Internationalization of E-Commerce

Voorkant
DIANE Publishing

Vanuit het boek

Geselecteerde pagina's

Veelvoorkomende woorden en zinsdelen

Populaire passages

Pagina 6 - The journals — ECONOMIC PERSPECTIVES, GLOBAL ISSUES, ISSUES OF DEMOCRACY, US FOREIGN POLICY AGENDA, and US SOCIETY AND VALUES — provide analysis, commentary, and background information in their thematic areas.
Pagina 6 - International Home Page on the World Wide Web at http://www.usia.gov/journals/journals.htm. They are available in several electronic formats to facilitate viewing on-line, transferring, downloading, and printing.• Comments are welcome at your local US...
Pagina 22 - Again, a packet can be compared to a postcard senders provide their return address, but they can lie about it. Most of the Internet is designed merely to forward packets one step closer to their destination with no attempt to make a record of their source. There is not even a "postmark" to indicate generally where a packet originated. It requires close cooperation among sites and up-to-date equipment to trace malicious packets during an attack. Moreover, the Internet is designed to allow packets...
Pagina 33 - Law (UNCITRAL) has completed work on a model law that supports the commercial use of international contracts in electronic commerce. This model law establishes rules and norms that validate and recognize contracts formed through electronic means, sets default rules for contract formation and governance of electronic contract performance, defines the characteristics of a valid electronic writing and an original document, provides for the acceptability of electronic signatures for legal and commercial...
Pagina 36 - Import Administration, International Trade Administration, US Department of Commerce, 14th Street and Constitution Avenue NW., Washington, DC 20230; telephone: (202) 482-3797 or (202) 4821766, respectively.
Pagina 24 - E-mail Address: customer-relations@sei.cmu.edu Web Address: www.sei.cmu.edu The Software Engineering Institute (SEI) is a federally funded research and development center at Carnegie Mellon University, sponsored by the US Department of Defense through the Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics [OUSD (AT&L)]. The SEI's core purpose is to help users make measured improvements in their software engineering capabilities.
Pagina 22 - Attacks Are Low Risk Failed attempts to break into physical infrastructures involve a number of Federal offenses; such events have a long history of successful prosecutions. This is not the case for Internet intrusions. Because attacks against the Internet typically do not require the attacker to be physically present at the site of the attack, the risk of being identified is reduced. In addition, it is not always clear when certain events should be cause for alarm. For example, what appear to be...
Pagina 22 - ... undetected for weeks. They would come out at night to wander through the plant, dodging a few guards and browsing through offices for sensitive information. They would hitch a ride on the plant's vehicles to gain access to other plants, cloning themselves if they wished to be in both places at once. Internet attacks are easy in other ways. It is true that some attacks require technical knowledge the equivalent to that of a college graduate who majored in computer science but many successful attacks...
Pagina 21 - Vulnerabilities associated with the Internet put government, the military, commerce, and individual users at risk. Security measures that were appropriate for mainframe computers and small, well-defined networks inside an organization, are not effective for the Internet, a complex, dynamic world of interconnected networks with no clear boundaries and no central control. Because the Internet was not originally designed with security in mind, it is difficult to ensure the integrity, availability, and...
Pagina 22 - ... universities all over the world. To prevent attacks of this type, encryption technology must be used for both the access to other computers around the Internet (cryptographic authentication) and the transmission of data across the Internet (data encryption). Attractiveness of the Internet to Attackers Compared with other critical infrastructures, the Internet seems to be a virtual breeding ground for attackers. Although some attacks seem playful (for example, students experimenting with the capability...

Bibliografische gegevens