Academic literature on the topic 'E-mail marketing messages'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'E-mail marketing messages.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "E-mail marketing messages"

1

Rosário, Albérico Travassos. "E-Mail Marketing." International Journal of Online Marketing 11, no. 4 (2021): 63–83. http://dx.doi.org/10.4018/ijom.2021100104.

Full text
Abstract:
Email marketing is a considerable development and includes direct emails, transactional emails, and email newsletters to attract new customers and retain existing ones. This research paper aims to identify and synthesize literature on the effectiveness of email marketing and potential challenges affecting its proper implementation. The research establishes that businesses in the current business environment recognize email marketing's capacity to produce a higher return on investment and generate more sales than traditional marketing channels, such as television. The adoption of permission-bas
APA, Harvard, Vancouver, ISO, and other styles
2

Andersson, Martin, Martin Fredriksson, and Adele Berndt. "Open or Delete: Decision-makers’ Attitudes Towards E-mail Marketing Messages." Advances in Social Sciences Research 1, no. 3 (2014): 133–44. http://dx.doi.org/10.14738/assrj.13.201.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Scheinbaum, Angeline Close, Stefan Hampel, and Mihyun Kang. "Future developments in IMC: why e-mail with video trumps text-only e-mails for brands." European Journal of Marketing 51, no. 3 (2017): 627–45. http://dx.doi.org/10.1108/ejm-09-2015-0624.

Full text
Abstract:
Purpose Marketers use e-mail in new, potentially more informative, entertaining and lucrative ways – such as embedding video. The purpose of this paper is to examine consumer responses to audiovisual (i.e. text along with a short video) versus text-only messages in brand communication. Specifically, authors seek to uncover the efficacy of marketer-embedded video (vs text-only) in e-mail on the consumer's product interest, informativeness, perceived prestige, electronic word-of-mouth (e-WOM) intentions and willingness to pass the electronic message along digitally or on social media. With the d
APA, Harvard, Vancouver, ISO, and other styles
4

José-Cabezudo, Rebeca San, and Carmen Camarero-Izquierdo. "Determinants of Opening-Forwarding E-Mail Messages." Journal of Advertising 41, no. 2 (2012): 97–112. http://dx.doi.org/10.2753/joa0091-3367410207.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Clarke, Irvine, Theresa B. Flaherty, and Michael T. Zugelder. "The CAN-SPAM Act: New rules for sending commercial e-mail messages and implications for the sales force." Industrial Marketing Management 34, no. 4 (2005): 399–405. http://dx.doi.org/10.1016/j.indmarman.2004.09.018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Glassman, Tavis J., Tom Castor, Monita Karmakar, et al. "A Social Marketing Intervention to Prevent Drowning Among Inner-City Youth." Health Promotion Practice 19, no. 2 (2017): 175–83. http://dx.doi.org/10.1177/1524839917732559.

Full text
Abstract:
Background. Water-related injuries and fatalities pose serious public health issues, especially to African American youth, a demographic group that drowns at disproportionately high rates. Aim. The purpose of this study was to determine if a social marketing intervention targeting the parents and guardians of inner-city youth (U.S. Midwest) could positively influence their perceptions concerning water safety. Method. Researchers employed a quasi-experimental design using matched pairs to evaluate the intervention. Participants consisted of parents who enrolled their children in a six-session s
APA, Harvard, Vancouver, ISO, and other styles
7

Song, Ji Hee, Hye Young Kim, Sahangsoon Kim, Sung Won Lee, and Jong-Ho Lee. "Effects of personalized e-mail messages on privacy risk: Moderating roles of control and intimacy." Marketing Letters 27, no. 1 (2014): 89–101. http://dx.doi.org/10.1007/s11002-014-9315-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ištvanić, Marin, Dominika Crnjac Milić, and Zdravko Krpić. "Digital Marketing in the Business Environment." International journal of electrical and computer engineering systems 8, no. 2 (2017): 67–75. http://dx.doi.org/10.32985/ijeces.8.2.4.

Full text
Abstract:
Promotion of products has become an increasingly important component in the new digital age, mostly thanks to digital marketing. The traditional form of marketing is lagging behind digital marketing, which offers users new opportunities like personalized messages or answers to a search query. There are several ways to advertise on the internet, and in this paper, ways and tools will be presented that allow digital advertising as well as their advantages and disadvantages. Specifically, search engine optimization, search engine marketing, display advertising, social networking marketing and e-m
APA, Harvard, Vancouver, ISO, and other styles
9

Eltaweel, M. "Social Marketing Plays As a Donation Box When It Comes to Fundraising." Journal of Global Oncology 4, Supplement 2 (2018): 189s. http://dx.doi.org/10.1200/jgo.18.41900.

Full text
Abstract:
Amount raised in 2017 Financial donation 628,111.61 USD Other donations 117,601.73 USD March 2018 Financial donation 109,844.00 USD Background and context: Qatar Cancer Society Marketing Department work hand in hand with the society when it comes to fundraising. Aim: Our aim is to bring cancer awareness into the Qatar community as well as provide cancer patients and the organization with the needed fund to either cover cancer cases who needs financial support inside Qatar. And to financial support the organization to continue its awareness activities. Strategy/Tactics: Our campaigns are based
APA, Harvard, Vancouver, ISO, and other styles
10

Gaskill, S., and Geoff Webb. "E-mail and text message marketing." Interactive Marketing 3, no. 2 (2001): 160–65. http://dx.doi.org/10.1057/palgrave.im.4340125.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "E-mail marketing messages"

1

Nilsson, Johanna, and August Mazetti-Nissen. "En undersökning om attityden till mottagandet av E-postmarknadsföring : Med avseende på kognitions-, affektions- & beteendemässig attityd." Thesis, Högskolan i Gävle, Avdelningen för ekonomi, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-21143.

Full text
Abstract:
Titel: En undersökning om attityden till mottagandet av E-postmarknadsföring – Medavseende på kognitions-, affektions- & beteendemässig attityd. Nivå: C-uppsats i ämnet företagsekonomi Författare: Johanna Nilsson & August Mazetti-Nissen Handledare: Jens Eklinder Frick Datum: 2016 – Januari Syfte: Syftet med den här studien är att undersöka attityden till mottagandet av Epostmarknadsföringhos svenska beslutsfattare inom en B2B-kontext, detta med avseende påkognitions-, affektions- och beteendemässig attityd. Metod: Studien har en metodologi av kvantitativ karaktär. Studien har utförts m
APA, Harvard, Vancouver, ISO, and other styles
2

Qvist, Olof, and Julia Berggren. "Viral Marketing : How does the individual view a viral marketing message and what makes him or her pass it along?" Thesis, University of Gävle, Department of Business Administration and Economics, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-672.

Full text
Abstract:
<p>Viral marketing is a form of marketing that is based on individuals sharing of a message within their social network. When viral marketing works, it’s cheap and efficient and there are several examples of successful viral marketing campaigns that has given products or companies great success.</p><p>Viral marketing is relatively unexplored as a phenomenon, and there are several different suggested paths to choose to form a successful campaign. One suggestion is that viral marketers base their campaigns on different feelings to make the individual share the campaign, or feeling, with its soci
APA, Harvard, Vancouver, ISO, and other styles
3

Geissler, Michelle Lara. "Bulk unsolicited electronic messages (spam) : a South African perspective." Thesis, 2004. http://hdl.handle.net/10500/1141.

Full text
Abstract:
In the context of the Internet, spam generally refers to unsolicited and unwanted electronic messages, usually transmitted to a large number of recipients. The problem with spam is that almost all of the related costs are shifted onto the recipients, and many of the messages contain objectionable content. Spam has become a significant problem for network administrators, businesses and individual Internet users that threatens to undermine the usefulness of e-mail. Globally, spam spiralled to account for over 60% of all e-mail near the end of 2004. It is a problem that costs the global e
APA, Harvard, Vancouver, ISO, and other styles
4

Tladi, Sebolawe Erna Mokowadi. "The regulation of unsolicited electronic communications (SPAM) in South Africa : a comparative study." Thesis, 2017. http://hdl.handle.net/10500/25265.

Full text
Abstract:
The practice of spamming (sending unsolicited electronic communications) has been dubbed “the scourge of the 21st century” affecting different stakeholders. This practice is also credited for not only disrupting electronic communications but also, it overloads electronic systems and creates unnecessary costs for those affected than the ones responsible for sending such communications. In trying to address this issue nations have implemented anti-spam laws to combat the scourge. South Africa not lagging behind, has put in place anti-spam provisions to deal with the scourge. The anti-spam provis
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "E-mail marketing messages"

1

Total e-mail marketing. Butterworth-Heinemann, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Arnold, John. E-mail marketing for dummies. Wiley, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

E-mail marketing for dummies. 2nd ed. John Wiley, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Arnold, John. E-mail marketing for dummies. Wiley, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Arnold, John. E-Mail Marketing For Dummies. John Wiley & Sons, Ltd., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Permission-based E-mail marketing that works! Dearborn Trade, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Total e-mail marketing: Maximizing your results from integrated e-marketing. 2nd ed. Butterworth-Heinemann, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

John, Arnold. E-Mail Marketing for Dummies. Wiley & Sons, Incorporated, John, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

John, Arnold. E-Mail Marketing for Dummies. Wiley & Sons, Incorporated, John, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Arnold, John. E-Mail Marketing for Dummies. Wiley & Sons, Incorporated, John, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "E-mail marketing messages"

1

Koçyiğit, Murat. "A Literature Review on the Viral Advertising Narrative Structure." In Advances in Marketing, Customer Relationship Management, and E-Services. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-2373-4.ch010.

Full text
Abstract:
Viral advertising relies on consumers' transmitting the message to other consumers within their online social media. Viral advertising is controlled by consumers and is less under the control of advertisers and brands (Petrescu, 2014). Consumers receive the link or the advertising content and pass it along through e-mail or posting it on a blog, microblog, podcast, wiki, form, webpage, and social media profile. Advertising narrative in traditional media has changed with viral ads. In the narrative of viral advertising is more emotional, romantic, humorous, sexual and contains social messages. This study was conducted to examine the Brands' viral advertising narrative. Viral advertising is at an early stage of development and much of the current viral marketing communication literature research is concerned with understanding the motivations and behaviours of those passing-on email messages. No longer the preserve of offline communication strategists, it is becoming a central platform for interactive marketing communications (Cruz &amp; Fill, 2008).
APA, Harvard, Vancouver, ISO, and other styles
2

Koçyiğit, Murat. "A Literature Review on the Viral Advertising Narrative Structure." In Brand Culture and Identity. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7116-2.ch073.

Full text
Abstract:
Viral advertising relies on consumers' transmitting the message to other consumers within their online social media. Viral advertising is controlled by consumers and is less under the control of advertisers and brands (Petrescu, 2014). Consumers receive the link or the advertising content and pass it along through e-mail or posting it on a blog, microblog, podcast, wiki, form, webpage, and social media profile. Advertising narrative in traditional media has changed with viral ads. In the narrative of viral advertising is more emotional, romantic, humorous, sexual and contains social messages. This study was conducted to examine the Brands' viral advertising narrative. Viral advertising is at an early stage of development and much of the current viral marketing communication literature research is concerned with understanding the motivations and behaviours of those passing-on email messages. No longer the preserve of offline communication strategists, it is becoming a central platform for interactive marketing communications (Cruz &amp; Fill, 2008).
APA, Harvard, Vancouver, ISO, and other styles
3

Dash, Manoj Kumar, and Anil Kumar. "Consumer's Perception and Behavioural Reaction." In Advances in Marketing, Customer Relationship Management, and E-Services. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-5225-0143-5.ch024.

Full text
Abstract:
Progressions in communication innovation have offered ascent to the development of another electronic manifestation of verbal spreading that is Viral Marketing (VM). VM is kind of marketing strategy that sways people to share a promoting message to everyone via web or other electronic media. As of now, Viral Marketing Communication (VMC) is still acknowledged being at an untimely period of improvement. In this way data about its conduct and extent has yet to be plainly set upon and decided. Also, constrained exploration has been carried out on shopper recognition and reaction to such prompting method. The objective of this study is to conduct an inquiry into consumer/buyer receptivity, perception and behavioural reaction to the discussed moderately new promoting technique via VM. With the use of in-depth interviews conducted with 15 people and small interviews with other 27 people, the study analysed their perception towards five methods through which Viral Marketing can be implemented, they are 1) E-mail, 2) Video 3) Blogs, 4) Facebook, Google+, Twitter-Social Media Portals and 5) Forums. Qualitative research has been conducted to analyse the assumptions/hypotheses and found valuable findings in regards to the way buyer/consumer behave to traditional word of mouth and e-W-o-M (Viral Marketing). The qualitative findings from the study show that VMC increases consumer's awareness but it does not have a vital impact on the buying decision, Consumers have different trust and credibility to five junctions of VM; “Forums” have highest trust and credibility among the discussed five junctions, Consumers do not take VM as spam messages, Service based VMC have higher impact than the product based VM, Negative VMC has a higher influence on consumer than the optimistic one, and Financial Benefit is not the strongest reason to spread the messages via VM. These findings will provide new bits of knowledge on VM as a marketing tool from a shopper's outlook and prove to be the first venture for further study on how VM can effectively connect, join &amp;amp; impact shoppers and sellers.
APA, Harvard, Vancouver, ISO, and other styles
4

Gurau, Calin. "Characteristics, Limitations, and Potential of Advergames." In Encyclopedia of Multimedia Technology and Networking, Second Edition. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-014-1.ch028.

Full text
Abstract:
Advergames can be defined as online games that incorporate marketing content. Initially, many companies have placed their brands or logos in the virtual environment of computer games launched by specialised gaming firms. However, this form of advergaming is rather static and ineffective, since the player is concentrated on the task required by the game and might not acknowledge the brand image displayed in the background. This limitation has encouraged the firms to create their own advergames, which are developed around a theme or a character directly related with their products and/or brands. In order to ensure a large diffusion of these games, they were made freely available on the Internet. The facilities offered by the Internet platform have increased the interactiveness of the game, and have added a viral marketing dimension. Viral marketing describes any strategy that encourages individuals to pass on a marketing message to others, creating the potential for exponential growth in the message’s exposure and influence. The use of advergames corresponds well to a strategy of viral marketing, which incorporates the following principles: 1. Give away products or services 2. Provide for effortless transfer to others of these products/services 3. Scale easily from a small to a very large audience 4. Exploit common customer motivations and behaviours 5. Utilise existing communication networks to transfer the products/services, or messages about them 6. Take advantage of others’ resources (existing users/customers) The interest in advergames has substantially increased in the last 5 years because of its perceived advantages (FreshGames, 2002; WebResource, 2004): • Low-cost marketing in comparison with the traditional advertising channels, such as TV and radio • A captured audience that can transmit valuable personal information about its demographic profile, behaviour, needs, attitudes, and preferences • Customer retention: the average time spent in an advergame is 7 to 30 minutes, which cannot be reached in the case of a classical TV advertisement • Viral marketing: 81% of the players will e-mail their friends to try a good game All these data demonstrate the huge potential of advergames (Rodgers, 2004). However, despite the hype created by this new advertising method, most of the information describing or debating advergames is professionally-oriented, often written in an advertising style (DeCollibus, 2002; Hartsock, 00 ; Intrapromote, 2004). Very few academic studies have been initiated to investigate the characteristics of advergames, and their influence on consumers’ perceptions and behaviour (Hernandez, Chapa, Minor, Maldonaldo, &amp; Barranzuela, 2004; Nelson, 2002). This article attempts to identify, based on the existent professional literature, the specific characteristics of an efficient advergame, and to verify the existence of these characteristics in 70 advergames that are active online.
APA, Harvard, Vancouver, ISO, and other styles
5

Kosachev, Alex, and Hamid Nemati. "Chronicle of a Journey." In Security and Privacy Assurance in Advancing Technologies. IGI Global, 2011. http://dx.doi.org/10.4018/978-1-60960-200-0.ch007.

Full text
Abstract:
Every email that originates from outside of an organization must go through a series of firewalls and gateways before reaching the intended recipient inside the organization. During this journey, each email may get scanned for possible viruses or other malicious programming codes. In some cases, the e-mail may also receive a score based on the possibility of spam content. On any stage of this processing email can be quarantined, or moved to a spam folder for the future possible analysis or simply deleted. Understandably, such complex structure helps secure the company’s internal infrastructure, however, e-mails have become an important tool in marketing for many e-commerce organizations and if marketing e-mails do not get to their intended receiver, the sending company will be disadvantaged. Therefore, from the point of view of the sender of an e-mail, it is important to understand the faith of the e-mail that was sent and whether it was received as intended. In this case study, we describe an e-mail bounce back system that was developed by a major e-commerce company in order to understand whether its e-mail based marketing was successful in delivering the intended message to its customers. In addition to the describing the development of the system, security and privacy issues are also discussed.
APA, Harvard, Vancouver, ISO, and other styles
6

Singh, Varinder, Sanjay Taneja, Varinderjeet Singh, Azad Singh, and Harmesh Lal Paul. "Online Advertising Strategies in Indian and Australian E-Commerce Companies." In Advances in Marketing, Customer Relationship Management, and E-Services. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7231-3.ch009.

Full text
Abstract:
Online advertising and marketing promote the different types of products through various kinds of advertising modes to customers. Online advertising is promotional messages that show up on the monitors of online laptops, desktops, tablets, televisions, and smart phones. The main objective of the study is to analyze the online advertising and impact comparison of online advertising strategy which is adopted by Indian and Australian e-commerce companies. To achieve the objectives of this study, the authors take the sample of 5 Indian and 5 Australian e-commerce companies. This study also found that the Indian and Australian e-commerce companies are inter-connected. Online advertising in India has been flowering and also increasing because of 4G connections, which are good for the future of online marketing. This chapter explains comparisons of Indian and Australian e-commerce companies and also focuses on the top 10 platforms to increase sales and customer attraction through advertising. The future of online advertising is brilliant and unlimited.
APA, Harvard, Vancouver, ISO, and other styles
7

Freitas, Sarah, and Mark Levene. "Spam." In Encyclopedia of Human Computer Interaction. IGI Global, 2006. http://dx.doi.org/10.4018/978-1-59140-562-7.ch082.

Full text
Abstract:
With the advent of the electronic mail system in the 1970s, a new opportunity for direct marketing using unsolicited electronic mail became apparent. In 1978, Gary Thuerk compiled a list of those on the Arpanet and then sent out a huge mailing publicising Digital Equipment Corporation (DEC—now Compaq) systems. The reaction from the Defense Communications Agency (DCA), who ran Arpanet, was very negative, and it was this negative reaction that ensured that it was a long time before unsolicited e-mail was used again (Templeton, 2003). As long as the U.S. government controlled a major part of the backbone, most forms of commercial activity were forbidden (Hayes, 2003). However, in 1993, the Internet Network Information Center was privatized, and with no central government controls, spam, as it is now called, came into wider use. The term spam was taken from the Monty Python Flying Circus (a UK comedy group) and their comedy skit that featured the ironic spam song sung in praise of spam (luncheon meat)—“spam, spam, spam, lovely spam”—and it came to mean mail that was unsolicited. Conversely, the term ham came to mean e-mail that was wanted. Brad Templeton, a UseNet pioneer and chair of the Electronic Frontier Foundation, has traced the first usage of the term spam back to MUDs (Multi User Dungeons), or real-time multi-person shared environment, and the MUD community. These groups introduced the term spam to the early chat rooms (Internet Relay Chats). The first major UseNet (the world’s largest online conferencing system) spam sent in January 1994 and was a religious posting: “Global alert for all: Jesus is coming soon.” The term spam was more broadly popularised in April 1994, when two lawyers, Canter and Siegel from Arizona, posted a message that advertized their information and legal services for immigrants applying for the U.S. Green Card scheme. The message was posted to every newsgroup on UseNet, and after this incident, the term spam became synonymous with junk or unsolicited e-mail. Spam spread quickly among the UseNet groups who were easy targets for spammers simply because the e-mail addresses of members were widely available (Templeton, 2003).
APA, Harvard, Vancouver, ISO, and other styles
8

Guido, Gianluigi, M. Irene Prete, and Rosa D’Ettorre. "When Is a Duck Not a Duck? When It Is a Euro! Trust-Based Marketing Communications in Virtual Communities." In Virtual Technologies. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-955-7.ch043.

Full text
Abstract:
This chapter tries to evaluate the effects of the propagation of a trust-based marketing message through selected below-the-web technologies, which are those particular types of information technologies different from websites – such as e-mails, discussion lists, BBSs, Newsgroups, Forums, Peer-to-Peer, IRCs, MUDs and MOOs – that allow for the creation of virtual communities. A preliminary experiment on informal marketing communications, carried out over 12,000 accesses to below-the-web communities and regarding the proposal to use the term “Ducks” for “Euros”, in view of its similarity with the term “Bucks” for Dollars, showed that below-the-web technologies can be an appropriate tool for building trust amongst participants when four conditions for the existence of virtual communities are met: 1) a minimum level of interactivity; 2) a variety of communicators; 3) a virtual-common-public space; and 4) a minimum level of sustained membership.
APA, Harvard, Vancouver, ISO, and other styles
9

Bouchard, Guillaume, Stephane Clinchant, and William Darling. "Hot Topic Sensing, Text Analysis, and Summarization." In Advances in Electronic Government, Digital Divide, and Regional Development. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-6236-0.ch012.

Full text
Abstract:
Social monitoring platforms are software services that enable the rapid analysis of massive amounts of information (mostly text messages) expressed in social networks. Their usage today mostly focuses on marketing industries that need to reach their customers in a proper way. In the e-government domain, however, such tools have mostly been used by political parties as a support to election campaigns, but few have been actually used to provide a comprehensive understanding of the citizens' needs in everyday life. In this chapter, the authors present a set of data analytics tools that can help public authorities to extract and summarize textual content from Internet forums and social media feeds. There are many potential applications of these tools, such as the visualization of the main political discussion in the city, early detection of disagreement with the local politics, and city services connected to social media.
APA, Harvard, Vancouver, ISO, and other styles
10

Smith, Alan D. "Strategic Importance of Security Standards." In Information Security and Ethics. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-937-3.ch252.

Full text
Abstract:
Even before September 11, 2001, security and privacy was a concern to nearly 80% of the current and potential Internet users around the globe, according to survey released by the Information Technology Association of America (ITAA) (Poulsen, 2000). The survey, commissioned by the American Express Company, randomly polled 11,410 people in 10 countries, and found that nearly half of the respondents enjoyed some form of Internet access. As might be expected, most of the world’s Internet users utilize Internet for e-mail, browsing, and entertainment. However, fewer than 28% do some shopping online, and 24% use the Internet for banking and financial transactions. But when Internet users and non-users of many countries were asked if they agree with the statement, “I am or would be concerned about security and privacy issues when purchasing or making financial transactions online,” 79% agreed. Prior to the tragedy of September 11, 2001, U.S. citizens also expressed legitimate concerns toward the issues of privacy and security, with an 85% showing. The poll released by the Information Technology Association of America also illustrated that approximately 80% have doubts about the U.S. government’s ability to maintain computer security and privacy. Hence, protecting operating systems is a major strategic concern if the success of e-government as a whole is to reach its potential. Although most of these issues are typically not discussed in relationship with e-government, the need for trusted computing systems within e-business and computing systems can be made as an effective argument that all these issues affect e-government systems as well. Secure computing systems issues in terms of e-government are just as important. The scope of this article is to present a description of one the most generally known security certifications; namely, the trusted computer system evaluation (TCSEC) and its commercial implementation procedure in the commercial product evaluation process and discuss the influence of this evaluation/certification on the incidence of hacker attacks on e-business. As evident by the abundance of marketing literature of different operating systems for e-business that frequently refers to its security strength ranked against popular security certifications, it is very common to rank commercially available operating systems against TCSEC evaluation and/or certification criteria. This article will also explore where the many operating systems stands on this particular evaluation. In essence, given the vulnerabilities exposed after September 11, 2001, strategic security managers should be deeply concerned that the e-business platform they are responsible for contains the highest security standards to prevent any type of potentially harmful hacker attacks. Managers need to have a working knowledge of TCSEC security evaluation/certifications to become better informed when choosing the e-security platform for e-government/e-business. Essentially, the selection of a particular operating system for e-government/e-business have as much to do with factors ranging from existing skills, existing infrastructure, and economic reasons all the way up to political and strategic reasons. In dealing strategically with modern e-business environments, one of the most important factors that management must consider when choosing an operating system for their e-business platform is the security strength to resist computer hacker attacks on the operating system. If, for example, during different hacker attacks, one of the major aspects of these attacks is a certain operating system, as opposed to other systems, then this is a clear message to management to build in proper safeguards in the proposed operating system (Smith &amp; Rupp, 2002a, 2002b). Certainly some of the reasons for frequent hacker attacks may probabilistic in terms and not random events, since Linux and Windows operating systems are more frequently used for e-commerce than other systems. So, it is not surprising that there are practically few reports of successful hacker attacks against operating systems that run e-business platforms (Smith, 2005; Smith &amp; Lias, 2005; Smith &amp; Offodile, 2002).
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!