{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T19:04:22Z","timestamp":1754161462045,"version":"3.41.2"},"reference-count":11,"publisher":"Emerald","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998,10,1]]},"abstract":"<jats:p>The Internet itself was not designed with security in mind. It was originally designed for research purposes, with open access to willing and able participants. Only recently, with the influx of thousands, if not millions, of users, have the stakes been raised and very serious security concerns brought to light. Following an overview of the threats of Internet-based electronic commerce, this paper discusses two Internet firewall architectures and seven Internet access control technologies. A case study of how a small company, SunCom Int\u2019l Corporation (SIC), selected its Internet firewall is presented. Finally, this paper concludes with a summary and the future of the Internet firewall.<\/jats:p>","DOI":"10.1108\/09685229810227658","type":"journal-article","created":{"date-parts":[[2002,7,27]],"date-time":"2002-07-27T02:08:10Z","timestamp":1027735690000},"page":"178-184","source":"Crossref","is-referenced-by-count":2,"title":["Internet security: a case study of firewall selection"],"prefix":"10.1108","volume":"6","author":[{"given":"H. Joseph","family":"Wen","sequence":"first","affiliation":[{"name":"School of Management, New Jersey Institute of Technology, Newark, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jyh-Horng Michael","family":"Tarn","sequence":"additional","affiliation":[{"name":"Information Systems, Department of Business, Chowan College, Murfreesboro, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"140","reference":[{"issue":"1","key":"2025072819530603800_b1","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1108\/10662249710159809","article-title":"Security considerations of doing business via the Internet: cautions to be considered","volume":"7","author":"Aldridge","year":"1997","journal-title":"Internet Research"},{"issue":"1","key":"2025072819530603800_b2","article-title":"Web security fears grow for business","volume":"82","author":"DePompa","year":"1997","journal-title":"Business Marketing"},{"issue":"1","key":"2025072819530603800_b3","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1108\/EUM0000000000010","article-title":"Information security and the Internet","volume":"6","author":"Doddrell","year":"1996","journal-title":"Internet Research"},{"issue":"4","key":"2025072819530603800_b4","doi-asserted-by":"crossref","DOI":"10.1145\/248448.257470","article-title":"Webware security","volume":"40","author":"Felten","year":"1997","journal-title":"Communications of the ACM"},{"key":"2025072819530603800_b5","unstructured":"Frook, J.E.\n           (1997), \u201cOnsite offering helps secure transactions\u201d, InternetWeek, 15 September, pp. 21-4."},{"issue":"2","key":"2025072819530603800_b6","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1145\/202949.202954","article-title":"Internet security standards: past, present, and future","volume":"2","author":"Kent","year":"1994","journal-title":"ACM Standard View"},{"key":"2025072819530603800_b7","unstructured":"Newman, D.\n          , Holzbaur, H. and Bishop, K. (1997), \u201cFirewalls: don\u2019t get burned\u201d, Data Communications, March, Vol. 21, pp. 37-53."},{"issue":"5","key":"2025072819530603800_b8","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1145\/253769.253802","article-title":"Internet security: firewalls and beyond","volume":"40","author":"Oppliger","year":"1997","journal-title":"Communications of the ACM"},{"key":"2025072819530603800_b9","unstructured":"Power, R.\n           and Farrow, R. (1997), \u201cA history of firewall technology\u201d, Network, August, pp. 119-20."},{"issue":"1","key":"2025072819530603800_b10","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1108\/09685229610114187","article-title":"Information security in business environments","volume":"4","author":"Sanderson","year":"1996","journal-title":"Information Management & Computer Security"},{"key":"2025072819530603800_b11","unstructured":"Violino, B.\n           (1997), \u201cCollapsing the fortress walls\u201d, Information Week, 16 June, pp. 104-7."}],"container-title":["Information Management &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09685229810227658","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685229810227658\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/ics\/article-pdf\/6\/4\/178\/1246931\/09685229810227658.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/www.emerald.com\/ics\/article-pdf\/6\/4\/178\/1246931\/09685229810227658.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,28]],"date-time":"2025-07-28T23:53:17Z","timestamp":1753746797000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/ics\/article\/6\/4\/178\/182350\/Internet-security-a-case-study-of-firewall"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998,10,1]]},"references-count":11,"journal-issue":{"issue":"4","published-print":{"date-parts":[[1998,10,1]]}},"URL":"https:\/\/doi.org\/10.1108\/09685229810227658","relation":{},"ISSN":["0968-5227","1758-5805"],"issn-type":[{"type":"print","value":"0968-5227"},{"type":"electronic","value":"1758-5805"}],"subject":[],"published":{"date-parts":[[1998,10,1]]}}}