The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Operationally Critical Threat, Asset and Vulnerability Evaluation (OCTAVE) is introduced, together with its feasibility and deficiency when used in information security risk assessing for E-Government. AHP is imported to build a Risk Assessment Model of Information Security for E-Government based on OCTAVE, the value of information assets is defined by significance, confidentiality, integrality and...
E-relationship marketing is mainly composed of customer relationship management and customer trust and loyalty. Here, customer relationship management doesn't just stand for CRM system. Thinking about the cost, instant messaging, viral marketing, email marketing, will again help maximize the efficiency in E-relationship marketing.
This article, from the prospect of P2P e-commerce advantages and challenges, discusses the risks of P2P e-commerce issues, and points out that trust is the basis of all business activities. Business organizations should take certain measures against risks from P2P e-commerce. The effective confidence-building mechanism can enable e-commerce more secure, reduce the risk of people's expectations, and...
Attack model is the foundation for organizing and implementing attacks against the target system in Attack Resistance Test. By redefining the node of the attack tree model and redescribing the relation of the attack tree nodes, we build a penetration attack tree model which can describe, organize, classify, manage and schedule the attacks for Attack Resistance Test. The organization method of the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.