Sold Out
Book Categories |
Preface | ix | |
Introduction | 1 | |
1 | The Internet | 5 |
What Is the Internet? | 5 | |
What Are Its Origins? | 6 | |
Where Is the Internet? | 9 | |
Who Is on the Internet? | 14 | |
How Does the Internet Work? | 18 | |
Layers of Protocol and Stages of a Transaction | 30 | |
Commercial Transactions | 31 | |
Evaluating Information On-line | 36 | |
Pricing and Quality in Internet Commerce | 40 | |
Convergence and the Internet | 43 | |
2 | Money | 47 |
Functions of Money | 47 | |
Digital Information Money | 51 | |
Money Vendors | 54 | |
3 | Basic Cryptography | 57 |
Private Key Cryptography | 60 | |
Public Key Cryptography | 61 | |
Hash Functions | 63 | |
4 | Security Goals | 65 |
Threats to Electronic Information Systems | 66 | |
Confidentiality | 68 | |
Availability | 70 | |
Scalability | 72 | |
Authentication | 73 | |
Integrity | 75 | |
Nonrepudiation | 76 | |
5 | Key Management Is Trust Management | 79 |
Symmetric Key Management | 80 | |
Asymmetric Key Management | 83 | |
Digital Certificates | 83 | |
Key Length | 92 | |
Pseudonymity and Anonymity | 93 | |
Microdata Security | 95 | |
6 | Privacy Perspectives | 99 |
Law Enforcement: Trust Us | 101 | |
The Business Community: Trust Me | 105 | |
System Designers: Ignore Me | 107 | |
Social Critics: Trust for the Common Good | 108 | |
Europeans: Limit Trust | 110 | |
7 | Privacy in Law, Privacy in Practice | 115 |
State Law | 117 | |
Federal Law | 121 | |
Privacy and Information Technology | 130 | |
8 | Data Reporting: Trusting the Government | 145 |
Required Information Reporting | 145 | |
Reporting Examples | 152 | |
Reconsidering Requirements | 157 | |
Cryptography Policy | 163 | |
Disclosure Summary | 166 | |
9 | Transactions | 169 |
Reliability | 170 | |
Scalability | 174 | |
Divisibility | 175 | |
Interoperability | 176 | |
Open Systems, Standards, and Protocols | 179 | |
10 | Examination of Internet Commerce Systems | 183 |
Distinctions among Commerce Systems | 184 | |
Analyses of Various Systems | 186 | |
Example Analyses | 190 | |
Credit Cards: A Notational System | 190 | |
Cash: A Token System | 199 | |
Summary | 204 | |
11 | Internet Currencies | 207 |
Notational Currencies | 207 | |
First Virtual | 207 | |
Secure Sockets Layer | 215 | |
Secure Electronic Transaction | 220 | |
Token Currencies | 230 | |
Digicash | 232 | |
MicroMint | 237 | |
Millicent | 246 | |
Summary | 250 | |
12 | The Coming Collapse in Internet Commerce | 255 |
References | 263 | |
Index | 275 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionTrust and Risk in Internet Commerce
X
This Item is in Your InventoryTrust and Risk in Internet Commerce
X
You must be logged in to review the productsX
X
X
Add Trust and Risk in Internet Commerce, , Trust and Risk in Internet Commerce to the inventory that you are selling on WonderClubX
X
Add Trust and Risk in Internet Commerce, , Trust and Risk in Internet Commerce to your collection on WonderClub |