Issues and concerns in Internet based financial applications: an example from an auto finance system
暂无分享,去创建一个
[1] T. Monk,et al. What's next for Internet data analysis? Status and challenges facing the community , 1997 .
[2] George Lawton. Paving the Information Superhighway's Last Mile , 1998, Computer.
[3] Eugene H. Spafford,et al. Firewalls: An Expert Roundtable , 1997, IEEE Softw..
[4] Joobin Choobineh,et al. Trust in electronic commerce: definition and theoretical considerations , 1998, Proceedings of the Thirty-First Hawaii International Conference on System Sciences.
[5] Chen Wang,et al. Consumer privacy concerns about Internet marketing , 1998, CACM.
[6] Stephen J. Boies,et al. Avoiding the mistake of cloning: a case for user-centered design methods to reengineer documents , 1999, Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers.
[7] Andrew B. Whinston,et al. Marketing information on the I-Way: data junkyard or information gold mine? , 1998, CACM.
[8] Stephen J. Boies,et al. Extending User-Centered Methods beyond Interface Design to Functional Definition , 1996 .
[9] Brian Thomas. Digital Toolbox: Recipe for E-Commerce , 1997, IEEE Internet Comput..
[10] Rolf Oppliger,et al. Internet security: firewalls and beyond , 1997, CACM.
[11] William N. Robinson,et al. Creating a custom mass-production channel on the Internet , 1998, CACM.
[12] R. Wilder,et al. Wide-area Internet traffic patterns and characteristics , 1997, IEEE Netw..
[13] Sixto Ortiz. Virtual Private Networks: Leveraging the Internet , 1997, Computer.