Security in E-Commerce
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 4
Abstract
Abstract: Despite the all benefits of e-commerce, the transaction and online connections provide a great space for the abuse of technology, even the criminal acts.The organizations should find out a security system, tailored to their needs and apply it.Although the service selection, tailored to the various sides of organization, is a difficult act, but the experts, the custodian of selection, implementation and organization of security information systems, should evaluate the available options accurately and choose the best one.
Authors and Affiliations
Maryam KeshtkarYamini
Dimensionality Reduction Evolution and Validation
Abstract: In this paper, proposing visualized and quantitative evaluation methods for validation dimensionalityreduction techniques performance. Four well known techniques for dimensionality reduction evaluated, verifyth...
Analysis of Bus Tracking System Using Gps on Smart Phones
Abstract: Public transport networks (PTNs) are difficult to use when the user is unfamiliar with the area they are traveling to. This is true for both infrequent users (including visitors) and regular users who need to t...
The Prospects & Problems Of Information Technology In The Banking Industry In Nigeria
Abstract: This study looks into prospects and issues of data technology within the Nigeria banking industry. Data technology has been acknowledged as a life wire of banks within the monetary sector because it promo...
Machine Learning techniques for filtering of unwanted messages in Online Social Networks
As of Recent Years, Online Social Networks have transformed into a key bit of step by step life. One key issue in today user wall(s) is to give users the ability to control the messages posted in solitude private s...
Real Time Monitoring Of Urban Water Systems for Developing Countries
Abstract: The safe and satisfactory provision of water related services in urban areas of developing countries remain a major challenge mainly attributed to limited resources and inability to promptly detect operat...