• References
  • Security and privacy of electronic banking by




    Download 0,67 Mb.
    Pdf ko'rish
    bet13/13
    Sana25.11.2023
    Hajmi0,67 Mb.
    #105148
    1   ...   5   6   7   8   9   10   11   12   13
    Bog'liq
    Security and Privacy of Electronic Banking

     
     
     
     
     
     
     
    IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 4, No 3, July 2012 
    ISSN (Online): 1694-0814 
    www.IJCSI.org
    444
    Copyright (c) 2012 International Journal of Computer Science Issues. All Rights Reserved.


    References: 
    1. F. Westin (1967), Privacy and Freedom, Athenaeum, New York. 
    2. Albrechtsen, E. (2007) A qualitative study of user's view on information security. 
    Computer and Security 26 (4): 276–289. 
    3. M. K. Cheung, & M. K. O. Lee (2006), “Understanding Consumer Trust in Internet 
    Shopping: A Multidisciplinary Approach” Journal of the American Society for 
    Information Science and Technology, vol. 57, no. 4, pp. 479-492 
    4. Debar H. and Viinikka, J. (2006) Security information management as an outsourced 
    service. Computer Security 14 (5): 416–434. 
    5. Dhillon, G. (2001) Challenges in managing information security in the new millennium. 
    In: G. Dhillon (ed.) Information Security Management: Global Challenges in the New 
    Millennium. Hershey, PA: Idea Group Publishing, pp. 1–8. 
    6. Dhillon, G. and Torkzadeh, G. (2006) Values-focused assessment of information system 
    security in organizations. Information Systems Journal 16 (3): 293–314.
    7. F. Belanger, J.S. Hiller & W.J. Smith (2002), ( “Trustworthiness in Electronic 
    Commerce: the Role of Privacy, Security, and Site Attributes” Journal of Strategic 
    Information Systems, vol. 11, pp. 245–270 
    8. Leach, J. (2003) Improving user security behavior. Computers and Security 22 (8): 685–
    692. 
    9. N. K. Malhotra, S. S. Kim, J. Agarwal (2004), “Internet Users’ Information Privacy 
    Concerns (IUIPC): The Construct, the Scale, and a Causal Model” Information Systems 
    Research, vol. 15, no. 4, pp. 336-355 
    10. Nolan, J. (2005), Best practices for establishing an effective workplace policy for 
    acceptable computer usage. Information Systems Control Journal 6 (2): 32–35. 
    11. Parker, Donn B., (2004) Toward a new framework for information security, in Computer 
    Security Handbook, 4th edition, Bosworth, Seymour and Kabay, M. E. (eds.), John Wiley 
    and Sons. 
    12. Pfleeger, Charles P. (1997) Security in Computing. Prentice Hall. 
    13. S. Davies, “Big Brother (1996): Britain’s web of surveillance and the new technological 
    order”, London. p. 23. 
    14. S. Warren, & L. Brandeis (1890), “The Right to Privacy” Harvard Law Review 4. 
    15. T. Singh, & M. E. Hill (2003), “Consumer privacy and the Internet in Europe: a view 
    from Germany” Journal of Consumer Marketing, vol. 20, no. 7. pp. 634-651 
    16. V. Shankar, G. L. Urban, & F. Sultan (2002), “Online Trust: a Stakeholder Perspective, 
    Concepts, Implications, and Future Directions” Journal of Strategic Information Systems, 
    vol. 11. pp. 325-344 
    17. Bradley, Tony. Introduction to Packet Sniffing. 2005.
     (accessed 5/3/2012) 
    18. 
    http://www.centralbank.go.ke/downloads/bsd/annualreports/bsd2010.pdf
     (accessed 
    5/3/2012) 
    IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 4, No 3, July 2012 
    ISSN (Online): 1694-0814 
    www.IJCSI.org
    445
    Copyright (c) 2012 International Journal of Computer Science Issues. All Rights Reserved.


    19. 
    http://www.cofek.co.ke/index.php?option=com_content&view=article&id=959:mobile-
    ohone-now-drives-consumer-spending&catid=1:latest-news
    (accessed 8/3/2012) 
    20. 
    http://www.fincen.gov/news_room/rp/files/e-cash.pdf
    (accessed 5/3/2012) 
    21. 
    http://www.information.go.ke/index2.php?option=com_docman&task=doc_view&gid=2
    3&Itemid=37
    (accessed 5/3/2012) 
    22. 
    http://www.internetworldstats.com/emarketing.htm
     (accessed 7/3/2012) 
    23. 
    http://www.krio.me/internet-security-threats-and-protection-methods/
    (accessed 
    12/2/2012) 
    24. 
    http://www.networkworld.com/news/2008/100108-government-sends-auditors-to-
    investigate.html?fsrc=rss-security
    (accessed 15/3/2012) 
    25. 
    http://www.palgrave-journals.com/rm/journal/v13/n1/full/rm20113a.html
    (accessed 
    12/3/2012) 
    26. 
    http://www.standardmedia.co.ke/InsidePage.php?id=2000041790&cid=457¤tPage
    =1
     (report published 29/8/11, Kenya Scores high in electronic banking).(accessed 
    29/8/2011) 
    27. 
    http://www.webroot.com/resources/stateofspyware/excerpt.html
    28. Khusial, McKegney, 2005: e-Commerce security: Attacks and preventive strategies 
    http://www.ibm.com/developerworks/websphere/library/techarticles/0504_mckegney/050
    4_mckegney.html
    (accessed 20/3/2012) 
    IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 4, No 3, July 2012 
    ISSN (Online): 1694-0814 
    www.IJCSI.org
    446
    Copyright (c) 2012 International Journal of Computer Science Issues. All Rights Reserved.

    Download 0,67 Mb.
    1   ...   5   6   7   8   9   10   11   12   13




    Download 0,67 Mb.
    Pdf ko'rish

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    Security and privacy of electronic banking by

    Download 0,67 Mb.
    Pdf ko'rish