trust and technology in B2B...
This chapter describes the strategy and the research design used in the present research process followed in the book. It begins with an overview of the research approach adopted, details the sources of data and outlines the procedures used for collection of data. Later, it describes the design of the...
Trust Related Technology Practices
Trust related issues identified in the proposed ‘Trust and Technology’ model for B2B e-commerce can be addressed by deployment and effective implementation of relevant technologies. The implementation of these technologies would involve following a set of benchmark practices in respect of each...
Technology Related Trust Issues
The technology-related trust issues hypothesized in the proposed model include security, authentication, confidentiality, non-repudiation, web interface, system performance and technology-related policies and procedures. These issues can be addressed by maintaining high levels of assurance with respect...
Technology Related Policies
Trust and Web Interface
In the brick and mortar world, the trading party makes an assessment of the trustworthiness of the counter party and the trading environment by various physical cues such as physical size of organization, its overall infrastructure, face-to-face interactions, physically examining the product etc....
Environment Related Issues
The technology and trust model proposed earlier in this book, included environment related trust issues as one category of determinants of levels of trust in B2B e-commerce. These issues relate to a number of factors that may influence creation of a general environment of trust in B2B e-commerce...
Trust and Technology: Case Studies
Chapter 6 to 8 focused on the trust related issues and the practices with regard to effective deployment and implementation of relevant technologies in order to enhance levels of trust in B2B e-commerce. The analysis presented in these chapters was on aggregate basis. In order to get an insight into...
Summary of Findings and Conclusions
This chapter contains a summary of discussions and findings presented in this book. The findings are based primarily on the analysis of the data collected through a field survey of 106 companies who have invested in B2B e-commerce infrastructure. It has been supplemented by the analysis of the data...
An Interpretive Study of Critical Issues in Electronic Health Information Exchange
Sherrie Drye Cannoy.
In this paper, the author examines the critical issues that have emerged in the area of electronic healthcare information exchange (HIE) in the United States. An interpretive, longitudinal study was conducted over a total of four years through a study of seven field cases. This paper aggregates...
Selecting Secure Web Applications Using Trustworthiness Benchmarking
Afonso Araújo Neto, Marco Vieira.
The multiplicity of existing software and component alternatives for web applications, especially in open source communities, has boosted interest in suitable benchmarks, able to assist in the selection of candidate solutions, concerning several quality attributes. However, the huge success of...
First Experiment on Modeling Safety LifeCycle Process in Railway Systems
Brahim Hamid, Yulin (Huaxi) Zhang, Jacob Geisel, David Gonzalez.
The conception and design of Resource Constrained Embedded Systems (RCES) is an inherently complex endeavor. Non-functional requirements from security and dependability are exacerbate this complexity. Model-Driven Engineering (MDE) is a promising approach for the design of trusted systems, as it...
Network Security and Firewall Technology: A Step to Safety of National IT Vision
Afolayan A. Obiniyi, Ezugwu E. Absalom, Mohammed Dikko.
With the explosion of the public Internet, corporate networks connected to the Internet, if not adequately secured, are vulnerable to damaging attacks. Hackers, viruses, worms, Trojan horses, and spyware try to invade privacy. This research examines how these threats affect the corporate network and...
Collaborative Computer Security and Trust Management
Jean-Marc Seigneur, Adam Slagell.
As the Internet grows and connects the world in new ways, computer security must become global and collaborative to understand and react to harmful security threats.Collaborative Computer Security and Trust Management combines perspectives of leading researchers in collaborative security to discuss...