E-Business Systems Security for Intelligent Enterprise

Author(s):  
Denis Trcek

Security became a topic of research with the introduction of networked information systems, or networked IS, in the early eighties. In the mid-nineties the proliferation of the Internet in the business area exposed security as one of the key factors for successful online business, and the majority of effort to provide it was focused on technology. However, due to lessons learned during this period, the paradigms have since changed, with increasing emphasis on human factors. It is a fact that security of information systems is becoming part of the core processes in all e-business environments. While data is clearly one of the key assets and has to be protected accordingly, IS have to be highly integrated and open. Appropriate treatment of these issues is not a trivial task for managers of intelligent enterprises and requires new approaches, especially in light of new technologies.

Author(s):  
Denis Trcek

Security as we perceive it today became a topic of research with the introduction of networked information systems, or networked ISs, in the early 1980s. In the mid-1990s the proliferation of the Internet in the business area exposed security as one of the key factors for successful online business, and the majority of efforts to provide it were focused on technology. However, due to lessons learned during this period, the paradigms have since changed, with increasing emphasis on human factors. It is a fact that security of networked ISs is becoming part of the core processes in all e-business environments. While data is clearly one of the key assets and has to be protected accordingly, ISs have to be highly integrated and open. Appropriate treatment of these contradictory issues is not a trivial task for managers of contemporary intelligent organizations. It requires new approaches, especially in light of new technologies.


2008 ◽  
pp. 1806-1811
Author(s):  
Denis Trcek

Security issues became a topic of research with the introduction of networked information systems in the early eighties. However, in the mid-nineties the proliferation of the Internet in the business area exposed security as one of key-factors for successful on-line business. The majority of efforts to provide security were focused on technology. However, it turned out during the last years that human factors play a central role. Therefore, this chapter gives a methodology for proper risk management that is concentrated on human factors management, but it starts with addressing classical, i.e. technology based issues. Afterwards, business dynamics is deployed to enable a quantitative approach for handling security of contemporary information systems. The whole methodology encompasses business intelligence and presents appropriate architecture for human resources management.


Author(s):  
Denis Trcek

Security issues became a topic of research with the introduction of networked information systems in the early eighties. However, in the mid-nineties the proliferation of the Internet in the business area exposed security as one of key-factors for successful on-line business. The majority of efforts to provide security were focused on technology. However, it turned out during the last years that human factors play a central role. Therefore, this chapter gives a methodology for proper risk management that is concentrated on human factors management, but it starts with addressing classical, i.e. technology based issues. Afterwards, business dynamics is deployed to enable a quantitative approach for handling security of contemporary information systems. The whole methodology encompasses business intelligence and presents appropriate architecture for human resources management.


2008 ◽  
pp. 2931-2948
Author(s):  
Denis Trcek

Security issues became a topic of research with the introduction of networked information systems in the early eighties. However, in the mid-nineties the proliferation of the Internet in the business area exposed security as one of key-factors for successful on-line business. The majority of efforts to provide security were focused on technology. However, it turned out during the last years that human factors play a central role. Therefore, this chapter gives a methodology for proper risk management that is concentrated on human factors management, but it starts with addressing classical, i.e. technology based issues. Afterwards, business dynamics is deployed to enable a quantitative approach for handling security of contemporary information systems. The whole methodology encompasses business intelligence and presents appropriate architecture for human resources management.


Author(s):  
R. Todd Stephens

This chapter examines the elements of the new Web 2.0 technology base and reviews the lessons learned when implementing these technologies. Collaborative applications have made enormous inroads into the enterprise and bring unprecedented speed and transparency to communications. Researchers and practitioners alike are focusing on how collaborative applications can replace the one-way communications inherent to Intranet sites. This chapter is intended for individuals who are looking toward the possibility of integrating these new technologies into the core communication medium. Unfortunately, there are still large barriers such as politics, turf battles, integration, and poor usability with the current product set. A company’s ability to manage information effectively over its life cycle, including sensing, collecting, organizing, processing, and maintaining information, is crucial to the long term success in a global economy. The success or failure of this integration may very well create or lose a competitive advantage for the enterprise. What is missing is a framework or roadmap in which organizations can plan out their execution of We 2.0 deployment.


Author(s):  
Kayvan Miri Lavassani ◽  
Bahar Movahedi

Advancements in organizational information systems and developments in business environments have brought important changes to the contemporary management practices and business models. Organizations have evolved beyond their specific and general environments towards business ecosystems. This study investigates the evolutions of organizational information systems and business environments in the contexts of business ecosystem. Based on an evolutionary study of organizational information systems and business ecosystem an ontological model is proposed for the adoption of new technologies in the real world designs with particular attention to the application of technology. We call for further empirical and conceptual research in understanding and exploring the role of business ecosystems in organizational operations and industrial ecosystems.


2017 ◽  
Vol 8 (1) ◽  
pp. 61-75 ◽  
Author(s):  
Kayvan Miri Lavassani ◽  
Bahar Movahedi

Advancements in organizational information systems and developments in business environments have brought important changes to the contemporary management practices and business models. Organizations have evolved beyond their specific and general environments towards business ecosystems. This study investigates the evolutions of organizational information systems and business environments in the contexts of business ecosystem. Based on an evolutionary study of organizational information systems and business ecosystem an ontological model is proposed for adoption of new technologies in the real world designs with particular attention to the application of technology. The authors call for further empirical and conceptual research in understanding and exploring the role of business ecosystems in organizational operations and industrial ecosystems.


2011 ◽  
pp. 201-218
Author(s):  
R. Todd Stephens

This chapter examines the elements of the new Web 2.0 technology base and reviews the lessons learned when implementing these technologies. Collaborative applications have made enormous inroads into the enterprise and bring unprecedented speed and transparency to communications. Researchers and practitioners alike are focusing on how collaborative applications can replace the one-way communications inherent to Intranet sites. This chapter is intended for individuals who are looking toward the possibility of integrating these new technologies into the core communication medium. Unfortunately, there are still large barriers such as politics, turf battles, integration, and poor usability with the current product set. A company’s ability to manage information effectively over its life cycle, including sensing, collecting, organizing, processing, and maintaining information, is crucial to the long term success in a global economy. The success or failure of this integration may very well create or lose a competitive advantage for the enterprise. What is missing is a framework or roadmap in which organizations can plan out their execution of We 2.0 deployment.


2019 ◽  
Vol 17 (2) ◽  
pp. 462-478
Author(s):  
Lucia Kohnová ◽  
Nikola Salajová

Technological changes that come with industrial revolution have largely affected businesses, as well as society. With the current technological shift and Fourth Industrial Revolution, many questions arise regarding the impacts and effects on current ways businesses operate. This study presents a retrospective analysis and overview of previous industrial revolutions. The aim of the retrospective analysis is to identify common characteristics that may lead to lessons learned for the forthcoming Fourth Industrial Revolution and thus complement the current debate on technological change. All previous industrial revolutions have led to change in business environments and new challenges for managers and owners. The findings show that all previous revolutions have led to increase in the number of service jobs created. The key approach of successful countries during the times of industrial revolution has included education as the source of new skills and knowledge necessary for adaption. Countries that were able to produce high skilled people could not only invent, but also adapt to new technologies sooner than others. Similarly, these approaches included introduction of new managerial practices in order to be able to utilize new technologies and new skilled workers effectively. The research article processes secondary data together with literature review on this topic.


Sign in / Sign up

Export Citation Format

Share Document