[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Olayah et al., 2022 - Google Patents

Online Security on E-CRM System

Olayah et al., 2022

View PDF
Document ID
9781789548065651295
Author
Olayah F
Anaam E
Bakhtan M
Shamsan A
Al Mudawi N
Alazeb A
Jawarneh M
Publication year
Publication venue
Telematique

External Links

Snippet

In recent decades, online security has been seen in terms of protecting the web application layer from unauthorized user threats. There are numerous advantages and benefits provided by E-CRM applications, there are indeed issues. Security is one of the most difficult …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards

Similar Documents

Publication Publication Date Title
Saini et al. Cyber-crimes and their impacts: A review
Khan Cyber security issues and challenges in E-commerce
Kathrine et al. Variants of phishing attacks and their detection techniques
Kaushik et al. Security and privacy in IoT based e-business and retail
Sood et al. Cybercrime: Dissecting the state of underground enterprise
Sengupta et al. e-Commerce security—A life cycle approach
Matbouli et al. An overview on web security threats and impact to e-commerce success
Olayah et al. Online Security on E-CRM System
Butt et al. Cyber threat ransomware and marketing to networked consumers
Ali et al. A Comprehensive review on cybersecurity issues and their mitigation measures in FinTech
Tonellotto Crime and victimization in cyberspace: a socio-criminological approach to cybercrime
Gad Crimeware marketplaces and their facilitating technologies
Rai et al. Cyber Security
Hutchings Computer security threats faced by small businesses in Australia
Pilania et al. Digitization through SNS: issues, challenges, and recommendations—a case study
Scheau et al. Phishing and e-commerce: an information security management problem
Zaeifi et al. Nothing Personal: Understanding the Spread and Use of Personally Identifiable Information in the Financial Ecosystem
Betz An analysis of the relationship between security information technology enhancements and computer security breaches and incidents
Kohli E-COMMERCE: TRANSACTION SECURITY ISSUE AND CHALLENGES.
Bolhari Electronic-supply chain information security: a framework for information
Reuvid The Secure Online Business Handbook: A Practical Guide to Risk Management and Business Continuity
Reuvid The Secure Online Business Handbook: e-commerce, IT functionality & business continuity
Maheshwaran et al. Securing E-Commerce Strategies With Cloud, Blockchain, AI, and ML
Zhang et al. Controlling Network Risk in E-commerce
Ankele et al. SoK: Cyber-Attack Taxonomy of Distributed Ledger-and Legacy Systems-based Financial Infrastructures