scholarly journals Identifying and Managing Enterprise Security Risks in Online Business Convergence Environments

2010 ◽  
Vol 1 (1) ◽  
pp. 1 ◽  
Author(s):  
John Mylonakis ◽  
Alketas Malioukis
2007 ◽  
pp. 286-312
Author(s):  
Stephen C. Shih ◽  
Michael Camarata ◽  
H. Joseph Wen

Web technology has enabled many organizations to form an e-enterprise for effective communicating, collaborating, and information sharing. To gain competitive advantages, it is necessary for e-enterprises to integrate the entire lines of business operations and critical business data with external supply chain participants over the Web, which may introduce significant security risks to the organizations’ critical assets and infrastructures. This chapter reports a case study of e-service security design and implementation at a leading U.S. company. First, the chapter reviews security concerns and challenges in front-end e-business and back-end supply chain operations. This is followed by the analysis of the company’s e-service and its security problems. The case then presents an integrated e-enterprise security methodology to guide the company for meeting its security needs. The results of this case study provides security professionals with practical steps and sustainable solutions for tackling the unique security challenges arising in an open, unbounded e-enterprise supply chain environment.


Author(s):  
Hairul Azhar Mohamad ◽  
Muhammad Luthfi Mohaini ◽  
Pavithran Ravinthra Nath

This research investigated into the lexical density and frequencies of five types of lexical chunks located in 300 online business letters. Top 10 websites on business correspondence had been identified in terms of traffic visitors and bounce rate under one million web rankings worldwide. Criterion Sampling method was identified prior to extracting the sample letters from the websites. The data was then run with Antconc Concordance Program (ACP) for lexical density and frequency analysis. Top 15 lexical chunks in online business letters (OBL) were compared against those top 15 in Business Letter Corpus (BLC). Findings revealed that there was a total of 39 916-word tokens and 939 counts of lexical chunks found in this corpus. It was found that more lexical words do not imply more lexical chunks used in based on types of business letters.  All 5 types of lexical chunks were identified and ranked in descending order; Sentence Builders (SB) as the most frequent type, followed by Collocations (COL), Deictic locutions (DLs), Polywords (POLs) and Institutionalized Expressions (IUs) as the least frequent type of lexical chunk. Sub-divisional analysis indicated that Grammatical Collocations (GCs) were more common than Lexical Collocations (LCs). Majority of lexical chunks were formed more at sentence level than phrasal level. Comparative analysis between top 15 lexical chunks in OBL and BLC discovered that most top lexical chunks in online business letters are representative of those corporate business letters in BLC. Pedagogical implications in terms of the reliability of online business letters for academic reference and future research considerations are also addressed.


1992 ◽  
Author(s):  
Michael D. Mumford ◽  
Theodore L. Gessner ◽  
Jennifer O'Connor ◽  
Mary S. Connelly ◽  
Timothy C. Clifton

2005 ◽  
Author(s):  
Puyan Dadvar ◽  
Kevin Skadron
Keyword(s):  

2015 ◽  
Vol 5 (3) ◽  
pp. 95-112
Author(s):  
Miroslava Kovaříková

This article deals with the issue of security management and its following application in education. The article focuses on the topic of armed attacks at schools. Based on a research probe aimed at teachers which focused on perception of security risks, there are chosen areas to which Central emergency system services should react. Further, knowledge of technical and organizational measures of emergency plans in the organization and the level of attention paid to this issue by the school management were investigated. In the text there are also international models of solutions of this issue introduced. The contribution also brings outline of how is the issue solved in the European Union countries, in particular in the Kingdom of Spain. Experience with the solution of security issues of schools in Latin America are also mentioned. In the conclusion the summary of measures for improvement of security at schools is presented.


Author(s):  
Björn Stöcker ◽  
Daniel Baier ◽  
Benedikt M. Brand

AbstractReturns are an inconvenient problem in the mail-order business, not only for the merchant but also for the customer. With an estimated return rate of 50% in the fashion sector, the seller has to deal with the expense of restocking and possibly reprocessing, the buyer, who must reship the return, and the environment. We do not consider returns to be generally bad, but rather an explicit, integral part of the online business model. Therefore, we investigate potentially suitable measures to avert or avoid returns in the pre-purchase, purchase, and post-purchase phases. We look at current and technological developments in return management and the most critical drivers for fashion assortment returns. The measures we investigate deliver a holistic view of the issue and target all three purchase phases. The resulting measures were assessed via an online questionnaire with 8393 participants (customers of a German fashion online retailer) to impact customer satisfaction using Kano’s method. There are clear measures that promise high customer satisfaction (such as 360° view) and a clear hierarchy regarding monetary and non-monetary measures. By applying a new method, the segmented Kano perspective, we found different customer segments, which are different in their expectations towards returns. That allowed us to conclude dynamics regarding return management. This assessment is followed by discussing the results, conclusions, and indications for further research fields.


2021 ◽  
pp. 1-21
Author(s):  
Andrea Ghiselli ◽  
Pippa Morgan

Abstract The nexus between China's human and economic presence abroad and its security policy is increasingly important. Within this nexus, this study statistically explores whether and to what extent Chinese contractors reduce the number of Chinese nationals they send to work in North Africa, the Middle East and the Horn of Africa when the security situation in host states worsens. We find no significant evidence that either warnings from Chinese embassies and consulates to leave host countries or expert perceptions of host stability influence the number of Chinese workers. Worker numbers appear to decrease significantly only in the aftermath of large-scale violent events. These findings suggest that Chinese companies are relatively acceptant of security risks and uncertainties, despite the decade-long regulatory efforts of the Chinese government to make them more security-conscious overseas and, thus, to reduce pressure to use diplomatically and economically expensive military means for their protection.


Sign in / Sign up

Export Citation Format

Share Document