E-Business Systems Security in Intelligent Organizations

Author(s):  
Denis Trcek

Security as we perceive it today became a topic of research with the introduction of networked information systems, or networked ISs, in the early 1980s. In the mid-1990s the proliferation of the Internet in the business area exposed security as one of the key factors for successful online business, and the majority of efforts to provide it were focused on technology. However, due to lessons learned during this period, the paradigms have since changed, with increasing emphasis on human factors. It is a fact that security of networked ISs is becoming part of the core processes in all e-business environments. While data is clearly one of the key assets and has to be protected accordingly, ISs have to be highly integrated and open. Appropriate treatment of these contradictory issues is not a trivial task for managers of contemporary intelligent organizations. It requires new approaches, especially in light of new technologies.

Author(s):  
Denis Trcek

Security became a topic of research with the introduction of networked information systems, or networked IS, in the early eighties. In the mid-nineties the proliferation of the Internet in the business area exposed security as one of the key factors for successful online business, and the majority of effort to provide it was focused on technology. However, due to lessons learned during this period, the paradigms have since changed, with increasing emphasis on human factors. It is a fact that security of information systems is becoming part of the core processes in all e-business environments. While data is clearly one of the key assets and has to be protected accordingly, IS have to be highly integrated and open. Appropriate treatment of these issues is not a trivial task for managers of intelligent enterprises and requires new approaches, especially in light of new technologies.


2008 ◽  
pp. 1806-1811
Author(s):  
Denis Trcek

Security issues became a topic of research with the introduction of networked information systems in the early eighties. However, in the mid-nineties the proliferation of the Internet in the business area exposed security as one of key-factors for successful on-line business. The majority of efforts to provide security were focused on technology. However, it turned out during the last years that human factors play a central role. Therefore, this chapter gives a methodology for proper risk management that is concentrated on human factors management, but it starts with addressing classical, i.e. technology based issues. Afterwards, business dynamics is deployed to enable a quantitative approach for handling security of contemporary information systems. The whole methodology encompasses business intelligence and presents appropriate architecture for human resources management.


Author(s):  
R. Todd Stephens

This chapter examines the elements of the new Web 2.0 technology base and reviews the lessons learned when implementing these technologies. Collaborative applications have made enormous inroads into the enterprise and bring unprecedented speed and transparency to communications. Researchers and practitioners alike are focusing on how collaborative applications can replace the one-way communications inherent to Intranet sites. This chapter is intended for individuals who are looking toward the possibility of integrating these new technologies into the core communication medium. Unfortunately, there are still large barriers such as politics, turf battles, integration, and poor usability with the current product set. A company’s ability to manage information effectively over its life cycle, including sensing, collecting, organizing, processing, and maintaining information, is crucial to the long term success in a global economy. The success or failure of this integration may very well create or lose a competitive advantage for the enterprise. What is missing is a framework or roadmap in which organizations can plan out their execution of We 2.0 deployment.


Author(s):  
Denis Trcek

Security issues became a topic of research with the introduction of networked information systems in the early eighties. However, in the mid-nineties the proliferation of the Internet in the business area exposed security as one of key-factors for successful on-line business. The majority of efforts to provide security were focused on technology. However, it turned out during the last years that human factors play a central role. Therefore, this chapter gives a methodology for proper risk management that is concentrated on human factors management, but it starts with addressing classical, i.e. technology based issues. Afterwards, business dynamics is deployed to enable a quantitative approach for handling security of contemporary information systems. The whole methodology encompasses business intelligence and presents appropriate architecture for human resources management.


2008 ◽  
pp. 2931-2948
Author(s):  
Denis Trcek

Security issues became a topic of research with the introduction of networked information systems in the early eighties. However, in the mid-nineties the proliferation of the Internet in the business area exposed security as one of key-factors for successful on-line business. The majority of efforts to provide security were focused on technology. However, it turned out during the last years that human factors play a central role. Therefore, this chapter gives a methodology for proper risk management that is concentrated on human factors management, but it starts with addressing classical, i.e. technology based issues. Afterwards, business dynamics is deployed to enable a quantitative approach for handling security of contemporary information systems. The whole methodology encompasses business intelligence and presents appropriate architecture for human resources management.


2011 ◽  
pp. 201-218
Author(s):  
R. Todd Stephens

This chapter examines the elements of the new Web 2.0 technology base and reviews the lessons learned when implementing these technologies. Collaborative applications have made enormous inroads into the enterprise and bring unprecedented speed and transparency to communications. Researchers and practitioners alike are focusing on how collaborative applications can replace the one-way communications inherent to Intranet sites. This chapter is intended for individuals who are looking toward the possibility of integrating these new technologies into the core communication medium. Unfortunately, there are still large barriers such as politics, turf battles, integration, and poor usability with the current product set. A company’s ability to manage information effectively over its life cycle, including sensing, collecting, organizing, processing, and maintaining information, is crucial to the long term success in a global economy. The success or failure of this integration may very well create or lose a competitive advantage for the enterprise. What is missing is a framework or roadmap in which organizations can plan out their execution of We 2.0 deployment.


2019 ◽  
Vol 17 (2) ◽  
pp. 462-478
Author(s):  
Lucia Kohnová ◽  
Nikola Salajová

Technological changes that come with industrial revolution have largely affected businesses, as well as society. With the current technological shift and Fourth Industrial Revolution, many questions arise regarding the impacts and effects on current ways businesses operate. This study presents a retrospective analysis and overview of previous industrial revolutions. The aim of the retrospective analysis is to identify common characteristics that may lead to lessons learned for the forthcoming Fourth Industrial Revolution and thus complement the current debate on technological change. All previous industrial revolutions have led to change in business environments and new challenges for managers and owners. The findings show that all previous revolutions have led to increase in the number of service jobs created. The key approach of successful countries during the times of industrial revolution has included education as the source of new skills and knowledge necessary for adaption. Countries that were able to produce high skilled people could not only invent, but also adapt to new technologies sooner than others. Similarly, these approaches included introduction of new managerial practices in order to be able to utilize new technologies and new skilled workers effectively. The research article processes secondary data together with literature review on this topic.


2013 ◽  
Vol 16 (1) ◽  
pp. 59-67

<p>The Soil Science Institute of Thessaloniki produces new digitized Soil Maps that provide a useful electronic database for the spatial representation of the soil variation within a region, based on in situ soil sampling, laboratory analyses, GIS techniques and plant nutrition mathematical models, coupled with the local land cadastre. The novelty of these studies is that local agronomists have immediate access to a wide range of soil information by clicking on a field parcel shown in this digital interface and, therefore, can suggest an appropriate treatment (e.g. liming, manure incorporation, desalination, application of proper type and quantity of fertilizer) depending on the field conditions and cultivated crops. A specific case study is presented in the current work with regards to the construction of the digitized Soil Map of the regional unit of Kastoria. The potential of this map can easily be realized by the fact that the mapping of the physicochemical properties of the soils in this region provided delineation zones for differential fertilization management. An experiment was also conducted using remote sensing techniques for the enhancement of the fertilization advisory software database, which is a component of the digitized map, and the optimization of nitrogen management in agricultural areas.</p>


2020 ◽  
Vol 4 (Supplement_1) ◽  
pp. 850-850
Author(s):  
Nicole Dawson ◽  
Heather Menne

Abstract The National Institute on Aging recognizes the importance of identifying promising non-pharmacological interventions (NPI) to promote health in individuals with Alzheimer’s disease and related dementias. Several systematic reviews have been completed investigating exercise in this population resulting in mixed evidence regarding efficacy across functional domains. It is critical to investigate the methodological factors from the original interventions for a true understanding of these findings as to not outright dismiss exercise as beneficial. One example is Ohio’s replication of Reducing Disability in Alzheimer’s Disease (n=508), which resulted in no significant improvements in physical performance for individuals with dementia ((gait speed (p=.81), balance (p=.82), functional reach (p=.58)). In this investigation, along with many others, researchers were not guided by key principles of exercise science leading to critical intervention design and methodological flaws. Thus, exercise interventions for individuals with dementia need to include interpretations of non-findings and report key factors affecting the outcomes.


2010 ◽  
Vol 3 (1) ◽  
Author(s):  
Lizzy Bleumers ◽  
Kris Naessens ◽  
An Jacobs

This article introduces Proxy Technology Assessment (PTA) as a methodological approach that can widen the scope of virtual world and game research. Studies of how people experience virtual worlds and games often focus on individual in-world or in-game experiences. However, people do not perceive these worlds and games in isolation. They are embedded within a social context that has strongly intertwined online and offline components. Studying virtual experiences while accounting for these interconnections calls for new methodological approaches. PTA answers this call.Combining several methods, PTA can be used to investigate how new technology may impact and settle within people's everyday life (Pierson et al., 2006). It involves introducing related devices or applications, available today, to users in their natural setting and studying the context-embedded practices they alter or evoke. This allows researchers to detect social and functional requirements to improve the design of new technologies. These requirements, like the practices under investigation, do not stop at the outlines of a magic circle (cf. Huizinga, 1955).We will start this article by contextualizing and defining PTA. Next, we will describe the practical implementation of PTA. Each step of the procedure will be illustrated with examples and supplemented with lessons learned from two interdisciplinary scientific projects, Hi-Masquerade and Teleon, concerned with how people perceive and use virtual worlds and games respectively.


Sign in / Sign up

Export Citation Format

Share Document