[1]
|
Department of Statistics in Jordan (DOS), Census of enterprises, 2011. http://www.dos.gov.jo
|
[2]
|
N. Black, A. Lockett, H. Winklhofer and C. Ennew, “The Adoption of Internet Financial Services: A Qualitative Study,” International Journal of Retail and Distribution Management, Vol. 29, No. 8, 2000, pp. 390-398.
doi:10.1108/09590550110397033
|
[3]
|
V. Zeithaml, A. Parasuraman and A. Malhotra, “Service Quality Delivery through Web Sites: A critical Review of Extant Knowledge,” Journal of the Academy of Marketing Science, Vol. 30, No.4, 2003, pp. 362-375.
|
[4]
|
M. Warren and W. Hutchinson, “Cyber-Attacks Against Supply Chain Management Systems: A Sort Note,” International Journal of Physical Distribution & Logistics Management, Vol. 30, No. 7-8, 2002, pp. 710-716.
doi:10.1108/09600030010346521
|
[5]
|
J. Caldow, “The Quest for Electronic Government: A Defining Vision,” Institute for Electronic Government, IBM Corporation, Washington DC, 1999.
|
[6]
|
UNCTAD, “Building Confidence: E-Commerce and Development Report,” 2012.
http://www.unece.org/trade/untdid/welcome.htm
|
[7]
|
J. Westby, “International Guide to Combating Cybercrime,” American Bar Association, USA, 2003.
|
[8]
|
Ministry of Information and Communication Technologies in Jordan (MICT), “The E-Readiness Assessment of the Hashemite Kingdom of Jordan,” 2011.
http://www.moit.gov.jo
|
[9]
|
R. Schperberg and R. Kenneth, “Cybercrime,” ISACA, Rolling Meadows, 2005.
|
[10]
|
Economist Intelligence Unit, “The 2006 E Readiness Rankings,” 2012.
http://www.eiu.com/2006ereadinessRankings
|
[11]
|
R. Gulati, “Business-to-Business E-Commerce: Past, Present, and Future,” 2012.
|
[12]
|
M. Sahawneh, “E-Commerce: The Jordanian Experience, Industrial Studies Department,” Royal Scientific Society, 2002.
|
[13]
|
M. Stamp, “Information Security,” John Wiley & Sons, New York, 2005. doi:10.1002/0471744190
|
[14]
|
C. Steinfield and P. Whitter, “Community level Socio-Economic Impacts of Electronic commerce,” Journal of Computer Mediated Communication, Vol. 5, No. 2, 1999, pp. 714-719.
|
[15]
|
T. Thanasankit, “E-Commerce and Cultural Values,” Idea Group Inc., New York, 2002.
doi:10.4018/978-1-59140-056-1
|
[16]
|
A. Abu-Samaha and Y. Abdel Samad, “Challenges to the Jordanian Electronic Government Initiative,” Journal of Business Systems, Governance and Ethics, Vol. 2, No. 3, 2007, pp. 101-109.
|
[17]
|
Ministry of Industry and Trade in Jordan (MIT), 2012.
http://www.mit.gov.jo
|
[18]
|
M. Al-Ibraheem and H. Tahat, “Regulating Electronic Contracting in Jordan,” 21st BILETA Conference; Globalization and Harmonization in Technology Law, Malta, 6-7 April 2006, pp. 6-19.
|
[19]
|
Organization for Economic Cooperation and Development OECD, “Economic Growth in the OECD Area,” OECD Working Paper, 2000.
|
[20]
|
M. Greenstein and T. Feinman, “Electronic Commerce; Security, Risk Management and Control,” McGraw-Hill, Boston, 2000.
|
[21]
|
Ministry of Trade and Industry in Jordan, 2010.
http://www.mit.gov.jo
|
[22]
|
Organization for Economic Cooperation and Development OECD, “E-Commerce: Impacts and Policy Challenges,” Organization for Economic Cooperation and Development (OECD), Vol. 67, No. 193, 2000, pp. 193-202.
|
[23]
|
Organization for Economic Cooperation and Development OECD, “The Economic and Social Impacts of electronic Commerce,” Preliminary Finding and Research Agenda, 1999.
|
[24]
|
Organization for Economic Cooperation and Development (OECD), “E-Commerce: Impacts and Policy Challenges,” 2002.
|
[25]
|
ESCWA, “National profile of the Information Society in Jordan,” United Nation Report, 2007, pp. 1-16.
|
[26]
|
M. Sahawneh, “E-Commerce and Its Effect on Labor Force” Socio-economic Impact of Persistent Organic Pollutants,” Royal Scientific Society, 2005.
|
[27]
|
Arab Advisor Press Room, 2012.
http://www.arabadvisors.com
|
[28]
|
Abu-Ghazaleh and C. Consulting, “Market Brief on Telecommunications Sector in Jordan,” 2009.
http://www.commercecan.ic.gc.ca
|
[29]
|
Business Integration Technology, Inc., “Why Supply Chain Executives Should Care about B2B Integration Technology,” 2012.
http://businessintegrationtechnology.com/PDF/WhyB2BiMatters.pdf
|
[30]
|
Business Integration Technology Inc., 2012.
http://www.businessintegrationtechnology.com
|
[31]
|
S. Blythe, “Digital Signature Law of the United Nation. European Union, United Kingdom and United State: Promotion of Growth in E-commerce with Enhanced Security,” Richmond Journal of Law and Technology, Vol. XI, No. 2, 2005, pp. 1-20.
|
[32]
|
H. Rank and B. Schmitt, “The Challenge of Information Security,” Military Technology, Vol. 29, No. 11, 2005, pp. 8-50.
|
[33]
|
T. R. Peltier, “Information Security Risk Analysis,” CRC Press, Boca Raton, 2001.Organization for Economic Cooperation and Development OECD, “The Economic and Social Impacts of electronic Commerce,” Preliminary Finding and Research Agenda, 1999.
|
[34]
|
A. Al-Bakri, “The Adoption of B2B by SME in Amman and the Perceptions of Its Influence on Their Performance and Efficiency,” PhD Thesis (Non-Published Thesis), University of Southern Queensland, Toowoomba, 2009.
|
[35]
|
D. Kim, S. Cavusgil and R. Calantone, “Information System Innovations and Supply Chain Management: Channel Relationships and Firm Performance,” Journal of the Academy of Marketing Science, Vol. 34, No. 1, 2006, pp. 40-54.
|
[36]
|
Arab Advisor Group, 2012.www.arabadvisors.com
|
[37]
|
W. Titi, “The Impact of Adoption Electronic Commerce in Small to Medium Enterprises Jordanian Companies,” The 1st International Conference on E-Business and E-Learning, Jordan, 24-25 May 2005, pp. 159-178.
|
[38]
|
E. Abu Zaid, “Attracting E-Commerce. First GCC E-Commerce Conference, UAE,” 2005.
www.kenzay-traning.com
|
[39]
|
M. El-Nawawy and M. Ismail, “Overcoming Deterrents and Impediments to Electronic Commerce in Light of Globalization,” Proceedings of the 9th Annual Conference of the Internet Society, INET 99, San Jose, 22-25 June 1999, pp. 9-18.
|
[40]
|
E. M. Heffes, “Refining the Rules of Commerce,” Financial Executive, Vol. 17, No. 3, 2001, pp. 3-18.
|
[41]
|
E. Kritzingera and E. Smith, “Information Security Management: A Previous Term Information Security Retrieval and Awareness Model for Industry,” Computers & Security, June 2008.
|
[42]
|
T. Layton, “Guide to Information Security,” CRC Press, Boca Raton, 2006.
|
[43]
|
C. Easttom, “Computer Security Fundamentals,” Pearson Prentice Hall, Michigan, 2007.
|
[44]
|
ESCWA, “Development of E-Commerce Sectors in the Arab Region,” World Summit on the Information Society (WSIS), Beirut, 22-25 June 1999, pp. 9-18.
|
[45]
|
J. Fraser, “The Strategic Challenge of Electronic Commerce,” Supply Chain Management, Vol. 5, No. 1, 2000, p. 7. doi:10.1108/13598540010312936
|
[46]
|
V. Leopoulos, K. Kirytopoulos and D. Voulgaridou, “the benefits of e-commerce: a case study of the Greek Para-pharmaceutical industry,” National Technical University of Athens, Athens, 2006.
|
[47]
|
M. Gerber and R. Solms, “Information Security Requirements—Interpreting the Legal Aspects,” Computers & Security, Vol. 27, No. 5-6, 2008, pp. 124-135.
doi:10.1016/j.cose.2008.07.009
|
[48]
|
K. Hausken, “Information Sharing among Firms and Cyber-Attacks,” Journal of Accounting and Public Policy, Vol. 26, No. 6, 2007, pp. 639-688.
doi:10.1016/j.jaccpubpol.2007.10.001
|
[49]
|
Y. Rezgui and A. Marks, “Information Security Awareness in Higher Education: An Exploratory Study,” Computers and Security, Vol. 27, No. 7, 2007, pp. 241-253.
|