E-Business Systems Security for Intelligent Enterprise

Author(s):  
Denis Trcek

Security issues became a topic of research with the introduction of networked information systems in the early eighties. However, in the mid-nineties the proliferation of the Internet in the business area exposed security as one of key-factors for successful on-line business. The majority of efforts to provide security were focused on technology. However, it turned out during the last years that human factors play a central role. Therefore, this chapter gives a methodology for proper risk management that is concentrated on human factors management, but it starts with addressing classical, i.e. technology based issues. Afterwards, business dynamics is deployed to enable a quantitative approach for handling security of contemporary information systems. The whole methodology encompasses business intelligence and presents appropriate architecture for human resources management.

2008 ◽  
pp. 1806-1811
Author(s):  
Denis Trcek

Security issues became a topic of research with the introduction of networked information systems in the early eighties. However, in the mid-nineties the proliferation of the Internet in the business area exposed security as one of key-factors for successful on-line business. The majority of efforts to provide security were focused on technology. However, it turned out during the last years that human factors play a central role. Therefore, this chapter gives a methodology for proper risk management that is concentrated on human factors management, but it starts with addressing classical, i.e. technology based issues. Afterwards, business dynamics is deployed to enable a quantitative approach for handling security of contemporary information systems. The whole methodology encompasses business intelligence and presents appropriate architecture for human resources management.


2008 ◽  
pp. 2931-2948
Author(s):  
Denis Trcek

Security issues became a topic of research with the introduction of networked information systems in the early eighties. However, in the mid-nineties the proliferation of the Internet in the business area exposed security as one of key-factors for successful on-line business. The majority of efforts to provide security were focused on technology. However, it turned out during the last years that human factors play a central role. Therefore, this chapter gives a methodology for proper risk management that is concentrated on human factors management, but it starts with addressing classical, i.e. technology based issues. Afterwards, business dynamics is deployed to enable a quantitative approach for handling security of contemporary information systems. The whole methodology encompasses business intelligence and presents appropriate architecture for human resources management.


Author(s):  
Denis Trcek

Security became a topic of research with the introduction of networked information systems, or networked IS, in the early eighties. In the mid-nineties the proliferation of the Internet in the business area exposed security as one of the key factors for successful online business, and the majority of effort to provide it was focused on technology. However, due to lessons learned during this period, the paradigms have since changed, with increasing emphasis on human factors. It is a fact that security of information systems is becoming part of the core processes in all e-business environments. While data is clearly one of the key assets and has to be protected accordingly, IS have to be highly integrated and open. Appropriate treatment of these issues is not a trivial task for managers of intelligent enterprises and requires new approaches, especially in light of new technologies.


Author(s):  
Denis Trcek

Security as we perceive it today became a topic of research with the introduction of networked information systems, or networked ISs, in the early 1980s. In the mid-1990s the proliferation of the Internet in the business area exposed security as one of the key factors for successful online business, and the majority of efforts to provide it were focused on technology. However, due to lessons learned during this period, the paradigms have since changed, with increasing emphasis on human factors. It is a fact that security of networked ISs is becoming part of the core processes in all e-business environments. While data is clearly one of the key assets and has to be protected accordingly, ISs have to be highly integrated and open. Appropriate treatment of these contradictory issues is not a trivial task for managers of contemporary intelligent organizations. It requires new approaches, especially in light of new technologies.


Author(s):  
Eleanna Galanaki ◽  
Leda Panayotopoulou

Fairly recently numerous technological applications have emerged, claiming to cover nearly every “traditional” human resources management (HRM) activity; not only complementing it, but often even substituting it (Martin, Alexander, Reddington, & Pate, 2006). In order to meet the demands of today’s knowledge-based economy, companies must maximize the potential and productivity of their employees, a goal towards which HRM information systems in general and e-HRM in particular could help. Some of these applications even claim that they can achieve synergies that were not possible before, by integrating all the HRM functions under one software suite, and combining results and feedback from all their different applications. In this article, we study the adoption of e-HRM in Europe, looking at three mail elements: the extent of e-HRM deployment, the characteristics of the companies that adopt e-HRM, and the level of satisfaction from the system.


Author(s):  
Fatima Guadamillas-Gomez ◽  
Mario J. Donate-Manzanares

This chapter analyses the implementation of knowledge management strategies (KMS) in technologyintensive firms. Firstly, a review of KMS in the knowledge management (KM) literature is carried out in order to conceptually establish the focus of the chapter. Next, some key factors for successful KM implementation, such as corporate culture, technological systems, ethical leadership, human resources management practices and organizational flexibility are identified and explained. After that, the case study of two firms which have successfully implemented a KMS in innovation-intensive industries, such as electronics and information technologies, is shown. Finally, and based on the results of the case study, some suggestions are extracted and recommendations are made from a managerial perspective in order to implement a KMS effectively.


2019 ◽  
Vol 15 (1) ◽  
pp. 1-13
Author(s):  
Aman Shakya ◽  
Subhash Paudel

 Skills management is one of the key factors to address the increasing competitiveness among different companies. Suitable knowledge representation and approach for matching skills and competences in job vacancies and candidate profiles can support human resources management automation through suitable matching and ranking services. This paper presents an approach for matchmaking between skills demand and supply through skill profiles enrichment and matching supply and demand profiles over multiple criteria. This work builds upon methods for profile modeling, information enrichment and multi-criteria matching. The main contribution of this work is a methodology for harmonization and enrichment of heterogeneous profile models and skill set description by making use of the standard ESCO ontology. Secondly, an algorithm is proposed for similarity matching across multi-criteria for discovering set of profiles that best fits the job description criteria. A prototype web-based system has been developed to implement the proposed approach and deployed online. The system has been tested with real IT jobs related dataset and validated against relevance scores provided by human experts. Experimental results show consistent correspondence between the similarity ranking scores produced by the system and scores provided by the human users.


Author(s):  
Pamela R. McCauley-Bell ◽  
Lesia L. Crumpton

The information technology field has been increasingly plagued by threats to the security of information systems, networks, and communication media. The solutions to these problems have primarily focused on the techniques to more closely safeguard networks (i.e. firewalls) with similar efforts being put into assessing the vulnerabilities of the hardware and software aspects of the systems. With the exception of discussions into more creative password selection, discussion pertaining to the role of the user, can play in reducing the risk of human error and thus promoting system security has been extremely limited. This lecture will present an overview of information security issues impacted by human interaction that may or may not play a role in promoting system security. Understanding that information systems are in fact composed of hardware and software components which must be addressed using traditional information security protocol, this lecture will provide an understanding of the possible risk that the human/user poses to an information system. Once the risks or factors associated with the human in the security of the system are identified, the next question is do the factors matter? The objective of this lecture is to present an intellectual discussion of human factors issues and their impact on information security. This is an important discussion topic that the information technology field can not afford to ignore.


Author(s):  
Eric Deakins

Since the late 1990s, human resources information systems (HRIS) that exploit inexpensive browser technology have been implemented by companies and public sector organizations alike due to the perceived benefits of such self-service systems, which include: added convenience for employees, simplified approval processes, reduced administration costs, and more time for strategic human resources management (HRM) activities (e.g., Zampetti and Adamson, 2001). Yet despite their growing pervasiveness, it is common that the e-HRM is underused by employees in many organizations (Gevity, 2005). The purpose of this article is to offer insights that will help system developers and human resources managers to design and introduce user-accepted e-HRM systems. The remainder of this article is organized as follows: Following a review of information technology usage behavior, an augmented technology acceptance model suitable for studying e-HRM use is proposed. An empirical study of e-HRM user behavior is then presented and the findings discussed. The article concludes with future trends, implications for academics and practitioners, and study limitations.


Sign in / Sign up

Export Citation Format

Share Document