TITLE

Order online with electronic commerce

AUTHOR(S)
Patrick, O'Toole
PUB. DATE
December 1997
SOURCE
SDM: Security Distributing & Marketing;Dec1997, Vol. 27 Issue 15, p69
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Discusses the use of computer technology in the distribution segment of the alarm industry. Limitation of electronic commerce to larger trading partners; Transacting by logging on to Web sites and Extranets; Publication of North Supply's first CD-ROM-based catalog of alarm products.
ACCESSION #
79812

 

Related Articles

  • E-Commerce: Is It for You? Martinez, Renee // JCK;May2006, Vol. 177 Issue 5, p378 

    The article discusses the benefits and pitfalls of e-commerce. The benefits include ease of communication, increase in market share, increase in productivity, constant updating and decreased human contact. Some of the pitfalls are security concerns, and potential for fraud and consumers cannot...

  • SMEs get security guidance. Thomas, Daniel // Computer Weekly;4/4/2002, p8 

    Reports the security guidance of the Alliance for Electronic Business to small companies in Great Britain. Implementation of Internet security policies; Access to information technology; Provision of commercial and practical advice.

  • Securing Web services.  // Network World;9/23/2002, Vol. 19 Issue 38, p64 

    Focuses on the creation of security standards in Web services framework. Development of Web services standard for electronic business; Use of electronic data interplay for partner-to-partner trading; Limitation of Web services to Intranet.

  • E-Commerce Risks Overstated But Real . SMITH, MICHAEL // American Banker;10/1/1999, Vol. 164 Issue 189, p6 

    Examines the risks associated with electronic commerce. Estimated loss through fraud; Companies that have invested in security systems and services; Security benefits provided by the public key infrastructure; Approaches used to increase security in electronic commerce transactions; Compliance...

  • Certicom introduces security products at show.  // RCR Wireless News;9/25/2000, Vol. 19 Issue 39, p109 

    Features the products for wireless electronic commerce security introduced by Certicom Corp. at the PKS 2000 show in San Jose, California. Use of the MobileTrust Certificate Authority in protecting wireless Internet transactions; Agreement with ePocrates, a handheld physician network; Features...

  • Growing Internet Market, Competition Demand Web Presence. O'Connel, Tim // SDM: Security Distributing & Marketing;Apr2002, Vol. 32 Issue 4, p11 

    Focuses on the rapid evolution of the electronic security industry in the U.S. Integration of traditional components with computer networks; Impact of the Internet on the slow capitalization of medium-sized security businesses; Challenges of establishing and maintaining business presence in the...

  • e-commerce: Who's BUYING In? Kolettis, Helen // SDM: Security Distributing & Marketing;Jan2001, Vol. 31 Issue 1, p52 

    Discusses advantages and disadvantages of e-commerce for the security systems industry in the United States. Different methods of e-commerce; E-commerce site of the future; Future of e-commerce. INSET: Great Walls of Fire.

  • The Implementation of Deming's System Model to improve Security Management: A Case Study. Tang, Jenn // International Journal of Management;Mar2008, Vol. 25 Issue 1, p54 

    Threats to information security are increasing with the development of information technology and a greater dependence on the Internet. We report on a case-study of a telecommunications marketing company which has successfully changes from being a traditional trading company to a company that...

  • The Effects of Security and Privacy Information on Trust & Trustworthiness and Loyalty in Online Marketing in Malaysia. Armesh, Hamed; Salarzehi, Habibollah; Yaghoobi, Noor Mohammad; heydari, Alireza; Nikbin, Davoud // International Journal of Marketing Studies;Nov2010, Vol. 2 Issue 2, p223 

    The internet is a medium that is soaring in polarity in almost every facet of the world and is used for a myriad of reasons by individuals, governments, universities and businesses. As far as businesses are concerned, the internet has been subject to a variety of experimentations that seek to...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics