TITLE

Growing Internet Market, Competition Demand Web Presence

AUTHOR(S)
O'Connel, Tim
PUB. DATE
April 2002
SOURCE
SDM: Security Distributing & Marketing;Apr2002, Vol. 32 Issue 4, p11
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Focuses on the rapid evolution of the electronic security industry in the U.S. Integration of traditional components with computer networks; Impact of the Internet on the slow capitalization of medium-sized security businesses; Challenges of establishing and maintaining business presence in the Internet.
ACCESSION #
6586938

 

Related Articles

  • Schutz vor Zahlungsausf√ɬ§llen.  // Die Bank;apr2012, Issue 4, p57 

    The article discusses protections for cash loss by clients of retailers using online electronic payment systems. Topics include the type and number of business conducting electronic commerce, the challenges faced by online retailer, the money counting procedures applicable to online payments,...

  • Centralized Worldwide Security.  // Security: Solutions for Enterprise Security Leaders;Jul2001, Vol. 38 Issue 7, p25 

    Focuses on the single, global solution provided by Continuum for the security management of San Francisco, California-based Digital Island, the world's premier electronic-business service organization. Dedicated private networking and data centers; Value of the security and the transactions...

  • Online trading: an easier way to buy and sell equipment. Russell, David // Equipment Services;Apr2012, p42 

    No abstract available.

  • Electronic Signatures Law May Boost Paperless HR Departments. Leonard, Bill // HR Magazine;Nov2000, Vol. 45 Issue 11, p40 

    Discusses the enactment of the Electronic Signatures in Global and National Commerce Act in the United States (U.S.). Effect of the law on human resources departments; Impact of the law on the processing of electronic benefits in the human resources departments; Provisions of the law.

  • Looking Beyond Technology: Barriers of E-Commerce Privacy in Building E-Loyalty Intention on Internet Banking. Al-Khasawneh, Ahmad // International Journal of Software Engineering & Its Applications;2014, Vol. 8 Issue 8, p65 

    Privacy is considered now a key differentiator in electronic commerce, and it is vital for building and maintaining customer's loyalty. Since online transactions involve many uncertainties for the customer and most of the Internet banking offers the same product as the other competitor, it is...

  • Visa tackles security to build online profile. Hargrave-Silk, Atifa // Media: Asia's Media & Marketing Newspaper;11/28/2003, p16 

    Competition between credit card companies looks set to intensify as Visa Inc. kicks off a marketing campaign for the launch of a security system aimed at improving consumer confidence online. Visa's online protection service, already available in Korea, Taiwan, Singapore and the U.S., works by...

  • Canada Life opens protection portal. McMillan, Paul // Money Marketing;4/6/2006, p23 

    The article reports on the setting up of the adviser web portal for group protection business by the Canada Life. The provider have launched the modules to solve the difficulty in transacting business and hopes will be a complete end-to-end service for group risk. The portal will test and run...

  • Security Safeguards on e-Payment Systems in Malaysia: Analysis on the Payment Systems Act 2003. Zulhuda, Sonny; Azmi, Ida Madieha Abdul Ghani // Journal of International Commercial Law & Technology;Oct2011, Vol. 6 Issue 4, p187 

    Central to the infrastructure of electronic commerce activities is the electronic payment system. This encompasses not only the issues of technical sophistication but also legal readiness. In the context of electronic commerce environment in Malaysia, this paper seeks to highlight and examine...

  • Mobisecure using DSA. Panchal, Pranoti // International Journal of Advanced Research in Computer Science;Nov/Dec2015, Vol. 6 Issue 8, p88 

    There are many benefits of mobile devices one among them is it is available to everyone, wherever and whenever we want. Use of these devices is still new and methodology for security in the data transfer between them does not still give confidence and trust to users. Hence without an efficient...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics