Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 2 |
Descriptor
| Audits (Verification) | 2 |
| Computer Networks | 2 |
| Computer Security | 2 |
| Content Analysis | 2 |
| Differences | 2 |
| Internet | 2 |
| Corporations | 1 |
| Industry | 1 |
| Information Security | 1 |
| Policy | 1 |
| Privacy | 1 |
| More ▼ | |
Author
| Zhao, Jensen J. | 2 |
| Alexander, Melody W. | 1 |
| Truell, Allen D. | 1 |
| Woosley, Sherry A. | 1 |
| Zhao, Sherry Y. | 1 |
Publication Type
| Journal Articles | 2 |
| Reports - Research | 2 |
| Tests/Questionnaires | 1 |
Education Level
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Zhao, Jensen J.; Zhao, Sherry Y. – Journal of Education for Business, 2012
The authors assessed the "Fortune 500" corporations' retail e-commerce security to identify their strengths and weaknesses for improvement. They used online content analysis, information security auditing, and network security mapping for data collection and analysis. The findings indicate that most sites posted security policies; however, only…
Descriptors: Corporations, Retailing, Internet, Information Security
Zhao, Jensen J.; Truell, Allen D.; Alexander, Melody W.; Woosley, Sherry A. – Delta Pi Epsilon Journal, 2011
Objective: This study assessed the security vulnerability of the U.S. small companies' business-to-consumer (B2C) e-commerce network systems. Background: As the Internet technologies have been changing the way business is conducted, the U.S. small businesses are investing in such technologies and taking advantage of e-commerce to access global…
Descriptors: Computer Networks, Small Businesses, Computer Security, Internet

Peer reviewed
Direct link
