Fintan Clear
19
MacGregor, R. and Vrazalic, L. (2005), A basic model of electronic commerce adoption barriers. A
study of regional small businesses in Sweden and Australia, Journal of Small Business and
Enterprise Development, Vol. 12, No. 4 pp. 510-527
McLeod, R., and Schell, G. (1997), Management Information Systems, Prentice-Hall
Nah, F., Rosemann, M., and Watson, E. (2004), E-Business Process Management, Business Process
Management Journal, 10(1)
Nathan, M., Carpenter, G., Roberts, S., Ferguson, L. and Knox, H. (2003), Getting by, Not Getting On:
Technology in UK Workplaces, The Work Foundation: London
Nilles, J. (1998), Managing Telework, Strategies for Managing the Virtual Workforce, John Wiley:
New York
NISS (National Information Systems Security) (1992), INFOSEC Glossary, NSTISSI No. 4009, June
5, 1992, National Security Telecommunications and Information Systems Security Committee,
NSA, Ft. Meade, MD 20755-6000
Poon S. and Swatman P. (1999), An Exploratory Study of Small Business Internet Commerce Issues,
Information and Management, Vol. 35, No. 1, pp. 9-18.
Quayle, M. (2004) E-commerce the challenge for UK SMEs in the Twenty-First Century, Journal of
Operations and Production Management. Vol. 22, No. 10, pp. 1148-1161
Ratnasingham, P. (1998), Trust in web-based electronic commerce security, Information Management
& Computer Security, Vol. 6, No. 4, pp. 162-166
Reimenscheider, C. and McKinney, V. (2001), Assessing Beliefs in Small Business Adopters and Non-
Adopters of Web-Based E-Commerce, Journal of Computer Information Systems, Vol. 42, No. 2,
pp. 101-107
Reuvid, J. (2004). The secure online business handbook: E-commerce, IT functionality and business
continuity (2nd ed.), Kogan Page: London.
Rikitake, K., Kikuchi, T., Nagata, H., Hamai, T. and Asami, T (2001), Security Issues on Home
Teleworking over Internet, IEICE Technical Report IA2001-20, Vol. 101, No. 440, pp. 9-16
Rikitake, K., Kikuchi, T., Nagata, H., Hamai, T. and Asami, T (2002a), Secure Teleworking over
Wireless Internet, IEICE General Conference Symposium, SB-12-3, IEICE
Rikitake, K., Kikuchi, T., Nagata, H., Hamai, T. and Asami, T. (2002b), Secure Gateway System
Design for Home Teleworking, IPSJ SIG Notes 2002-CSEC-17, Vol. 2002, pp. 1-6
Schneier, B (2000), Secrets and Lies: Digital Security in a Networked World, John Wiley: New York
Schneier, B (2003), Beyond Fear: Thinking Sensibly about Security in an Uncertain World, Springer-
Verlag
Shiels, H., McIvor, R. and O'Reilly, D. (2003), Understanding the implications of ICT adoption:
insights from SMEs, Logistics Information Management, Vol. 16(5), pp. 312 – 326
Simpson, M. and Docherty, A. (2004), E-commerce adoption support and advice for UK SMEs,
Journal of Small Business and Enterprise Development, Vol. 11, No. 3, pp. 315-328
Smith, A. and Rupp, W. (2002), Issues in cybersecurity; understanding the potential risks associated
with hackers/crackers, Information Management & Computer Security, Vol. 10(4), pp. 178-183