HOME > 상세정보

상세정보

Trust and risk in Internet commerce

Trust and risk in Internet commerce (2회 대출)

자료유형
단행본
개인저자
Camp, L. Jean.
서명 / 저자사항
Trust and risk in Internet commerce / L. Jean Camp.
발행사항
Cambridge, Mass. :   MIT Press,   c2000.  
형태사항
xiii, 279 p. : ill. ; 24 cm.
ISBN
0262032716 (alk. paper)
서지주기
Includes bibliographical references (p. [263]-273) and index.
일반주제명
Electronic commerce -- Security measures. Internet -- Security measures. Business enterprises -- Computer networks -- Security measures.
000 00884camuu2200253 a 4500
001 000000674839
005 20001012110126
008 991014s2000 mau b 001 0 eng
010 ▼a 99052520
020 ▼a 0262032716 (alk. paper)
040 ▼a DLC ▼c DLC ▼d UKM ▼d C#P ▼d OCL ▼d 211009
049 1 ▼l 111168194
050 0 0 ▼a HF5548.32 ▼b .C355 2000
082 0 0 ▼a 005.8 ▼2 21
090 ▼a 005.8 ▼b C186t
100 1 ▼a Camp, L. Jean.
245 1 0 ▼a Trust and risk in Internet commerce / ▼c L. Jean Camp.
260 ▼a Cambridge, Mass. : ▼b MIT Press, ▼c c2000.
300 ▼a xiii, 279 p. : ▼b ill. ; ▼c 24 cm.
504 ▼a Includes bibliographical references (p. [263]-273) and index.
650 0 ▼a Electronic commerce ▼x Security measures.
650 0 ▼a Internet ▼x Security measures.
650 0 ▼a Business enterprises ▼x Computer networks ▼x Security measures.

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 중앙도서관/서고6층/ 청구기호 005.8 C186t 등록번호 111168194 (2회 대출) 도서상태 대출가능 반납예정일 예약 서비스 B M
No. 2 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 C186t 등록번호 121186454 도서상태 대출가능 반납예정일 예약 서비스 B M
No. 3 소장처 세종학술정보원/과학기술실(5층)/ 청구기호 005.8 C186t 등록번호 151088439 도서상태 대출가능 반납예정일 예약 서비스 B M ?
No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 중앙도서관/서고6층/ 청구기호 005.8 C186t 등록번호 111168194 (2회 대출) 도서상태 대출가능 반납예정일 예약 서비스 B M
No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 C186t 등록번호 121186454 도서상태 대출가능 반납예정일 예약 서비스 B M
No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 세종학술정보원/과학기술실(5층)/ 청구기호 005.8 C186t 등록번호 151088439 도서상태 대출가능 반납예정일 예약 서비스 B M ?

컨텐츠정보

책소개

As Internet-based commerce becomes commonplace, it is important that we examine the systems used for these financial transactions. Underlying each system is a set of assumptions, particularly about trust and risk. To evaluate systems, and thus to determine one's own risks, requires an understanding of the dimensions of trust: security, privacy, and reliability.

In this book Jean Camp focuses on two major yet frequently overlooked issues in the design of Internet commerce systems--trust and risk. Trust and risk are closely linked. The level of risk can be determined by looking at who trusts whom in Internet commerce transactions. Who will pay, in terms of money and data, if trust is misplaced? When the inevitable early failures occur, who will be at risk? Who is "liable" when there is a trusted third party? Why is it necessary to trust this party? What exactly is this party trusted to do? To answer such questions requires an understanding of security, record-keeping, privacy, and reliability.

The author's goal is twofold: first, to provide information on trust and risk to businesses that are developing electronic commerce systems; and second, to help consumers understand the risks in using the Internet for purchases and show them how to protect themselves. Rather than propose a single model of an Internet commerce system, the author provides the information and insights needed by merchants and consumers as they develop the Internet for commerce.


정보제공 : Aladin

목차


CONTENTS

Preface = ⅸ

Introduction = 1

1 The Internet = 5

 What Is the Internet? = 5

 What Are Its Origins? = 6

 Where Is the Internet? = 9

 Who Is on the Internet? = 14

 How Does the Internet Work? = 18

 Layers of Protocol and Stages of a Transaction = 30

 Commercial Transactions = 31

 Evaluating Information On-line = 36

 Pricing and Quality in Internet Commerce = 40

 Convergence and the Internet = 43

2 Money = 47

 Functions of Money = 47

 Digital Information Money = 51

 Money Vendors = 54

3 Basic Cryptography = 57

 Private Key Cryptography = 60

 Public Key Cryptography = 61

 Hash Functions = 63

4 Security Goals = 65

 Threats to Electronic Information Systems = 66

 Confidentiality = 68

 Availability = 70

 Scalability = 72

 Authentication = 73

 Integrity = 75

 Nonrepudiation = 76

5 Key Management Is Trust Management = 79

 Symmetric Key Management = 80

 Asymmetric Key Management = 83

 Digital Certificates = 83

 Key Length = 92

 Pseudonymity and Anonymity = 93

 Microdata Security = 95

6 Privacy Perspectives = 99

 Law Enforcement : Trust Us = 101

 The Business Community : Trust Me = 105

 System Designers : Ignore Me = 107

 Social Critics : Trust for the Common Good = 108

 Europeans : Limit Trust = 110

7 Privacy in Law, Privacy in Practice = 115

 State Law = 117

 Federal Law = 121

 Privacy and Information Technology = 130

8 Data Reporting : Trusting the Government = 145

 Required Information Reporting = 145

 Reporting Examples = 152

 Reconsidering Requirements = 157

 Cryptography Policy = 163

 Disclosure Summary = 166

9 Transactions = 169

 Reliability = 170

 Scalability = 174

 Divisibility = 175

 Interoperability = 176

 Open Systems, Standards, and Proteocols = 179

10 Examination of Internet Commerce Systems = 183

 Distincions among Commerce Systems = 184

 Analyses of Various Systems = 186

 Example Analyses = 190

 Credit Cards : A Notational System = 190

 Cash : A Token System = 199

 Summary = 204

11 Internet Currencies = 207

 Notational Currencies = 207

 First Virtual = 207

 Secure Sockets Layer = 215

 Secure Electronic Transaction = 220

 Token Currencies = 230

 Digicash = 232

 MicroMint = 237

 Millicent = 246

 Summary = 250

12 The Coming Collapse in Internet Commerce = 255

References = 263

Index = 275



관련분야 신착자료

Harvard Business Review (2025)