نتایج جستجو برای: internet transactions
تعداد نتایج: 195861 فیلتر نتایج به سال:
Many reports regarding online fraud in varieties media create skepticism for conducting transactions online, especially through an open network such as the Internet, which offers no security whatsoever. Therefore, encryption technology is vitally important to support secure e-commerce on the Internet. Two well-known encryption representing symmetric and asymmetric cryptosystems as well as their...
The main purpose of this thesis is to determine the influence of culture on e-government (electronic government) acceptance in a developing nation namely the Kingdom of Saudi Arabia (KSA). Citizens’ transactional interactions (electronic transactions or etransactions) with the government via the Internet are examined. To this end, the following research question is addressed: ‘How does culture ...
Web Services (WS) transactions are used to build efficient and reliable web applications which are distributed across the Internet and are accessed by multiple simultaneous users. Current research has developed various models and protocols in order to improve the performance and reliability of WS transactions. However, there is little research on testing WS transaction based applications. This ...
Web services transactions are used to build efficient and reliable web applications which are distributed across the Internet and are accessed by multiple simultaneous users. Current research develops various models and protocols in order to improve the performance and reliability of web services transactions. However, there is little research on testing the different models and protocols of we...
285 pages / 047114178X, 9780471141785 / Digital money: the new era of Internet commerce / 1996 / Daniel C. Lynch, Leslie Lundquist / Wiley, 1996 / Until now, commerce on the Internet has been shackled by the lack of secure transactions. This book offers an executive briefing on this vital topic. Exploring the technical underpinnings of what can and will be done on the Net, it explains the proce...
With the remarkable growth of XML data over the Internet, different application areas have resulted in a growing number of XML databases, especially those involving web-based applications. In the current mobile computing scenario, the realization of “instant” information access over a mobile network is mostly geared towards web-based applications and it is high time to discuss concurrency contr...
Secure online transactions with human users normally require visual display for verifying the correctness of central elements of the transaction before it is submitted. When commodity computer platforms get exposed to the Internet, even for a short period, there is a real and substantial risk that they become infected with malware that can modify anything on the computer, including what is disp...
Malaysia is one of the first countries in the world to blaze the trail for having a prescriptive legislation of governing the digital signature technology. Whilst the Digital Signature Act 1997 has always been acknowledged as one of the pioneers of a technology-specific legislative approach, the Act nevertheless, has been greatly exposed to numerous critiques, suggesting its inability to secure...
Businesses and governments continue to expand the use of the internet to access and provide a wide range services to consumers. This change in service delivery presents a potential access barrier for people who do not have access to the internet available in their homes. Publicly available computers attempt to bridge this gap; however, it is not clear if people are willing to use computers in t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید