DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, H | ko |
dc.contributor.author | Han, Y | ko |
dc.contributor.author | Choi, M | ko |
dc.contributor.author | Kim, Sehun | ko |
dc.date.accessioned | 2007-11-20T06:06:35Z | - |
dc.date.available | 2007-11-20T06:06:35Z | - |
dc.date.created | 2012-02-06 | - |
dc.date.created | 2012-02-06 | - |
dc.date.issued | 2007-03 | - |
dc.identifier.citation | IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E90D, pp.668 - 675 | - |
dc.identifier.issn | 0916-8532 | - |
dc.identifier.uri | http://hdl.handle.net/10203/2052 | - |
dc.description.abstract | Due to the exponentially increasing threat of cyber attacks, many e-commerce organizations around the world have begun to recognize the importance of information security. When considering the importance of security in e-commerce, we need to train e-commerce security experts who can help ensure the reliable deployment of e-commerce. The purpose of this research is to design and evaluate an e-commerce security curriculum useful in training e-commerce security experts. In this paper, we use a phase of the Delphi method and the Analytic Hierarchy Process (AHP) method. To validate our results, we divide the respondents into two groups and compare the survey results. | - |
dc.description.sponsorship | This research was supported by the MIC (Ministry of Information and Communication), Korea, under the ITRC (Information Technology Research Center) support program supervised by the IITA (Institute of Information Technology Assessment). | en |
dc.language | English | - |
dc.language.iso | en_US | en |
dc.publisher | IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG | - |
dc.title | Curriculum design and evaluation for e-commerce security education using AHP | - |
dc.type | Article | - |
dc.identifier.wosid | 000245194600006 | - |
dc.identifier.scopusid | 2-s2.0-33947135863 | - |
dc.type.rims | ART | - |
dc.citation.volume | E90D | - |
dc.citation.beginningpage | 668 | - |
dc.citation.endingpage | 675 | - |
dc.citation.publicationname | IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS | - |
dc.identifier.doi | 10.1093/ietisy/e90-d.3.668 | - |
dc.embargo.liftdate | 9999-12-31 | - |
dc.embargo.terms | 9999-12-31 | - |
dc.contributor.localauthor | Kim, Sehun | - |
dc.contributor.nonIdAuthor | Kim, H | - |
dc.contributor.nonIdAuthor | Han, Y | - |
dc.contributor.nonIdAuthor | Choi, M | - |
dc.type.journalArticle | Article | - |
dc.subject.keywordAuthor | e-commerce security education | - |
dc.subject.keywordAuthor | curriculum design | - |
dc.subject.keywordAuthor | AHP method | - |
dc.subject.keywordAuthor | Delphi method | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.