TY - BOOK AU - Williams,Godfried B. ED - SpringerLink (Online service) TI - Online Business Security Systems SN - 9780387688503 AV - QA76.9.A25 U1 - 005.8 23 PY - 2007/// CY - Boston, MA PB - Springer US KW - Computer science KW - Computer Communication Networks KW - Data protection KW - Data structures (Computer science) KW - Data encryption (Computer science) KW - Information systems KW - Computer Science KW - Systems and Data Security KW - Data Encryption KW - e-Commerce/e-business KW - Information Systems Applications (incl.Internet) KW - Data Structures, Cryptology and Information Theory N1 - Overview of Commercial Activities and Processes in Online Business -- Legal and Socio-Ethical Issues in Online Business -- Online Business Systems -- Online Business Security Technologies -- Risk Access Spots (RAS) Common to Communication Networks -- Methods of Attacks on Risk Access Spots: Online Information Warfare -- Security Risk Modelling -- Theoretical, Conceptual and Empirical Foundations of SSTM -- Simulating SSTM Using Monte Carlo -- Discussions N2 - It is common practice for online businesses to implement security systems as part of infrastructure that drive their business processes. The irony is that, implementation of online business security systems do not take into account the global nature of business operations, security risk factors associated with infrastructure type, its location, levels of standards and best practice upheld in managing online systems, skill set of technical and non-technical manpower, socio-cultural and economic dependencies as well as synergistic relationship of these factors. Consequently there is absence of a security risk model that effectively manages threats and vulnerabilities that emerge from the heterogenous and hetero-standard nature of global business infrastructure. On-Line Business Security Systems, a professional book, applies the concept of synchronization to security of global heterogeneous and hetero-standard systems by modeling the relationship of risk access spots (RAS) between advanced and developing economy's network platforms. The proposed model is more effective at securing the electronic security gap between these economies in real life applications, such as electronic fund transfer in electronic business. The process involves the identification of vulnerabilities on communication networks. This book also presents a model and simulation of an integrated approach to security and risk known as Service Server Transmission Model (SSTM). On-Line Business Security Systems is designed for a professional audience composed of researchers and practitioners in industry. This volume is also suitable for graduate-level students in computer science. Foreword by Don Anderson, President, Quantum International Corporation, Founding Member, Intellas Group, LLC, and Adel Elmaghraby, Ph.D., Chair Department of Computer Engineering and Computer Science, University of Louisville, USA UR - http://dx.doi.org/10.1007/978-0-387-68850-3 ER -