Information Technology Policy and the Digital Divide
Show Less

Information Technology Policy and the Digital Divide

Lessons for Developing Countries

Edited by Mitsuhiro Kagami, Masatsugu Tsuji and Emanuele Giovannetti

The proliferation of new information technologies throughout the world has raised some important questions for policymakers as to how developing countries can benefit from their diffusion. This important volume compares the advantages and disadvantages of the IT revolution through detailed studies of a variety of developed and developing nations and regions: Argentina, Estonia, the EU, India, Japan, Korea, Mexico, South Africa, Thailand and the USA.
Buy Book in Print
Show Summary Details

Chapter 13: PKI Solutions for Trusted E-Commerce: Survey of the De Facto Standard Competition in PKI Industries

Atsuho Maeda

Extract

13. PKI solutions for trusted e-commerce: survey of the de facto standard competition in PKI industries Atsuho Maeda 1. INTRODUCTION In this section, we focus on a new field of technology called ‘electronic certification’, which is expected to be an effective tool for ensuring the safety of commercial transactions (including international trade) in the midst of the increase in e-commerce on the open networks through the Internet. We will discuss the activities of the new enterprises related to the de facto standard at the industry level, and analyse their strategies for making inroads into Asian markets and their impact. We have been shifting our transaction basis from a norm of ‘face-to-face commercial transactions’, which involved only the trusted participants, into a business (including trade) format of ‘open electronic commerce’ conducted via the Internet. The question of how to ensure mutual trust between those involved in the transaction has become an important issue. Along with the growth of the Internet as the basis of business affairs, ‘the positive impact’ is that conventional business practices of exclusive associations have been shaken off, and business opportunities have expanded. On the other hand, ‘the negative impact’ is that it is also necessary to be aware of the unlimited increase in the danger of illegal access to the data for transactions conducted on the Internet, including ‘wiretapping,’ ‘tampering’ and ‘impersonation’. Transactions that are made on an open network are between multiple, unspecified users (individuals, corporations, government agencies), unlike the dealings within a business hierarchy...

You are not authenticated to view the full text of this chapter or article.

Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage.

Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use.

Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian.


Further information

or login to access all content.