Mengamankan Transaksi di Internet: Suatu Tinjauan Terhadap Justifikasi dan Metode

Authors

  • Adi Cahyadi Bina Nusantara University

DOI:

https://doi.org/10.21512/tw.v5i1.3826

Keywords:

internet, transaction, justification, method

Abstract

Securing internet transaction has become more crucial considering the rise of cyber crime. Although many business owners have become aware of this, the implementation of security technology especially in developing countries is still somewhat slow and this is not apart from the fact that securing electronic transaction is costly. Improper consulting practice has also resulted in an overspending of budget for security projects. This article tries to shed some light to its readers and business owners on the proper practice of evaluating a security investment, selecting an appropriate security solution as well as introducing major methods of securing an electronic transaction.

Dimensions

Plum Analytics

References

Bayan, Ruby. 2004. “How to Choose the Best Security Solution.” ZDNET online publication, URL: Http://www.zdnet.com.au/insight/0.39023731.20282525.00.htm

Fink, Dieter. 1998. E-Commerce Security. Australian Print Group.

Radcliff, Deborah. 2002. Choosing The Best Security Guards: IT Tackles Management Issues Via Service Providers. Computerworld Publication.

Turban, Efraim. 2002. Electronic Commerce A Managerial Perspective. Prentice Hall.

Downloads

Published

2004-03-31
Abstract 297  .
PDF downloaded 428  .