-
1Academic Journal
المؤلفون: Amarachukwu Grace Nwosu
المصدر: International Journal of Engineering Research and Science, 10(9), 01-07, (2024-09-30)
مصطلحات موضوعية: E-commerce security, Data breach, eBay data breach, Cybersecurity vulnerabilities, User information security
Relation: https://doi.org/10.5281/zenodo.13858626; https://doi.org/10.5281/zenodo.13858627; oai:zenodo.org:13858627
-
2Academic Journal
المؤلفون: Choon Keat LOW, Gar Chi PHOON, Yen Phing NG
المصدر: Research and Applications of Web Development and Design, 7(2), 1-5, (2024-03-02)
مصطلحات موضوعية: E-commerce Security Measures, Secure Online Transactions, Size Identification and Calculation Tools
Relation: https://zenodo.org/communities/compub; https://doi.org/10.5281/zenodo.10745952; https://doi.org/10.5281/zenodo.10745953; oai:zenodo.org:10745953
-
3Academic Journal
المؤلفون: Ahmad Habib Pinim, Muhammad Ramadhan, Juliana Nasution
المصدر: Journal of Economics, Finance and Management Studies, 07(02), 881-888, (2024-02-05)
مصطلحات موضوعية: Insurance, e-commerce Security, Trust, Shopee
Relation: https://doi.org/10.5281/zenodo.10618040; https://doi.org/10.5281/zenodo.10618041; oai:zenodo.org:10618041
-
4Academic Journal
المؤلفون: Rohit Gupta, Sushma Shinde
المصدر: International Journal of Scientific and Applied Research (IJSAR), eISSN: 2583-0279; Vol. 4 No. 4: IJSAR April-2024; 1-5 ; 2583-0279
مصطلحات موضوعية: Classification algorithm, Database, E-commerce security, ERP System, Medical Consultant
وصف الملف: application/pdf
-
5Academic Journal
المؤلفون: Maftuna Utkirovna, Namozova
المصدر: SO‘NGI ILMIY TADQIQOTLAR NAZARIYASI; Vol. 7 No. 5 (2024): SO‘NGI ILMIY TADQIQOTLAR NAZARIYASI; 126-128
مصطلحات موضوعية: artificial intelligence (AI), fraud detection, customer service, machine learning algorithms, natural language processing, advanced analytics, real-time data analysis, anomaly detection, personalization of interactions, commerce and service sectors, ethical considerations of AI, predictive analytics, behavioral analysis, financial transactions, identity theft, e-commerce security, insurance fraud, credit card fraud, phishing scams, cybersecurity
وصف الملف: application/pdf
-
6Academic Journal
المؤلفون: Sena Efsun Cebeci, Kubra Nari, Enver Ozdemir
المصدر: IEEE Access, Vol 10, Pp 10359-10370 (2022)
مصطلحات موضوعية: E-commerce security, security protocol, algorithm development, symmetric key cryptography, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
وصف الملف: electronic resource
-
7Academic Journal
المؤلفون: Ghanima Sabr Shyaa, Mishall Al-Zubaidie
المصدر: Applied Sciences; Volume 13; Issue 12; Pages: 7085
مصطلحات موضوعية: AES, CRT, data encryption, e-commerce security, electronic trade protection, ElGamal, information hiding, Scyther
جغرافية الموضوع: agris
وصف الملف: application/pdf
Relation: Electrical, Electronics and Communications Engineering; https://dx.doi.org/10.3390/app13127085
الاتاحة: https://doi.org/10.3390/app13127085
-
8Academic Journal
المؤلفون: Dr Kinjalkumar Narendrabhai Mistri
المصدر: International Education and Research Journal (IERJ); Vol. 9 No. 6 (2023): JUNE ISSUE, INTERNATIONAL EDUCATION AND RESEARCH JOURNAL ; 2454-9916
مصطلحات موضوعية: E-Commerce Security, Threats and Vulnerabilities, Security Engineering Life Cycle, Security Standards, IT act
وصف الملف: application/pdf
-
9Academic Journal
المؤلفون: Sagor Sen, Charlie Natarajan
المصدر: International Journal of Progressive Research in Science and Engineering ; Vol. 3 No. 10 (2022): October; 1-5 ; 2582-7898
مصطلحات موضوعية: Security measures, Online Shopping, Digital E-commerce cycle, Security Threats, Secure online shopping guidelines, E-Commerce Security Issues
وصف الملف: application/pdf
-
10Academic Journal
المصدر: Journal of Asian Scientific Research; Vol. 14 No. 2 (2024); 251-265 ; 2223-1331 ; 2226-5724
مصطلحات موضوعية: Application design, E-Commerce, E-Commerce security, E-Satisfaction, Merchandise attributes, Transaction capabilities
وصف الملف: application/pdf
-
11Academic Journal
المؤلفون: Romeo John Francisco
مصطلحات موضوعية: Electronic Payment Systems E-Commerce E-Commerce Security
Relation: https://doi.org/10.5281/zenodo.3737680; https://doi.org/10.5281/zenodo.3737681; oai:zenodo.org:3737681
-
12Academic Journal
المؤلفون: Marijana Aleksić, Srđan Šapić, Srđan Furtula
المصدر: Ekonomski Vjesnik, Vol 30, Iss 2, Pp 273-286 (2017)
مصطلحات موضوعية: e-commerce, educational level, customer satisfaction, e-commerce security, Social Sciences, Economics as a science, HB71-74
وصف الملف: electronic resource
-
13Academic Journal
المؤلفون: Kyaw Zay Oo
المصدر: International Journal of Trend in Scientific Research and Development, 3(5), 1329-1334, (2019-07-16)
مصطلحات موضوعية: Information Technology, electronic payment gateway, e-commerce security, online payment system, RSA
Relation: https://doi.org/10.5281/zenodo.3590718; https://doi.org/10.5281/zenodo.3590719; oai:zenodo.org:3590719
-
14
المؤلفون: Brzica, Nikola, Brzica, Ivana
المصدر: Poslovna Izvrsnost, Vol 15, Iss 2, Pp 87-102 (2021)
Poslovna izvrsnost
Volume 15
Issue 2مصطلحات موضوعية: international business, e-commerce, security risks, risk management, HF5001-6182, international business, međunarodno poslovanje, e-trgovina, sigurnosni rizici, upravljanje rizicima, e-commerce, Business, security risks, risk management
وصف الملف: application/pdf
-
15Academic Journal
المؤلفون: Tony Wijaya, Hermansyah Putra Siregar
المصدر: ENTER; Vol 1 (2018): ENTER; 58-68 ; 10.30700/.v1i1
مصطلحات موضوعية: E-Commerce, E-Commerce Security, online shop, internet, Security, web
وصف الملف: application/pdf
Relation: http://sisfotenika.stmikpontianak.ac.id/index.php/enter/article/view/795/559; http://sisfotenika.stmikpontianak.ac.id/index.php/enter/article/view/795
-
16Academic Journal
المؤلفون: Šapić, Srđan, Furtula, Srđan, Aleksić, Marijana
المصدر: https://hrcak.srce.hr/191897 ; Ekonomski vjesnik : Review of Contemporary Entrepreneurship, Business, and Economic Issues ; Volume 30 ; Issue 2 ; ISSN 0353-359X (Print) ; ISSN 1847-2206 (Online.
مصطلحات موضوعية: e-commerce, educational level, customer satisfaction, e-commerce security, DRUŠTVENE ZNANOSTI. Ekonomija, SOCIAL SCIENCES. Economics
وصف الملف: application/pdf
Relation: https://repozitorij.unios.hr/islandora/object/efos:1803; https://urn.nsk.hr/urn:nbn:hr:145:420215; https://repozitorij.unios.hr/islandora/object/efos:1803/datastream/FILE0
-
17Academic Journal
المؤلفون: Andre Michael Ricky Wajong, Carolina Rizki Putri
المصدر: ComTech, Vol 1, Iss 2, Pp 867-874 (2010)
مصطلحات موضوعية: e-commerce, security, threat, Technology, Engineering (General). Civil engineering (General), TA1-2040, Science
وصف الملف: electronic resource
-
18Book
المؤلفون: Du, Rong, Foo, Ernest, Boyd, Colin, Choo, Kim-Kwang
المساهمون: Ma, T, Buyya, R, Susilo, W, Steketee, C, Safavi-Naini, R
المصدر: ACSW Frontiers 2006: Proceedings of the 4th Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the 4th Australasian Information Security Workshop (Network Security) (AISW-NetSec 2006) [CRPIT, Volume 54]
مصطلحات موضوعية: Secure e-Contract, e-Commerce Security, e-Tendering
وصف الملف: application/pdf
Relation: https://eprints.qut.edu.au/4423/1/4423_1.pdf; Du, Rong, Foo, Ernest, Boyd, Colin, & Choo, Kim-Kwang (2006) Formal Analysis of Secure Contracting Protocol for E-Tendering. In Ma, T, Buyya, R, Susilo, W, Steketee, C, & Safavi-Naini, R (Eds.) ACSW Frontiers 2006: Proceedings of the 4th Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the 4th Australasian Information Security Workshop (Network Security) (AISW-NetSec 2006) [CRPIT, Volume 54]. Australian Computer Society, Australia, pp. 155-164.; https://eprints.qut.edu.au/4423/; School of Software Engineering & Data Communications; Information Security Institute; Science & Engineering Faculty; Australian Research Centre for Aerospace Automation
الاتاحة: https://eprints.qut.edu.au/4423/
-
19Academic Journal
المؤلفون: Chen, Chia-Mei, Cai, Zheng-Xun, Wen, Dan-Wei Marian
مصطلحات موضوعية: Digital Forensics, E-Commerce Forensic System, E-Commerce Forensics, E-Commerce Forensics Framework, E-Commerce Security, Forensic Process, Forensics Framework, Incident Response
وصف الملف: 107 bytes; text/html
Relation: Journal of Global Information Management (JGIM) 30(2), pp.1-19; 全文連結 https://reurl.cc/9Opp2d; http://tkuir.lib.tku.edu.tw:8080/dspace/handle/987654321/121997; http://tkuir.lib.tku.edu.tw:8080/dspace/bitstream/987654321/121997/1/index.html; http://tkuir.lib.tku.edu.tw:8080/dspace/bitstream/987654321/121997/-1/Designing-and-Evaluating-an-Automatic-Forensic-Model-for-Fast-Response-of-Cross-Border-E-Commerce-Security-Incidents.pdf
الاتاحة: http://tkuir.lib.tku.edu.tw:8080/dspace/handle/987654321/121997
http://tkuir.lib.tku.edu.tw:8080/dspace/bitstream/987654321/121997/1/index.html
http://tkuir.lib.tku.edu.tw:8080/dspace/bitstream/987654321/121997/-1/Designing-and-Evaluating-an-Automatic-Forensic-Model-for-Fast-Response-of-Cross-Border-E-Commerce-Security-Incidents.pdf -
20Academic Journal
المؤلفون: Guynes, Carl S., Wu, Yu Andy, Windsor, John
المصدر: International Journal of Management & Information Systems (IJMIS); Vol. 15 No. 2 (2011); 1-8 ; 2157-9628 ; 1546-5748 ; 10.19030/ijmis.v15i2
مصطلحات موضوعية: E-commerce Security, Denial of Service, Enterprise Networks, Visualization
وصف الملف: application/pdf
Relation: https://clutejournals.com/index.php/IJMIS/article/view/4147/4202; https://clutejournals.com/index.php/IJMIS/article/view/4147