Analysis of Amazon Website: Platform, Technology, Availability, and Security
VerifiedAdded on 2023/04/21
|12
|3062
|467
AI Summary
This report discusses the analysis of the company website of Amazon, including the platform, technology, availability, and security. It provides insights into the design and features of the website, as well as the security measures implemented. The report concludes with a summary of the findings.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: WEB TECHNOLOGY
WEB TECHNOLOGY
Name of student
Name of university
Author’s note:
WEB TECHNOLOGY
Name of student
Name of university
Author’s note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1
WEB TECHNOLOGY
Table of Contents
Introduction....................................................................................................................2
Discussion......................................................................................................................2
Analysis of platform and technology of Amazon......................................................2
Analysis of availability and security of Amazon website..........................................4
Conclusion......................................................................................................................7
References......................................................................................................................8
WEB TECHNOLOGY
Table of Contents
Introduction....................................................................................................................2
Discussion......................................................................................................................2
Analysis of platform and technology of Amazon......................................................2
Analysis of availability and security of Amazon website..........................................4
Conclusion......................................................................................................................7
References......................................................................................................................8
2
WEB TECHNOLOGY
Introduction
This report aims to discuss the topic of analysis of the company website of Amazon.
A brief discussion for the critical analysis of the appropriate tools, platforms, technologies
and the languages for this company website is provided in this report. The specification of the
design for the web site of Amazon with the emphasis on the availability and the security is
provided in the report. Finally, the report settles with an suitable conclusion for this report.
Amazon website of e-commerce offers the common people with opportunity of
selling or purchasing the items on platform of internet. This website of Amazon has been
commonly considered to be most trending and secure businesses in the present times.
Discussion
In the present world, the designers of website are facing significant problems in
designing the user-friendly and interactive for the common public. But the website of the
company Amazon has the most interactive and user friendly website comparing the other e-
commerce websites (Chen et al. 2013).
Analysis of platform and technology of Amazon
The analysis of the website of the Amazon along with the analysis of the technologies
and the platform of the website can be observed as:
The shopping experience on the website of Amazon starts on the home page where
any user has been notified by the two-fold purpose of the website which are the online
purchasing and the search for the product (Rodrigues et al. 2013). When any user scans the
home page of Amazon for purchasing or sell some items, then the users can view the distinct,
clean elements that appeals the customers to the website. Using these elements, it has been
observed that the users are able to easily discover and procure the products and the sellers are
WEB TECHNOLOGY
Introduction
This report aims to discuss the topic of analysis of the company website of Amazon.
A brief discussion for the critical analysis of the appropriate tools, platforms, technologies
and the languages for this company website is provided in this report. The specification of the
design for the web site of Amazon with the emphasis on the availability and the security is
provided in the report. Finally, the report settles with an suitable conclusion for this report.
Amazon website of e-commerce offers the common people with opportunity of
selling or purchasing the items on platform of internet. This website of Amazon has been
commonly considered to be most trending and secure businesses in the present times.
Discussion
In the present world, the designers of website are facing significant problems in
designing the user-friendly and interactive for the common public. But the website of the
company Amazon has the most interactive and user friendly website comparing the other e-
commerce websites (Chen et al. 2013).
Analysis of platform and technology of Amazon
The analysis of the website of the Amazon along with the analysis of the technologies
and the platform of the website can be observed as:
The shopping experience on the website of Amazon starts on the home page where
any user has been notified by the two-fold purpose of the website which are the online
purchasing and the search for the product (Rodrigues et al. 2013). When any user scans the
home page of Amazon for purchasing or sell some items, then the users can view the distinct,
clean elements that appeals the customers to the website. Using these elements, it has been
observed that the users are able to easily discover and procure the products and the sellers are
3
WEB TECHNOLOGY
easily able to process the online purchases and then make significant profit. As the company
is well known, most of the users along with the first time users of the website have clear
visibility of the options and the features on the website (Almorsy, Grundy and Müller 2016.).
The designers and the developers that are involved in the designing of the website clearly
emphasized on the online purchasing and the search for the product features. After the
establishment of the search for the product and the capabilities of the online shopping, the
users commonly take advantage of the features using the search button. The website of the
company utilises the cookies for keeping the user logged in and also track the shopping habits
of the users and then store them on the side of the server. This is considered to be the good
improvement as it dynamically performs the customisation of the experience of the user
based on the earlier searches, views on the page, the additions on the wishlist, the written
reviews and the finally the purchases. One of the major example of the customised content
could be viewed on the home page of the website that performs the modification of the major
content on the basis of the interaction of the users on the website with the search features of
the product (Al-Haj, Al-Shaer and Ramasamy 2013). The feature of the website of
recommending the items on the basis of the prior activities of users provide the evidence of
increased customisation of the website. The company tracks the behaviour of the client side
for ensuring the subsequent visits of every user and are increasingly tailored according to the
habits and the taste. It increases the probability of any user performing the transaction and the
enhanced customisation of the website would enhance the process of purchasing. The
customisable feature of history and the recommendations provides the users with the
additional benefits of purchasing and selling on the website of the company. Each of the
product that is listed on the product that is listed on the personal page of the Amazon users
under the ‘recommendations for you today tab’ can be edited by the user (Pichan, Lazarescu
and Soh 2015). The well placed elements of navigation on the website of the company is
WEB TECHNOLOGY
easily able to process the online purchases and then make significant profit. As the company
is well known, most of the users along with the first time users of the website have clear
visibility of the options and the features on the website (Almorsy, Grundy and Müller 2016.).
The designers and the developers that are involved in the designing of the website clearly
emphasized on the online purchasing and the search for the product features. After the
establishment of the search for the product and the capabilities of the online shopping, the
users commonly take advantage of the features using the search button. The website of the
company utilises the cookies for keeping the user logged in and also track the shopping habits
of the users and then store them on the side of the server. This is considered to be the good
improvement as it dynamically performs the customisation of the experience of the user
based on the earlier searches, views on the page, the additions on the wishlist, the written
reviews and the finally the purchases. One of the major example of the customised content
could be viewed on the home page of the website that performs the modification of the major
content on the basis of the interaction of the users on the website with the search features of
the product (Al-Haj, Al-Shaer and Ramasamy 2013). The feature of the website of
recommending the items on the basis of the prior activities of users provide the evidence of
increased customisation of the website. The company tracks the behaviour of the client side
for ensuring the subsequent visits of every user and are increasingly tailored according to the
habits and the taste. It increases the probability of any user performing the transaction and the
enhanced customisation of the website would enhance the process of purchasing. The
customisable feature of history and the recommendations provides the users with the
additional benefits of purchasing and selling on the website of the company. Each of the
product that is listed on the product that is listed on the personal page of the Amazon users
under the ‘recommendations for you today tab’ can be edited by the user (Pichan, Lazarescu
and Soh 2015). The well placed elements of navigation on the website of the company is
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4
WEB TECHNOLOGY
considered to be critical to the success of the website of the company. The users can easily
navigate among the sections and this makes the features of the website appealing to the
customers. With the hovering over the button of the ‘shop all departments’, it triggers the
drop-down menu which, presents the primary categories of the store, providing the shoppers
with the easy access to several other products. The navigation element is placed in a position
that most suitable for the customers (Nerini et al. 2014). Besides the logo of the company on
the website, there are limited important links, like the ones for the logging out, personal
Amazon page of the user and the personalised recommendations. The section is not
commonly prominent and it also appears on the right position that is easily accessible by the
users (Narula and Jain 2015). Next element that is most suitable for the users to access is the
section that contains the wishlist or the cart. The functionality of shopping cart is majorly
invariably located on the right position of the layout of the website. And whenever any user
views the page of the product, it has been provided with the option of adding the product in
their shopping cart or the wishlist. The users invariably search for the functionality for their
own ease of access. Ultimately, the website of Amazon requests the users to search the ‘new
and use’ versions of similar product in the marketplace of Amazon (Xu et al. 2014). The
selling of the product in the marketplace obviously do not increase the revenue of the
Amazon in short term, still it provides the rewards in the long term as it simply appeals the
customers on the website of the company. The platform of the website of the company is
increasingly customised and most suited according to the users for enabling them to perform
their transaction easily and with enhanced security (Diniz et al. 2015). The transaction
process of the website in added with extra security measures to make the transaction extra
secure and ensure the security of the card details of the users.
WEB TECHNOLOGY
considered to be critical to the success of the website of the company. The users can easily
navigate among the sections and this makes the features of the website appealing to the
customers. With the hovering over the button of the ‘shop all departments’, it triggers the
drop-down menu which, presents the primary categories of the store, providing the shoppers
with the easy access to several other products. The navigation element is placed in a position
that most suitable for the customers (Nerini et al. 2014). Besides the logo of the company on
the website, there are limited important links, like the ones for the logging out, personal
Amazon page of the user and the personalised recommendations. The section is not
commonly prominent and it also appears on the right position that is easily accessible by the
users (Narula and Jain 2015). Next element that is most suitable for the users to access is the
section that contains the wishlist or the cart. The functionality of shopping cart is majorly
invariably located on the right position of the layout of the website. And whenever any user
views the page of the product, it has been provided with the option of adding the product in
their shopping cart or the wishlist. The users invariably search for the functionality for their
own ease of access. Ultimately, the website of Amazon requests the users to search the ‘new
and use’ versions of similar product in the marketplace of Amazon (Xu et al. 2014). The
selling of the product in the marketplace obviously do not increase the revenue of the
Amazon in short term, still it provides the rewards in the long term as it simply appeals the
customers on the website of the company. The platform of the website of the company is
increasingly customised and most suited according to the users for enabling them to perform
their transaction easily and with enhanced security (Diniz et al. 2015). The transaction
process of the website in added with extra security measures to make the transaction extra
secure and ensure the security of the card details of the users.
5
WEB TECHNOLOGY
Analysis of availability and security of Amazon website
The designing of the network architecture of the network of e-business is done for
companies as the operators, customers and the companies requires to make any business on
the basis of the trust during the time of performing the transactions (Niranjanamurthy et al.
2013). The reliable and robust network of e-business is majorly ensured for confidence and
trust not solely to the customers but also to the service providers. In the recent times, the e-
commerce websites are implementing the security protocols for ensuring the security of the
websites. Amazon implemented several security protocols in their website for ensuring the
security while the time of transaction and some of the protocols are:
Digital certificates and the signatures: The use of the digital signatures is majorly
done for ensuring the integrity and the authentication of the requirements. The digital
certificates are implemented for ensuring the enhanced security measures on the website
(Aljawarneh 2013). This certificate is commonly used for the verification of authenticity of
the users who are sending any message on the website and then provide the receiver with
means of encoding the reply. Any individual who wishes to direct any encrypted message
smears for the digital certificate from any Certificate Authority. Then CA provides any digital
certificate that is encrypted that contains the public key of the applicant and various other
information of identification (Hashizume et al. 2013). The transactions that are performed by
the users on the website of Amazon are secured using the digital certificates and the
signatures that are offered by the company.
There are some threats to the e-commerce websites such as Amazon that have to be
dealt in the present times. The security strategies of the Amazon deals with the two issues,
which are the protection of the integrity of the business network and the internal systems; and
accomplishing of the security of transaction among the business and the customer (Pletea,
Vasilescu and Serebrenik 2014). The major tool that is utilised by the businesses for
WEB TECHNOLOGY
Analysis of availability and security of Amazon website
The designing of the network architecture of the network of e-business is done for
companies as the operators, customers and the companies requires to make any business on
the basis of the trust during the time of performing the transactions (Niranjanamurthy et al.
2013). The reliable and robust network of e-business is majorly ensured for confidence and
trust not solely to the customers but also to the service providers. In the recent times, the e-
commerce websites are implementing the security protocols for ensuring the security of the
websites. Amazon implemented several security protocols in their website for ensuring the
security while the time of transaction and some of the protocols are:
Digital certificates and the signatures: The use of the digital signatures is majorly
done for ensuring the integrity and the authentication of the requirements. The digital
certificates are implemented for ensuring the enhanced security measures on the website
(Aljawarneh 2013). This certificate is commonly used for the verification of authenticity of
the users who are sending any message on the website and then provide the receiver with
means of encoding the reply. Any individual who wishes to direct any encrypted message
smears for the digital certificate from any Certificate Authority. Then CA provides any digital
certificate that is encrypted that contains the public key of the applicant and various other
information of identification (Hashizume et al. 2013). The transactions that are performed by
the users on the website of Amazon are secured using the digital certificates and the
signatures that are offered by the company.
There are some threats to the e-commerce websites such as Amazon that have to be
dealt in the present times. The security strategies of the Amazon deals with the two issues,
which are the protection of the integrity of the business network and the internal systems; and
accomplishing of the security of transaction among the business and the customer (Pletea,
Vasilescu and Serebrenik 2014). The major tool that is utilised by the businesses for
6
WEB TECHNOLOGY
protecting the internal network is commonly the firewall. Any firewall could be the system of
software and hardware that permits the access to the network by the particular authenticated
users. The use of firewall is done by the website for enabling the strong defence in the
security architecture of the business. Moreover, the firewalls must be the part of the security
infrastructure of the business. This is the reason why the company has emphasised on the
implementation of the strict firewall for enhancing the security measures and prevent the
access to the website by any unauthorised users (van Soesbergen and Mulligan 2014). It is
emphasised in the recent times to ensure the security of transaction in the e-commerce
websites. The security of transaction is majorly crucial for ensuring the confidence of the
consumer in any specific site of e-commerce. The security of transaction relies on the ability
of organisation for ensuring the integrity, privacy, availability, and the authenticity along
with the ability of blocking the unwanted intrusions on the website. The company faces these
threats in the present times and it has implemented the security protocols for ensuring the
proper security of the contents of website. The privacy of transaction could be threatened by
the unauthorised network monitoring by the software devices like the sniffer programs
(Madduri et al. 2014). The company faces this threat and it implemented several security
protocols for this. The technology of encryption and the switched network topologies are
implemented as the security measures. The confidentiality of transaction needs the removal
of the trace of actual data of transaction from the intermediate sites. The records of the
passage are dissimilar things and these are required to be verified for executing the
transaction. The intermediate nodes that could handle the data of transaction should not retain
this except while the relaying of the data is being done. The encryption is most common
procedure for the ensuring of confidentiality. The integrity of transaction needs the methods,
which prevents the modification of the transaction in methods during the transit or from any
customer. The encryption methods like the digital signatures, secret key and the public key
WEB TECHNOLOGY
protecting the internal network is commonly the firewall. Any firewall could be the system of
software and hardware that permits the access to the network by the particular authenticated
users. The use of firewall is done by the website for enabling the strong defence in the
security architecture of the business. Moreover, the firewalls must be the part of the security
infrastructure of the business. This is the reason why the company has emphasised on the
implementation of the strict firewall for enhancing the security measures and prevent the
access to the website by any unauthorised users (van Soesbergen and Mulligan 2014). It is
emphasised in the recent times to ensure the security of transaction in the e-commerce
websites. The security of transaction is majorly crucial for ensuring the confidence of the
consumer in any specific site of e-commerce. The security of transaction relies on the ability
of organisation for ensuring the integrity, privacy, availability, and the authenticity along
with the ability of blocking the unwanted intrusions on the website. The company faces these
threats in the present times and it has implemented the security protocols for ensuring the
proper security of the contents of website. The privacy of transaction could be threatened by
the unauthorised network monitoring by the software devices like the sniffer programs
(Madduri et al. 2014). The company faces this threat and it implemented several security
protocols for this. The technology of encryption and the switched network topologies are
implemented as the security measures. The confidentiality of transaction needs the removal
of the trace of actual data of transaction from the intermediate sites. The records of the
passage are dissimilar things and these are required to be verified for executing the
transaction. The intermediate nodes that could handle the data of transaction should not retain
this except while the relaying of the data is being done. The encryption is most common
procedure for the ensuring of confidentiality. The integrity of transaction needs the methods,
which prevents the modification of the transaction in methods during the transit or from any
customer. The encryption methods like the digital signatures, secret key and the public key
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7
WEB TECHNOLOGY
are the most common methods that is used by the company website for ensuring the security
on the website during the phase of transaction (Fernandes, Jung and Prakash 2016). It has
been discovered that there are several weaknesses in these methods and the major weakness
of these methods is that it depends on security of the systems on endpoint for protecting the
keys from the misuse or modification. The major threats to the website of the company could
be categorised in two sections, which are the threats from any actual hacker and the failure of
technology. The threat to the hacker do not pose significant threat in the company website as
the access to the sensitive content of the website is restricted among the privileged users. But
the company faces the threat of the technological failure. This threat relates to the threat
where anything related to internet could impose the significant problems. It consists of
improper configuration of the network and the loss of packets of data commonly from the
access environment that is wireless. The company uses the operating system of Windows, a
software of Web server for hosting the site of e-commerce and the database that comprises
the history of transaction and the information of customers. The platforms might pose some
security threats that leads to the security attacks. These security threats forced the company to
implement the modified OS of Linux and the database of MySQL for enhancing the security
of the database.
Conclusion
Therefore, it can be concluded that the Amazon e-commerce website provides the
users with the enhanced shopping experience and ensures the enhanced security to the data of
the customers. The shopping experience on the website of Amazon starts on the home page
where any user has been notified by the two-fold purpose of the website which are the online
purchasing and the search for the product. The designing of the network architecture of the
network of e-business is done for companies as the operators, customers and the companies
requires to make any business on the basis of the trust during the time of performing the
WEB TECHNOLOGY
are the most common methods that is used by the company website for ensuring the security
on the website during the phase of transaction (Fernandes, Jung and Prakash 2016). It has
been discovered that there are several weaknesses in these methods and the major weakness
of these methods is that it depends on security of the systems on endpoint for protecting the
keys from the misuse or modification. The major threats to the website of the company could
be categorised in two sections, which are the threats from any actual hacker and the failure of
technology. The threat to the hacker do not pose significant threat in the company website as
the access to the sensitive content of the website is restricted among the privileged users. But
the company faces the threat of the technological failure. This threat relates to the threat
where anything related to internet could impose the significant problems. It consists of
improper configuration of the network and the loss of packets of data commonly from the
access environment that is wireless. The company uses the operating system of Windows, a
software of Web server for hosting the site of e-commerce and the database that comprises
the history of transaction and the information of customers. The platforms might pose some
security threats that leads to the security attacks. These security threats forced the company to
implement the modified OS of Linux and the database of MySQL for enhancing the security
of the database.
Conclusion
Therefore, it can be concluded that the Amazon e-commerce website provides the
users with the enhanced shopping experience and ensures the enhanced security to the data of
the customers. The shopping experience on the website of Amazon starts on the home page
where any user has been notified by the two-fold purpose of the website which are the online
purchasing and the search for the product. The designing of the network architecture of the
network of e-business is done for companies as the operators, customers and the companies
requires to make any business on the basis of the trust during the time of performing the
8
WEB TECHNOLOGY
transactions. In the recent times, the e-commerce websites are implementing the security
protocols for ensuring the security of the websites. Amazon implemented several security
protocols in their website for ensuring the security while the time of transaction.
WEB TECHNOLOGY
transactions. In the recent times, the e-commerce websites are implementing the security
protocols for ensuring the security of the websites. Amazon implemented several security
protocols in their website for ensuring the security while the time of transaction.
9
WEB TECHNOLOGY
References
Al-Haj, S., Al-Shaer, E. and Ramasamy, H.V., 2013, June. Security-aware resource allocation
in clouds. In 2013 IEEE International Conference on Services Computing (pp. 400-407).
IEEE.
Aljawarneh, S., 2013. Cloud security engineering: Avoiding security threats the right way.
In Cloud Computing Advancements in Design, Implementation, and Technologies(pp. 147-
153). IGI Global.
Almorsy, M., Grundy, J. and Müller, I., 2016. An analysis of the cloud computing security
problem. arXiv preprint arXiv:1609.01107.
Chen, Z., Han, F., Cao, J., Jiang, X. and Chen, S., 2013. Cloud computing-based forensic
analysis for collaborative network security management system. Tsinghua science and
technology, 18(1), pp.40-50.
Diniz, F., Kok, K., Hoogstra-Klein, M. and Arts, B., 2015. Mapping future changes in
livelihood security and environmental sustainability based on perceptions of small farmers in
the Brazilian Amazon. Ecology and Society, 20(2).
Fernandes, E., Jung, J. and Prakash, A., 2016, May. Security analysis of emerging smart
home applications. In 2016 IEEE Symposium on Security and Privacy (SP) (pp. 636-654).
IEEE.
Hashizume, K., Rosado, D.G., Fernández-Medina, E. and Fernandez, E.B., 2013. An analysis
of security issues for cloud computing. Journal of internet services and applications, 4(1),
p.5.
Madduri, R.K., Sulakhe, D., Lacinski, L., Liu, B., Rodriguez, A., Chard, K., Dave, U.J. and
Foster, I.T., 2014. Experiences building Globus Genomics: a next‐generation sequencing
WEB TECHNOLOGY
References
Al-Haj, S., Al-Shaer, E. and Ramasamy, H.V., 2013, June. Security-aware resource allocation
in clouds. In 2013 IEEE International Conference on Services Computing (pp. 400-407).
IEEE.
Aljawarneh, S., 2013. Cloud security engineering: Avoiding security threats the right way.
In Cloud Computing Advancements in Design, Implementation, and Technologies(pp. 147-
153). IGI Global.
Almorsy, M., Grundy, J. and Müller, I., 2016. An analysis of the cloud computing security
problem. arXiv preprint arXiv:1609.01107.
Chen, Z., Han, F., Cao, J., Jiang, X. and Chen, S., 2013. Cloud computing-based forensic
analysis for collaborative network security management system. Tsinghua science and
technology, 18(1), pp.40-50.
Diniz, F., Kok, K., Hoogstra-Klein, M. and Arts, B., 2015. Mapping future changes in
livelihood security and environmental sustainability based on perceptions of small farmers in
the Brazilian Amazon. Ecology and Society, 20(2).
Fernandes, E., Jung, J. and Prakash, A., 2016, May. Security analysis of emerging smart
home applications. In 2016 IEEE Symposium on Security and Privacy (SP) (pp. 636-654).
IEEE.
Hashizume, K., Rosado, D.G., Fernández-Medina, E. and Fernandez, E.B., 2013. An analysis
of security issues for cloud computing. Journal of internet services and applications, 4(1),
p.5.
Madduri, R.K., Sulakhe, D., Lacinski, L., Liu, B., Rodriguez, A., Chard, K., Dave, U.J. and
Foster, I.T., 2014. Experiences building Globus Genomics: a next‐generation sequencing
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10
WEB TECHNOLOGY
analysis service using Galaxy, Globus, and Amazon Web Services. Concurrency and
Computation: Practice and Experience, 26(13), pp.2266-2279.
Narula, S. and Jain, A., 2015, February. Cloud computing security: Amazon web service.
In 2015 Fifth International Conference on Advanced Computing & Communication
Technologies (pp. 501-505). IEEE.
Nerini, F.F., Howells, M., Bazilian, M. and Gomez, M.F., 2014. Rural electrification options
in the Brazilian Amazon: A multi-criteria analysis. Energy for Sustainable Development, 20,
pp.36-48.
Niranjanamurthy, M., Kavyashree, N., Jagannath, S. and Chahar, D., 2013. Analysis of e-
commerce and m-commerce: advantages, limitations and security issues. International
Journal of Advanced Research in Computer and Communication Engineering, 2(6), pp.2360-
2370.
Pichan, A., Lazarescu, M. and Soh, S.T., 2015. Cloud forensics: Technical challenges,
solutions and comparative analysis. Digital Investigation, 13, pp.38-57.
Pletea, D., Vasilescu, B. and Serebrenik, A., 2014, May. Security and emotion: sentiment
analysis of security discussions on GitHub. In Proceedings of the 11th working conference
on mining software repositories (pp. 348-351). ACM.
Rodrigues, J.J., De La Torre, I., Fernández, G. and López-Coronado, M., 2013. Analysis of
the security and privacy requirements of cloud-based electronic health records
systems. Journal of medical Internet research, 15(8).
van Soesbergen, A.J.J. and Mulligan, M., 2014. Modelling multiple threats to water security
in the Peruvian Amazon using the WaterWorld policy support system. Earth System
Dynamics, 5(1), pp.55-65.
WEB TECHNOLOGY
analysis service using Galaxy, Globus, and Amazon Web Services. Concurrency and
Computation: Practice and Experience, 26(13), pp.2266-2279.
Narula, S. and Jain, A., 2015, February. Cloud computing security: Amazon web service.
In 2015 Fifth International Conference on Advanced Computing & Communication
Technologies (pp. 501-505). IEEE.
Nerini, F.F., Howells, M., Bazilian, M. and Gomez, M.F., 2014. Rural electrification options
in the Brazilian Amazon: A multi-criteria analysis. Energy for Sustainable Development, 20,
pp.36-48.
Niranjanamurthy, M., Kavyashree, N., Jagannath, S. and Chahar, D., 2013. Analysis of e-
commerce and m-commerce: advantages, limitations and security issues. International
Journal of Advanced Research in Computer and Communication Engineering, 2(6), pp.2360-
2370.
Pichan, A., Lazarescu, M. and Soh, S.T., 2015. Cloud forensics: Technical challenges,
solutions and comparative analysis. Digital Investigation, 13, pp.38-57.
Pletea, D., Vasilescu, B. and Serebrenik, A., 2014, May. Security and emotion: sentiment
analysis of security discussions on GitHub. In Proceedings of the 11th working conference
on mining software repositories (pp. 348-351). ACM.
Rodrigues, J.J., De La Torre, I., Fernández, G. and López-Coronado, M., 2013. Analysis of
the security and privacy requirements of cloud-based electronic health records
systems. Journal of medical Internet research, 15(8).
van Soesbergen, A.J.J. and Mulligan, M., 2014. Modelling multiple threats to water security
in the Peruvian Amazon using the WaterWorld policy support system. Earth System
Dynamics, 5(1), pp.55-65.
11
WEB TECHNOLOGY
Xu, Y., Reynaga, G., Chiasson, S., Frahm, J.M., Monrose, F. and Van Oorschot, P.C., 2014.
Security analysis and related usability of motion-based captchas: Decoding codewords in
motion. IEEE transactions on dependable and secure computing, 11(5), pp.480-493.
WEB TECHNOLOGY
Xu, Y., Reynaga, G., Chiasson, S., Frahm, J.M., Monrose, F. and Van Oorschot, P.C., 2014.
Security analysis and related usability of motion-based captchas: Decoding codewords in
motion. IEEE transactions on dependable and secure computing, 11(5), pp.480-493.
1 out of 12
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.