Information Security Policy for E-Commerce in Saudi Arabia
暂无分享,去创建一个
Keke Gai | Meikang Qiu | Md Liakat Ali | Kutub Thakur | Meikang Qiu | Keke Gai | M. Ali | Kutub Thakur
[1] SOUMITRA DUTTA,et al. Promoting Technology and Innovation : Recommendations to Improve Arab ICT Competitiveness , 2007 .
[2] Hossein Bidgoli,et al. Handbook of Information Security, Information Warfare, Social, Legal, and International Issues and Security Foundations (Handbook of Information Security) , 2006 .
[3] Hossein Bidgoli. Handbook of Information Security , 2005 .
[4] Michelle Bruniges,et al. Information Security Policy , 2015 .
[5] Khalid W. Alrawi,et al. E-commerce evolution: a Gulf region review , 2009, Int. J. Bus. Inf. Syst..
[6] Steve Purser. A practical guide to managing information security , 2004 .
[7] Detmar W. Straub,et al. Information Security: Policy, Processes, and Practices , 2008 .
[8] Sushil K. Sharma,et al. Handbook of Research on Information Security and Assurance , 2008 .
[9] Michael Frankfurter. Information Security Intelligence Cryptographic Principles And Applications , 2016 .
[10] Herbert J. Mattord,et al. Principles of Information Security , 2004 .
[11] Mark Button. The Foundations of Security , 2008 .
[12] Japhet Eke Lawrence,et al. Barriers to e-commerce in developing countries , 2010 .
[13] Soumitra Dutta,et al. Challenges for the Arab World , 2003 .
[14] Jeremy Nguyen,et al. Factors Influencing e‐commerce Adoption by Retailers in Saudi Arabia: a qualitative analysis , 2011, Electron. J. Inf. Syst. Dev. Ctries..
[15] Sulaiman Al-Hudhaif,et al. E-Commerce Adoption Factors in Saudi Arabia , 2011 .
[16] Mark Osborne,et al. The Information Security Policy , 2006 .
[17] T. Alhussain,et al. Identifying the Factors Influencing the Development of eGovernment in Saudi Arabia: The Employment of Grounded Theory Techniques , 2013 .