Olayah et al., 2022 - Google Patents
Online Security on E-CRM SystemOlayah et al., 2022
View PDF- Document ID
- 9781789548065651295
- Author
- Olayah F
- Anaam E
- Bakhtan M
- Shamsan A
- Al Mudawi N
- Alazeb A
- Jawarneh M
- Publication year
- Publication venue
- Telematique
External Links
Snippet
In recent decades, online security has been seen in terms of protecting the web application layer from unauthorized user threats. There are numerous advantages and benefits provided by E-CRM applications, there are indeed issues. Security is one of the most difficult …
- 238000011160 research 0 abstract description 17
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Saini et al. | Cyber-crimes and their impacts: A review | |
Khan | Cyber security issues and challenges in E-commerce | |
Kathrine et al. | Variants of phishing attacks and their detection techniques | |
Kaushik et al. | Security and privacy in IoT based e-business and retail | |
Sood et al. | Cybercrime: Dissecting the state of underground enterprise | |
Sengupta et al. | e-Commerce security—A life cycle approach | |
Matbouli et al. | An overview on web security threats and impact to e-commerce success | |
Olayah et al. | Online Security on E-CRM System | |
Butt et al. | Cyber threat ransomware and marketing to networked consumers | |
Ali et al. | A Comprehensive review on cybersecurity issues and their mitigation measures in FinTech | |
Tonellotto | Crime and victimization in cyberspace: a socio-criminological approach to cybercrime | |
Gad | Crimeware marketplaces and their facilitating technologies | |
Rai et al. | Cyber Security | |
Hutchings | Computer security threats faced by small businesses in Australia | |
Pilania et al. | Digitization through SNS: issues, challenges, and recommendations—a case study | |
Scheau et al. | Phishing and e-commerce: an information security management problem | |
Zaeifi et al. | Nothing Personal: Understanding the Spread and Use of Personally Identifiable Information in the Financial Ecosystem | |
Betz | An analysis of the relationship between security information technology enhancements and computer security breaches and incidents | |
Kohli | E-COMMERCE: TRANSACTION SECURITY ISSUE AND CHALLENGES. | |
Bolhari | Electronic-supply chain information security: a framework for information | |
Reuvid | The Secure Online Business Handbook: A Practical Guide to Risk Management and Business Continuity | |
Reuvid | The Secure Online Business Handbook: e-commerce, IT functionality & business continuity | |
Maheshwaran et al. | Securing E-Commerce Strategies With Cloud, Blockchain, AI, and ML | |
Zhang et al. | Controlling Network Risk in E-commerce | |
Ankele et al. | SoK: Cyber-Attack Taxonomy of Distributed Ledger-and Legacy Systems-based Financial Infrastructures |