Journal of Engineering and Applied Sciences

Year: 2018
Volume: 13
Issue: 13
Page No. 4939 - 4948

Internet of Things-Security and Trust in e-Business

Authors : Ali Shawket Thiab, Zeratul Izzah Mohd. Yusoh and Abdul Samad Bin Shibghatullah

References

Anderson, J.Q. and H. Rainie, 2014. The internet of things will thrive by 2025. Pew Research Center, Washington, USA.

Andert, D., R. Wakefield and J. Weise, 2002. Trust modeling for security architecture development. Master Thesis, Stanford University, Stanford, California.

Ansari, J.A., 2015. Web Penetration Testing with Kali Linux. 2nd Edn., Packt Publishing, Birmingham, England, ISBN:9781783988525, Pages: 312.

Ashayeri, J. and G. Tuzkaya, 2011. Design of demand driven return supply chain for high-tech products. J. Ind. Eng. Manage., 4: 481-503.
Direct Link  |  

Atzori, L., A. Iera and G. Morabito, 2010. The internet of things: A survey. Comput. Networks, 54: 2787-2805.
CrossRef  |  Direct Link  |  

Bossomaier, T. and B.A. Hope, 2015. Online GIS and Spatial Metadata. 2nd Edn., CRC Press, Boca Raton, Florida, USA., ISBN:9781482220162, Pages: 414.

Conner, M., 2010. Sensors empower the internet of things. Electr. Des. News, 55: 32-37.

Costa, E.D., 2016. Global E-Commerce Strategies for Small Businesses. MIT Press, Cambridge, Massachusetts, USA., Pages: 198.

Daugherty, P.J., R.G. Richey, S.E. Genchev and H. Chen, 2005. Reverse logistics: Superior performance through focused resource commitments to information technology. Transp. Res. Part E. Logist. Rev., 41: 77-92.
Direct Link  |  

Davidson, M.A., 2001. Database security for E-business. Oracle Corporation, Redwood City, California, USA.

Eben, O., 2003. A systematic approach to E-business security. Master Thesis, University of New Brunswick, Fredericton, Canada.

Emmerson, B., 2010. M2M: The internet of 50 billion devices. WinWin Mag., 1: 19-22.
Direct Link  |  

Geistfeld, M.A., 2016. Protecting confidential information entrusted to others in business transactions: Data breaches, identity theft and tort liability. DePaul L. Rev., 66: 385-721.
Direct Link  |  

Gillman, D., Y. Lin, B. Maggs and R.K. Sitaraman, 2015. Protecting websites from attack with secure delivery networks. Comput., 48: 26-34.
CrossRef  |  Direct Link  |  

Grieco, L.A., M.B. Alaya, T. Monteil and K. Drira, 2014. Architecting information centric ETSI-M2M systems. Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), March 24-28, 2014, IEEE, Budapest, Hungary, ISBN:978-1-4799-2737-1, pp: 211-214.

Hagi, S., 2005. Engineering E-business applications for security. IBM Canada Ltd, Ottawa, Canada,.

Hersent, O., D. Boswarthick and O. Elloumi, 2011. The Internet of Things: Key Applications and Protocols. John Wiley & Sons, Hoboken, New Jersey,.

Kadhim, A.M. and M.Z. Al-Taie, 2013. Factors disrupting a successful implementation of E-commerce in Iraq. J. Econ., 1: 1-14.

Lord, P., A. Mary and B. Kristy, 2002. Managing E-business security challenges. Oracle Corporation, Redwood City, California.

Loukas, G., 2015. Cyber-physical Attacks: A Growing Invisible Threat. Elsevier, Amsterdam, Netherlands, ISBN:9780128014639, Pages: 270.

Mayer, R.C., J.H. Davis and F.D. Schoorman, 1995. An integrative model of organizational trust. Acad. Manage. Rev., 20: 709-734.
Direct Link  |  

Miorandi, D., S. Sicari, F. De Pellegrini and I. Chlamtac, 2012. Internet of things: Vision, applications and research challenges. Ad Hoc Networks, 10: 1497-1516.
CrossRef  |  

Mukherjee, A. and P. Nath, 2007. Role of electronic trust in online retailing: A re-examination of the commitment-trust theory. Eur. J. Market., 41: 1173-1202.
CrossRef  |  

Nieles, M., K.L. Dempsey and V.Y. Pillitteri, 2017. An introduction to information security. MIT Thesis, National Institute of Science and Technology, Berhampur, India.

Palattella, M.R., N. Accettura, X. Vilajosana, T. Watteyne and L.A. Grieco et al., 2013. Standardized protocol stack for the internet of (important) things. IEEE. Commun. Surv. Tutorials, 15: 1389-1406.
CrossRef  |  Direct Link  |  

Roman, R., J. Zhou and J. Lopez, 2013. On the features and challenges of security and privacy in distributed internet of things. Comput. Netw., 57: 2266-2279.
Direct Link  |  

Sharma, A. and P. Misra, 2014. A security framework for E-business applications. Intl. J. Comput. Appl., 102: 30-34.
Direct Link  |  

Shelanski, H.A., 2013. Information, innovation and competition policy for the internet. Univ. Pennsylvania Law Rev., 161: 1663-1705.
Direct Link  |  

Smith, A.D. and W.T. Rupp, 2003. E-lending: Foundations of financial and consumer marketing in an information intensive society. J. E. Bus. Inf. Technol., 3: 5-19.
Direct Link  |  

So, M.W. and D. Sculli, 2002. The role of trust, quality, value and risk in conducting E-business. Ind. Manage. Data Syst., 102: 503-512.
Direct Link  |  

Srinivasan, S., 2004. Role of trust in E-business success. Inf. Manage. Comput. Secur., 12: 66-72.
Direct Link  |  

Stankovic, J.A., 2014. Research directions for the internet of things. IEEE. Internet Things J., 1: 3-9.
CrossRef  |  Direct Link  |  

Tan, L. and N. Wang, 2010. Future internet: The internet of things. Proceedings of the 3rd International Conference on Advanced Computer Theory and Engineering, August 20-22, 2010, Chengdu, China, pp: 376-380.

Tsiakis, T. and G. Sthephanides, 2005. The concept of security and trust in electronic payments. Comput. Secur., 24: 10-15.
Direct Link  |  

Velmurugan, M.S., 2009. Security and trust in E-business: Problems and prospects. Intl. J. Electron. Bus. Manage., 7: 151-158.
Direct Link  |  

Voeller, J.G., 2014. Cyber Security. John Wiley & Sons, Hoboken, New Jersey, USA.,.

Winch, G. and P. Joyce, 2006. Exploring the dynamics of building, and losing, consumer trust in B2C E-business. Intl. J. Retail Distrib. Manage., 34: 541-555.
Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved