[1] A. Al-Bakri, “The Adoption of B2B by SME in Amman and the Perceptions of Its Influence on Their Performance and Efficiency,” PhD Thesis (Non-Published Thesis), University of Southern Queensland, Toowoomba, 2009.
[2] T. R. Peltier, “Information Security Risk Analysis,” CRC Press, Boca Raton, 2001.
[3] H. Rank and B. Schmitt, “The Challenge of Information Security,” Military Technology, Vol. 29, No. 11, 2005, pp. 8-50.
[4] T. Thanasankit, “E-Commerce and Cultural Values,” Idea Group Inc., New York, 2002. doi:10.4018/978-1-59140-056-1
[5] UNCTAD, “Building Confidence: E-Commerce and Development Report,” 2012. http://www.unece.org/trade/untdid/welcome.htm
[6] M. Gerber and R. Solms, “Information Security Requirements—Interpreting the Legal Aspects,” Computers & Security, Vol. 27, No. 5-6, 2008, pp. 124-135. doi:10.1016/j.cose.2008.07.009
[7] D. Kim, S. Cavusgil and R. Calantone, “Information System Innovations and Supply Chain Management: Channel Relationships and Firm Performance,” Journal of the Academy of Marketing Science, Vol. 34, No. 1, 2006, pp. 40-54.
[8] V. Zeithaml, A. Parasuraman and A. Malhotra, “Service Quality Delivery through Web Sites: A critical Review of Extant Knowledge,” Journal of the Academy of Marketing Science, Vol. 30, No.4, 2003, pp. 362-375.
[9] K. Hausken, “Information Sharing among Firms and Cyber-Attacks,” Journal of Accounting and Public Policy, Vol. 26, No. 6, 2007, pp. 639-688. doi:10.1016/j.jaccpubpol.2007.10.001
[10] W. Titi, “The Impact of Adoption Electronic Commerce in Small to Medium Enterprises Jordanian Companies,” The 1st International Conference on E-Business and E-Learning, Jordan, 24-25 May 2005, pp.159-178.
[11] M. Stamp, “Information Security,” John Wiley & Sons, New York, 2005. doi:10.1002/0471744190
[12] M. Warren and W. Hutchinson, “Cyber-Attacks Against Supply Chain Management Systems: A Sort Note,” International Journal of Physical Distribution & Logistics Management, Vol. 30, No. 7-8, 2002, pp. 710-716. doi:10.1108/09600030010346521
[13] C. Steinfield and P. Whitter, “Community level Socio-Economic Impacts of Electronic commerce,” Journal of Computer Mediated Communication, Vol. 5, No. 2, 1999, pp. 714-719.
[14] J. Westby, “International Guide to Combating Cybercrime,” American Bar Association, USA, 2003.
[15] E. Abu Zaid, “Attracting e-Commerce. First GCC E-Commerce Conference, UAE,” 2005. www.kenzay-traning.com
[16] V. Leopoulos, K. Kirytopoulos and D. Voulgaridou, “the benefits of e-commerce: a case study of the Greek Para-pharmaceutical industry,” National Technical University of Athens, Athens, 2006.
[17] Abu-Ghazaleh and C. Consulting, “Market Brief on Telecommunications Sector in Jordan,” 2009. http://www.commercecan.ic.gc.ca
[18] Department of Statistics in Jordan (DOS), Census of Enterprises, 2011. http://www.dos.gov.jo
[19] A. Abu-Samaha and Y. Abdel Samad, “Challenges to the Jordanian Electronic Government Initiative,” Journal of Business Systems, Governance and Ethics, Vol. 2, No. 3, 2007, pp. 101-109.
[20] Ministry of Trade and Industry in Jordan, 2010. http://www.mit.gov.jo
[21] Ministry of Industry and Trade in Jordan (MIT), 2012. http://www.mit.gov.jo
[22] M. Al-Ibraheem and H. Tahat, “Regulating Electronic Contracting in Jordan,” 21st BILETA Conference; Globalization and Harmonization in Technology Law, Malta, 6-7 April 2006, pp. 6-19.
[23] Arab Advisor Group, 2012.www.arabadvisors.com
[24] Arab Advisor Press Room, 2012. http://www.arabadvisors.com
[25] N. Black, A. Lockett, H. Winklhofer and C. Ennew, “The Adoption of Internet Financial Services: A Qualitative Study,” International Journal of Retail and Distribution Management, Vol. 29, No. 8, 2000, pp. 390-398. doi:10.1108/09590550110397033
[26] S. Blythe, “Digital Signature Law of the United Nation. European Union, United Kingdom and United state: Promotion of Growth in E-commerce with Enhanced Security,” Richmond Journal of Law and Technology, Vol. XI, No. 2, 2005, pp. 1-20.
[27] Business Integration Technology, Inc., “Why Supply Chain Executives Should Care about B2B Integration Technology,” 2012. http://businessintegrationtechnology.com/PDF/WhyB2BiMatters.pdf
[28] Business Integration Technology Inc., 2012. http://www.businessintegrationtechnology.com
[29] J. Caldow, “The Quest for Electronic Government: A Defining Vision,” Institute for Electronic Government, IBM Corporation, Washington DC, 1999.
[30] C. Easttom, “Computer Security Fundamentals,” Pearson Prentice Hall, Michigan, 2007.
[31] C. Iacovou, I. Benbasat and A. Dexter, “‘Electronic Data Interchange and Small Organizations: Adoption and Impact of Technology,” MIS Quarterly, Vol. 19, No. 4, 1995, pp. 465-481. doi:10.2307/249629
[32] M. El-Nawawy and M. Ismail, “Overcoming Deterrents and Impediments to Electronic Commerce in Light of Globalization,” Proceedings of the 9th Annual Conference of the Internet Society, INET 99, San Jose, 22-25 June 1999, pp. 9-18.
[33] ESCWA, “National profile of the Information Society in Jordan,” United Nation Report, 2007, pp. 1-16.
[34] ESCWA, “Development of E-Commerce Sectors in the Arab Region,” World Summit on the Information Society (WSIS), Beirut, 4-6 February 2003, pp. 53-65.
[35] J. Fraser, “The Strategic Challenge of Electronic Commerce,” Supply Chain Management, Vol. 5, No. 1, 2000, p. 7. doi:10.1108/13598540010312936
[36] M. Greenstein and T. Feinman, “Electronic Commerce; Security, Risk Management and Control,” McGraw-Hill, Boston, 2000.
[37] R. Gulati, “Business-to-Business E-Commerce: Past, Present, and Future,” 2012.
[38] E. M. Heffes, “Refining the Rules of Commerce,” Financial Executive, Vol. 17, No. 3, 2001, pp. 3-18.
[39] E. Kritzingera and E. Smith, “Information Security Management: A Previous Term Information Security Retrieval and Awareness Model for Industry,” Computers & Security, June 2008
[40] T. Layton, “Guide to Information Security,” CRC Press, Boca Raton, 2006.
[41] Ministry of Information and Communication Technologies in Jordan (MICT), “The E-Readiness Assessment of the Hashemite Kingdom of Jordan,” 2011. http://www.moit.gov.jo
[42] Organization for Economic Cooperation and Development OECD, “Economic Growth in the OECD Area,” OECD Working Paper, 2000.
[43] Organization for Economic Cooperation and Development OECD, “E-Commerce: Impacts and Policy Challenges,” Organization for Economic Cooperation and Development (OECD), Vol. 67, No. 193, 2000, pp. 193-202.
[44] Organization for Economic Cooperation and Development OECD, “The Economic and Social Impacts of electronic Commerce,” Preliminary Finding and Research Agenda, 1999.
[45] Organization for Economic Cooperation and Development (OECD), “E-Commerce: Impacts and Policy Challenges,” 2002.
[46] Y. Rezgui and A. Marks, “Information Security Awareness in Higher Education: An Exploratory Study,” Computers and Security, Vol. 27, No. 7, 2007, pp. 241-253.
[47] M. Sahawneh, “E-Commerce and Its Effect on Labor Force” Socio-economic Impact of Persistent Organic Pollutants,” Royal Scientific Society, 2005.
[48] M. Sahawneh, “E-Commerce: The Jordanian Experience, Industrial Studies Department,” Royal Scientific Society, 2002.
[49] R. Schperberg and R. Kenneth, “Cybercrime,” ISACA, Rolling Meadows, 2005.
[50] P. Chanu, “Determinants of Small Business EDI Adoption: An Empirical Investigation,” Journal of Organisational Computing and Electronic Commerce, Vol. 11, No. 4, 2001, pp. 229-252. doi:10.1207/S15327744JOCE1104_02