skip to main content
editorial
Open Access

E-commerce security measures: are they worth it?

Published:23 September 2018Publication History
Skip Abstract Section

Abstract

Cost benefits of the security and systems management of electronic publishing Internet Web server subscription services and e-commerce.

References

  1. Coursey, D. "Keystroke Loggers" http://www.zdnet.com, January 4, 2002.Google ScholarGoogle Scholar
  2. Rushinek, S. and Rushinek, A. "Accounting Information System Development in EDP Auditing,"The Management Accountant, March 1983, 96-100.Google ScholarGoogle Scholar
  3. Rushinek, A. and Rushinek, S. "Security: Vital Controls in an Accounting Information System," Accountancy, March 1983, Vol. 94, No. 1075, 65-68.Google ScholarGoogle Scholar
  4. Rushinek, A. and Rushinek, S. "Performance Monitoring Tools for Computer Systems: Hardware, Software, Firmware and Hybrid Controls," Computers & Industrial Engineering, 1984, Vol. 9, No. 4, 419-524.Google ScholarGoogle ScholarCross RefCross Ref
  5. Rushinek, A. and Rushinek, S. "Auditing Accounting Information Systems Around, Through and With the Computer," The Ohio CPA Journal, 1984, Vol. 43, No. 2, 73-78.Google ScholarGoogle Scholar
  6. Rushinek, A. and Rushinek, S. "Data Capture, Preparation and Entry Controls in an Accounting Information System," Data Management, July 1984.Google ScholarGoogle Scholar
  7. Rushinek, S. and Rushinek, A. "Threats to Computer Security," Business, October 1984, Vol. 34, No. 4, 45-48.Google ScholarGoogle Scholar
  8. Rushinek, A. and Rushinek, S. "Auditing the Computerized Accounting Information System: Conceptual Foundation, Structure and Development," Modelling Simulation and Control, 1985, Vol. 4, No. 2, 1-19.Google ScholarGoogle Scholar
  9. Rushinek, A. and Rushinek, S. "Generalized Audit Software: It's Usage in Accounting Information Systems," Cybernetica: International Association for Cybernetics, 1985, Vol. 28, No. 3, 247-258.Google ScholarGoogle Scholar
  10. Rushinek, S. and Rushinek, A. "Backup and Recovery in Accounting Information Systems," Data Processing, April 1985, Vol. 27, No. 3, 42-46.Google ScholarGoogle Scholar
  11. Rushinek, A. and Rushinek, S. "What Makes Users Happy," Communications of the ACM, July 1986, Vol. 29, No. 7, 594-598. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Rushinek, A. and Rushinek, S. "Physical Locking/Antitheft Devices (LD) Case Study: A Product Evaluation and Selection System," Cybernetics, 1988, Vol.31, No.4.Google ScholarGoogle Scholar
  13. Rushinek, A. and Rushinek, S. "Evaluating Asset Safeguarding and Data Integrity in the EDP Audit", Managerial Auditing Journal, 1989, Vol. 4, No. 2, 3-6.Google ScholarGoogle ScholarCross RefCross Ref
  14. Rushinek, A. and Rushinek, S. "Data Encryption Features for Computer Hardware and Software Profitability: I/O ports, Expansion Slots, Algorithms, Cyphers and Security", Computers & Security, 1991, No. 10, 345-357. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Rushinek, A. and Rushinek, S. "Selecting Password/File Access Software", Corporate Controller, 1992, Vol. 4, No. 6, 33-38.Google ScholarGoogle Scholar
  16. Rushinek, A. and Rushinek, S. "Data Encryption (DE) Case Study: Feature Selection System (FSS) for Microcomputer Users and Manufacturers", Economic Computation and Economic Cybernetics Studies and Research, 1993, Vol. 26, No. 1, 93-115.Google ScholarGoogle Scholar
  17. Rushinek, A. and Rushinek, S. "Accounting Software Evaluation: Hardware, Audit Trails, Backup, Error Recovery and Security", Managerial Auditing Journal, 1995, Vol. 10, No. 9, 29-37.Google ScholarGoogle ScholarCross RefCross Ref
  18. Rushinek, A. and Rushinek, S. "Internet Fraud Auditing: A Simulated Health Care Industry Case Study", Journal of Forensic Accounting, 2000, Vol. 1, No. 1, 125-234.Google ScholarGoogle Scholar

Index Terms

  1. E-commerce security measures: are they worth it?

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            • Published in

              cover image Ubiquity
              Ubiquity  Volume 2002, Issue November
              November 1- November 30, 2002
              EISSN:1530-2180
              DOI:10.1145/763948
              Issue’s Table of Contents

              Copyright © 2002 Authors

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 23 September 2018

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • editorial
            • Article Metrics

              • Downloads (Last 12 months)19
              • Downloads (Last 6 weeks)2

              Other Metrics

            HTML Format

            View this article in HTML Format .

            View HTML Format