作者: Efraim Turban , David King , Jae Kyu Lee , Ting-Peng Liang , Deborrah C. Turban
DOI: 10.1007/978-3-319-10091-3_10
关键词:
摘要: Upon completion of this chapter, you will be able to: 1. Understand the importance and scope security information systems for EC. 2. Describe major concepts terminology EC security. 3. Understand about threats, vulnerabilities, technical attacks. 4. Understand Internet fraud, phishing, spam. 5. Describe assurance principles. 6. Describe technologies protection networks, including access control. 7. Describe various types controls special defense mechanisms. 8. Describe consumer seller from fraud. 9. Discuss enterprisewide implementation issues security. 10. Understand why it is so difficult to stop computer crimes. 11. Discuss future EC.