- Full text PDF available (0)
- This year (0)
- Last 5 years (0)
- Last 10 years (3)
Journals and Conferences
Secure web sites usually use HTTPS connection to secure transactions such as money transactions, online payment, and e-commerce. The use of HTTPS gives a sense of protection against attacks such as man in the middle (MITM) attack. This paper analyzes HTTPS connections against MITM by simulating real MITM attacks on different HTTPS connections such as Gmail,… (More)
This paper reports the progress of a research that focuses on information technology (IT) adoption in Malaysian small software firms. The research provides insights into the characteristics of small software firms and the types of technology adopted in such firms.
Radio Frequency Identification (RFID) is widely used in various fields. Its application in private organizations is common. Typically, in private organizations, the impacts of RFID are quantified using measures like the Return on Investments. However, gaps on RFID's impacts on public organizations still exist. The research attempts to fill this gap. We used… (More)