Security challenges for Enterprise Java in an e-business environment

2001 ◽  
Vol 40 (1) ◽  
pp. 130-152 ◽  
Author(s):  
L. Koved ◽  
A. Nadalin ◽  
N. Nagaratnam ◽  
M. Pistoia ◽  
T. Shrader
2021 ◽  
pp. 310-328
Author(s):  
Fatou Guèye ◽  
Ahmadou Aly Mbaye

Sahelian countries, while sharing many features of other Sub-Saharan African economies, face some unique economic challenges, which merit particular scrutiny, notably: a sizable demographic bulge, being landlocked, a lower income per head, and a higher poverty incidence. The picture is further darkened by critical governance weaknesses, political instability, and radical Islamist threats, which, as discussed in other chapters in this volume, have caused serious security challenges within, and across, national borders. All these factors have contributed to a downsizing of the formal business environment and an expansion of the informal sector. This chapter assesses the relative weights of the formal and informal sectors in Sahelian national economies, its growth dynamics, as well as employment and productivity patterns. It also examines the implications of the rise of the informal sector for institutions and governance, social inclusion, and stability.


Author(s):  
Sharon Nachtigal

This chapter is concerned with a major problem for any e-business organization, the security of its Information Systems. A review of information security characteristics and components is presented, followed by a detailed discussion of e-business security issues. Based on a structured approach for describing e-business functionality, e-business characteristics relevant to information security are identified. The major e-business security challenges are considered and e-business security issues are discussed and requirements are identified in different aspects of the realm. The current perimeter security approach appears to be inadequate to the modern business environment. Hence, a different approach is needed. A few alternative approaches are discussed and a review of previous and future research on e-business security is presented. Hence, the chapter aims to contribute both to academics and to e-business executives by providing the information security insight and awareness to the e-business unique security issues and challenges.


Author(s):  
Mohini Singh

Ensuring security for e-business information exchange is essential as it entails exchange of sensitive information. E-business transactions entail transfer of funds with buyers, sellers and business partners. Vulnerabilities and security incidents in the digital environment require an understanding of technology issues and security challenges for privacy and trust in an online environment. Technological developments over the past few years have made significant contributions to securing the Internet for e-business. This chapter is a discussion of managing security in an e-business organization. It illustrates the differences in security policies for traditional businesses and online businesses, introduces basic security concepts, provides an understanding of security incidents in e-business and briefly explains some basic security tools. More importantly the chapter highlights e-business security management by highlighting the need for organization-based security policies, procedures and practices. Trust and privacy issues in e-business have been addressed by highlighting the need for effective management of security in e-business.


2012 ◽  
pp. 135-152 ◽  
Author(s):  
O. Volkova

The article describes the evolution of accounting from the simple registration technique to economic and social institution in medieval Italy. We used methods of institutional analysis and historical research. It is shown that the institutionalization of accounting had been completed by the XIV century, when it became a system of codified technical standards, scholar discipline and a professional field. We examine the interrelations of this process with business environment, political, social, economic and cultural factors of Italy by the XII—XVI centuries. Stages of institutionalization are outlined.


2018 ◽  
pp. 32-51
Author(s):  
R. Yu. Kochnev ◽  
L. I. Polishchuk ◽  
A. Yu. Rubin

We present the comparative analysis of the impact of centralized and decentralized corruption for private sector. Theory and empirical evidence point out to a “double jeopardy” of decentralized corruption which increases the burden of corruption upon private firms and weakens the incentives of bureaucracy to provide public production inputs, such as infrastructure. These outcomes are produced by simultaneous free-riding and the tragedy of the commons effects. The empirical part of the paper utilizes data of the Business Environment and Enterprise Performance project.


Author(s):  
Randi Veiteberg KVELLESTAD ◽  
Ingeborg STANA ◽  
VATN Gunhild

Teamwork involves different types of interactions—specifically cooperation andcollaboration—that are necessary in education and many other professions. The differencesbetween cooperation and collaboration underline the teacher’s role in influencing groupdynamics, which represent both a foundation for professional design education and aprequalification for students’ competences as teachers and for critical evaluation. As a testcase, we focused on the Working Together action-research project in design education forspecialised teacher training in design, arts, and crafts at the Oslo Metropolitan University,which included three student groups in the material areas of drawing, ceramics, and textiles.The project developed the participants’ patience, manual skills, creativity, and abilities,which are important personal qualities for design education and innovation and representcornerstones in almost every design literacy and business environment. The hope is thatstudents will transform these competences to teaching pupils of all ages in their futurecareers.


2018 ◽  
Vol 10 ◽  
pp. 7-15
Author(s):  
Iryna Yasinovska ◽  
◽  
Ivanna Myshchyshyn ◽  
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document