the council of Europe cybercrime convention. The African union, in particular its African commissionon Human and Peoples’ Rights adopted in 2002 a declarationof principles on Freedom of Expression in Africa, which deals in part with cybercrime as well as criminal and economic measures.
The OECD(2002) issued a non-binding guideline for the security ofinformation systems and networks. Althoug
The gravity ofthe illegal acts against airlines and airports is such that it is now accepted that countermeasures must be of international concern. The report ofthe U.S. President's Commissionon Aviation Security and Terrorism stresses the need for the necessary will onthe part of all governments. "A consensus must be reached among law-abiding nations that terrorism is an actof aggression wh
information with their existing database, G market can use this source to CRM. This procedure will explained in the following parts.
3.2 ISP& ESCROW&SSL
To ensure the security of E-commerce, G market provides some security program for transaction. This is represented by ISP, ESCROW service. Also, there is a SSL protocol that is used to protectthe private informationand credit card informati
and gain synergy. Also, acquisition with small companies led Amazon to make better use of its resources and capabilities. As a result, Amazon improves its distinctive competencies in IT and increase sales.
IT as its Distinctive Competency
The mission statement clear Amazon’s IT act as a source of its competitive advantage, Amazon using it technology andthe Internet develops utility of its
and tactics employed. Reassessment, if it is to be of any value in the preventative sense, should be based on accurate and timely intelligence concerning the intentions, capabilities andactions of terrorists before they reach the airport. Here too, international cooperation has a vital part to play, a fact underlined when the United States signed into law the Foreign Airport Security Act as part