Abstract
Cost benefits of the security and systems management of electronic publishing Internet Web server subscription services and e-commerce.
- Coursey, D. "Keystroke Loggers" http://www.zdnet.com, January 4, 2002.Google Scholar
- Rushinek, S. and Rushinek, A. "Accounting Information System Development in EDP Auditing,"The Management Accountant, March 1983, 96-100.Google Scholar
- Rushinek, A. and Rushinek, S. "Security: Vital Controls in an Accounting Information System," Accountancy, March 1983, Vol. 94, No. 1075, 65-68.Google Scholar
- Rushinek, A. and Rushinek, S. "Performance Monitoring Tools for Computer Systems: Hardware, Software, Firmware and Hybrid Controls," Computers & Industrial Engineering, 1984, Vol. 9, No. 4, 419-524.Google ScholarCross Ref
- Rushinek, A. and Rushinek, S. "Auditing Accounting Information Systems Around, Through and With the Computer," The Ohio CPA Journal, 1984, Vol. 43, No. 2, 73-78.Google Scholar
- Rushinek, A. and Rushinek, S. "Data Capture, Preparation and Entry Controls in an Accounting Information System," Data Management, July 1984.Google Scholar
- Rushinek, S. and Rushinek, A. "Threats to Computer Security," Business, October 1984, Vol. 34, No. 4, 45-48.Google Scholar
- Rushinek, A. and Rushinek, S. "Auditing the Computerized Accounting Information System: Conceptual Foundation, Structure and Development," Modelling Simulation and Control, 1985, Vol. 4, No. 2, 1-19.Google Scholar
- Rushinek, A. and Rushinek, S. "Generalized Audit Software: It's Usage in Accounting Information Systems," Cybernetica: International Association for Cybernetics, 1985, Vol. 28, No. 3, 247-258.Google Scholar
- Rushinek, S. and Rushinek, A. "Backup and Recovery in Accounting Information Systems," Data Processing, April 1985, Vol. 27, No. 3, 42-46.Google Scholar
- Rushinek, A. and Rushinek, S. "What Makes Users Happy," Communications of the ACM, July 1986, Vol. 29, No. 7, 594-598. Google ScholarDigital Library
- Rushinek, A. and Rushinek, S. "Physical Locking/Antitheft Devices (LD) Case Study: A Product Evaluation and Selection System," Cybernetics, 1988, Vol.31, No.4.Google Scholar
- Rushinek, A. and Rushinek, S. "Evaluating Asset Safeguarding and Data Integrity in the EDP Audit", Managerial Auditing Journal, 1989, Vol. 4, No. 2, 3-6.Google ScholarCross Ref
- Rushinek, A. and Rushinek, S. "Data Encryption Features for Computer Hardware and Software Profitability: I/O ports, Expansion Slots, Algorithms, Cyphers and Security", Computers & Security, 1991, No. 10, 345-357. Google ScholarDigital Library
- Rushinek, A. and Rushinek, S. "Selecting Password/File Access Software", Corporate Controller, 1992, Vol. 4, No. 6, 33-38.Google Scholar
- Rushinek, A. and Rushinek, S. "Data Encryption (DE) Case Study: Feature Selection System (FSS) for Microcomputer Users and Manufacturers", Economic Computation and Economic Cybernetics Studies and Research, 1993, Vol. 26, No. 1, 93-115.Google Scholar
- Rushinek, A. and Rushinek, S. "Accounting Software Evaluation: Hardware, Audit Trails, Backup, Error Recovery and Security", Managerial Auditing Journal, 1995, Vol. 10, No. 9, 29-37.Google ScholarCross Ref
- Rushinek, A. and Rushinek, S. "Internet Fraud Auditing: A Simulated Health Care Industry Case Study", Journal of Forensic Accounting, 2000, Vol. 1, No. 1, 125-234.Google Scholar
Index Terms
- E-commerce security measures: are they worth it?
Recommendations
E-commerce security measures: are they worth it?
Cost benefits of the security and systems management of electronic publishing Internet Web server subscription services and e-commerce.
E-Commerce Security: A Technical Survey
IITA '08: Proceedings of the 2008 Second International Symposium on Intelligent Information Technology Application - Volume 02The electronic commerce is studied from the security issue. Based on the relationships of e-commerce security and computer network security, an E-commerce security model is presented. Then aiming at the different application environments of B2B, B2C and ...
Comments