E-commerce in safety

Bird, Jane
December 1997
Management Today;Dec1997, p54
Trade Publication
Presents information on the security of Internet-based commerce. Concerns of the business community on Internet's security; Problems associated with securing the Internet for consumers; Discussion on Internet shopping. INSET: Retailer's e-commerce web site is a hit with the night shift.


Related Articles

  • Protecting consumers in the cybermarket. Lynch, Elizabeth // OECD Observer;Oct/Nov97, Issue 208, p11 

    States that electronic commerce is likely to grow due to an increasing number of persons `surfing the Web' and looks at the development or redefining of mechanisms which will offer consumer protection. Information on the developmental stages of business-to-consumer electronic commerce;...

  • Shopping in cyberspace. Lombardi, Rosie // CA Magazine;Apr98, Vol. 131 Issue 3, p35 

    Focuses on electronic commerce. Information on commerce on the World Wide Web; Projected value of commerce in the year 2001; Questioning whether the digital certificate will assurances to consumers on the safety of Web commerce; Information on public key cryptography; Electronic verification of...

  • In the Web we trust...  // Management;Feb98, Vol. 45 Issue 1, p67 

    Focuses on the Webtrust seal of approval given to Internet traders reaching an international code of principles. Launching of Webtrust by Deloittes in New Zealand in 1998; Development of Websites' code of conduct; Coverage of criteria includes information protection; Business terms and conditions.

  • Get ready, get set, shop! Lamb, Steven // Inter@ctive Week;08/18/97, Vol. 4 Issue 28, p20 

    Discusses whether the pending Secure Electronic Transaction standard (SET), which was designed by MasterCard International and Visa International, will ensure the validity of electronic monetary transactions. Importance of security for Internet commerce; Use of digital certificates and encryption.

  • SEALs surface in the Yarra. Bowes, Chris // Bulletin with Newsweek;09/16/97, Vol. 116 Issue 6089, p38 

    Presents information on efforts of the United Nations to sort out international electronic commerce through the global trade point network (GTPNet) at the UN Conference on Secure Infrastructures for Electronic Commerce in Melbourne Australia. Why they chose Melbourne; Comments from Carlos...

  • Self-regulation touted for net privacy. Seiberg, Jaret // American Banker;6/12/1997, Vol. 162 Issue 112, p3 

    Asserts that the United States government should rely on private industry to protect the privacy of consumers who use the Internet, according to William M. Randle, of the Banking Industry Technology Secretariat. Public doubt on the ability of corporations to keep confidential data; Results of a...

  • B2B NEEDS FRAUD PROTECTION. Seminerio, Maria // eWeek;07/10/2000, Vol. 17 Issue 28, p58 

    Discusses the necessity of securing business-to-business electronic commerce transactions from fraud. Increased risk of fraud from the global commerce opportunities provided by online marketplaces; Key benefits and liabilities provided by business-to-business marketplaces. INSET: How to avoid...

  • Seller Beware Merchants Are True Victims of Internet Fraud. TROSCLAIR, ALLAN; WILLOX, NORM; FICHTMAN, PAUL // American Banker;12/15/2000, Vol. 165 Issue 240, p7 

    Contends that security and fraud concerns continue to keep many consumers from conducting transactions over the Internet despite the growth of electronic commerce. Fears on the possible interception of credit card and personal information; Concerns on the inability of Web merchants to protect...

  • Predictable denial of service attacks come as a big surprise to media, government. McClure, Stuart; Scambray, Joel // InfoWorld;02/21/2000, Vol. 22 Issue 8, p45 

    Comments on the denial of services (DoS) attacks on major Internet Web and electronic-commerce sites in February 2000 which surprised the media and the United States government. Companies affected by the attacks; Concerns about Web site security; Type of systems exploited by the attackers.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics