Security Management in an E-Business Environment

Author(s):  
Mohini Singh

Ensuring security for e-business information exchange is essential as it entails exchange of sensitive information. E-business transactions entail transfer of funds with buyers, sellers and business partners. Vulnerabilities and security incidents in the digital environment require an understanding of technology issues and security challenges for privacy and trust in an online environment. Technological developments over the past few years have made significant contributions to securing the Internet for e-business. This chapter is a discussion of managing security in an e-business organization. It illustrates the differences in security policies for traditional businesses and online businesses, introduces basic security concepts, provides an understanding of security incidents in e-business and briefly explains some basic security tools. More importantly the chapter highlights e-business security management by highlighting the need for organization-based security policies, procedures and practices. Trust and privacy issues in e-business have been addressed by highlighting the need for effective management of security in e-business.

Author(s):  
Mohini Singh

E-business is an innovation that modern day organisations cannot do without. It is based on technology, evolves with technological developments, digitises and automates business processes, is global and leads to improved competitiveness, efficiencies, increased market share, and business expansion. E-businesses models include business-to-business, business-to-consumer, government-to-government, government-to-business, government-to-consumer and numerous others that evolve with new developments. Technological developments applied to e-business results in new issues in the organisation, in dealing with business partners and customers, requires new laws and regulations and automated business processes. Conducting business electronically is a change from traditional ways of doing things, leading to large scale transformation of existing business. To attain business efficiencies from e-business, it is imperative that organisations effectively manage the e-business environment, and all associated changes to digitize and maintain the environment. This chapter discusses management paradigms essential for e-business change management.


Author(s):  
E. V. Gorkovenko ◽  
I. V. Platonova

The business environment in which russian organizations operate is complex due to the intense competition between business partners. In such conditions, organizations are forced to adapt to the imperfections of the legal framework, search for qualified personnel, solve issues related to the physical and moral deterioration of fixed assets, lack of current assets and cash, imperfect tax policy, insolvency of business partners, etc.to ensure their own economic security. Economic security is considered at two levels: at the macro level, that is, as the security of the state, and at the micro level – as the security of the organization. In this study, we will understand the economic security of an organization as a condition in which it is protected from external and internal threats, as well as aimed at obtaining a stable income in an uninterrupted operation and using all the resources available to it. Economic security can be characterized not only by qualitative, but also quantitative indicators. The most significant quantitative indicator is the level of economic security, which is an assessment of the state of use of the organization's resources according to certain criteria. Economic security management is a complex mechanism on which the well-being of an organization depends. In turn, to implement such a mechanism, it is necessary to create a system for managing the organization's economic security. At the same time, the organization's economic security management system consists of a set of organizational and managerial, regime, technical, preventive and propaganda measures aimed at protecting the organization's interests and property from both external and internal threats. In many cases, enterprises create their own security system to manage and ensure economic security of their financial and economic activities. However, it should be taken into account that it is impossible to create a universal system of economic security suitable for any organization, since each organization is unique, with its own characteristics of work, capabilities, potential and is focused on a specific market segment.


2021 ◽  
pp. 310-328
Author(s):  
Fatou Guèye ◽  
Ahmadou Aly Mbaye

Sahelian countries, while sharing many features of other Sub-Saharan African economies, face some unique economic challenges, which merit particular scrutiny, notably: a sizable demographic bulge, being landlocked, a lower income per head, and a higher poverty incidence. The picture is further darkened by critical governance weaknesses, political instability, and radical Islamist threats, which, as discussed in other chapters in this volume, have caused serious security challenges within, and across, national borders. All these factors have contributed to a downsizing of the formal business environment and an expansion of the informal sector. This chapter assesses the relative weights of the formal and informal sectors in Sahelian national economies, its growth dynamics, as well as employment and productivity patterns. It also examines the implications of the rise of the informal sector for institutions and governance, social inclusion, and stability.


2021 ◽  
Vol 14 ◽  
pp. 22-38
Author(s):  
Panxin Zhou

Today, Supply Chain Management (SCM) is regarded as an essential strategic factor, which has a great deal of influence on earning competitiveness in global business environment. There are conflicts among all members of the SCM. In order to maximize the total profit of the SCM, negotiation among all members is necessary. For enterprise in the supply chain, the supply chain partnership has become a significant factor affecting firm performance. In this paper, I examine the impact of cooperation between enterprise and its supply chain partners. Specifically, I collect survey data from Chinese manufacturing firms about their relations with partners and use regression analysis to test hypotheses about the associations between firm performance and supply chain partnership. My results support that superior supplier partnership has a positive impact on reducing transaction costs and improving financial and market performance. In additional test, I establish a series of models with interactive terms. The results of additional test indicate that the impact is enhanced if the competition of each sub industry of the manufacturing industry is different. Above all, I put forward the following suggestions. Enterprise managers could establish an evaluation mechanism of suppliers and retailers, which select high-quality cooperative partners and reduce low-quality transaction costs for enterprises. When participating in business operation, shareholders could comprehensively understand the business conditions of various supply partners and choose reliable supply chain partners for investment. Also, the government can guide the realization of resource sharing and information exchange among supply chain enterprises, which is beneficial to create a more competitive supply chain to promote economic development.


1995 ◽  
Vol 26 (2) ◽  
pp. 49-57 ◽  
Author(s):  
Christo Boshoff ◽  
Alwyn P. Du Plessis

The high level of human involvement in marketing ensures that it is, and always will be, a dynamic business function. When the impact of accelerating technological developments is added, the dynamism often turns to volatility. The rapidly changing business environment necessitates regular consideration of the role of marketing in the business environment, both from an internal and external point of view. This study analyses marketing and marketing activities from a consumer perspective. It measures consumer attitudes towards the four P's and converts these scores to an overall 'attitude towards marketing' index. It also compares the results with a similar study conducted in 1990 (the 1990 study). The 1990 study reported a negative marketing index of -16.262. Older consumers in particular voiced their disapproval of marketing practices. Pricing was singled out as the most important bone of contention. The pricing and the pricing practices used by marketers were seen as often unfair and unreasonable. Advertising was also viewed rather sceptically. Retailing was the only marketing mix element to return a positive index. The results of this study show that the SA Marketing Index has declined from -16.262 in 1990 to -34.125 in 1993. The decline in the marketing index is primarily due to the considerable decline in the price index from -8.470 to -24.368, a slight decrease in the product index (from -2.719 to -9.939) and a marginal deterioration in the retailing index. The decline in the price index in particular was so severe that the improvement in the advertising index (from -6.434 to +0.606) had almost no influence on the marketing index. When the impact of demographic variables on attitudes were considered, Afrikaans-speaking consumers and those who are relatively well qualified academically, turned out to be particularly dissatisfied with marketing.


Author(s):  
Dr. J. Padmavathi ◽  
Sirvi Ashok Kumar Mohanlal

Today Social Media is an integral part of many people’s lives. Most of us are users of one or many of these such as Facebook, Twitter, Instagram, LinkedIn etc. Social media networks are the most common platform to communicate with our friends, family and share thoughts, photos, videos and lots of other information in the common area of interest. Privacy has become an important concern in social networking sites. Users are not aware of the privacy risks involved on social media sites and they share their sensitive information on social network sites. While these platforms are free and offer unrestricted access to their services, they puzzle the users with many issues such as privacy, security, data harvesting, content censorship, leaking personal information etc. This paper aims at analyzing, the major users of social media networks, namely, the college students. It was intended to assess the extent the consumers’ are aware of the risks of free usage and how to mitigate against these privacy issues.


Author(s):  
Ch. Himabindu

The availability of realistic network data plays a significant role in fostering collaboration and ensuring U.S. technical leadership in network security research. Unfortunately, a host of technical, legal, policy, and privacy issues limit the ability of operators to produce datasets for information security testing. In an effort to help overcome these limitations, several data collection efforts (e.g., CRAWDAD[14], PREDICT [34]) have been established in the past few years. The key principle used in all of these efforts to assure low-risk, high-value data is that of trace anonymization—the process of sanitizing data before release so that potentially sensitive information cannot be extracted.


2001 ◽  
Vol 40 (1) ◽  
pp. 130-152 ◽  
Author(s):  
L. Koved ◽  
A. Nadalin ◽  
N. Nagaratnam ◽  
M. Pistoia ◽  
T. Shrader

Author(s):  
Олександр Михайлович Петрук ◽  
Станіслав Ігорович Василішин

The aggravation of the crisis phenomena in the national economy and its further recovery are related to the management of the mechanisms to strengthen economic security, which should be based on the improved methodology of accounting and analytical support as the main source of the relevant and reliable information as to the risks of the business environment. The purpose of the research is to establish the institutional factors of accounting and analytical support of economic security management and justify their possible impact. The authors’ definition of economic security has been given and its place in the system of accounting and analytical support has been characterized. The spheres of the institutional influence on accounting and analytical support of economic security management and their manifestations have been determined. It has been assumed that the most fundamental factor that forms the foundation of economic security management on the basis of accounting and analytical support is the effectiveness and vector orientation of the system of strategic management of the enterprise, as the result of which the multidimensionality of accounting and analytical support in the process of strategic management has been characterized. Possible groups of factors that form economic security and the system of its accounting and analytical support have been considered. It has been established that accounting as a source to achieve trust, understanding and manageability of the economic environment and information support of the management processes embodies the features of an independent institution of socio-economic development. The decomposition of the institutional factor influence of accounting and analytical support of economic security management at the macro, meso and micro levels has been substantiated, which allows predicting the vector of changes and form a theoretical foundation for the development of the theory, methodology and organization of accounting and analytical support during the development of the measures to strengthen economic security of the enterprises.


Author(s):  
Alberto De la Rosa Algarín ◽  
Steven A. Demurjian ◽  
Timoteus B. Ziminski ◽  
Yaira K. Rivera Sánchez ◽  
Robert Kuykendall

Today’s applications are often constructed by bringing together functionality from multiple systems that utilize varied technologies (e.g. application programming interfaces, Web services, cloud computing, data mining) and alternative standards (e.g. XML, RDF, OWL, JSON, etc.) for communication. Most such applications achieve interoperability via the eXtensible Markup Language (XML), the de facto document standard for information exchange in domains such as library repositories, collaborative software development, health informatics, etc. The use of a common data format facilitates exchange and interoperability across heterogeneous systems, but challenges in the aspect of security arise (e.g. sharing policies, ownership, permissions, etc.). In such situations, one key security challenge is to integrate the local security (existing systems) into a global solution for the application being constructed and deployed. In this chapter, the authors present a Role-Based Access Control (RBAC) security framework for XML, which utilizes extensions to the Unified Modeling Language (UML) to generate eXtensible Access Control Markup Language (XACML) policies that target XML schemas and instances for any application, and provides both the separation and reconciliation of local and global security policies across systems. To demonstrate the framework, they provide a case study in health care, using the XML standards Health Level Seven’s (HL7) Clinical Document Architecture (CDA) and the Continuity of Care Record (CCR). These standards are utilized for the transportation of private and identifiable information between stakeholders (e.g. a hospital with an electronic health record, a clinic’s electronic health record, a pharmacy system, etc.), requiring not only a high level of security but also compliance to legal entities. For this reason, it is not only necessary to secure private information, but for its application to be flexible enough so that updating security policies that affect millions of documents does not incur a large monetary or computational cost; such privacy could similarly involve large banks and credit card companies that have similar information to protect to deter identity theft. The authors demonstrate the security framework with two in-house developed applications: a mobile medication management application and a medication reconciliation application. They also detail future trends that present even more challenges in providing security at global and local levels for platforms such as Microsoft HealthVault, Harvard SMART, Open mHealth, and open electronic health record systems. These platforms utilize XML, equivalent information exchange document standards (e.g., JSON), or semantically augmented structures (e.g., RDF and OWL). Even though the primary use of these platforms is in healthcare, they present a clear picture of how diverse the information exchange process can be. As a result, they represent challenges that are domain independent, thus becoming concrete examples of future trends and issues that require a robust approach towards security.


Sign in / Sign up

Export Citation Format

Share Document