Network Security and Its Impact on Business Strategy - Advances in Information Security, Privacy, and Ethics
Latest Publications


TOTAL DOCUMENTS

13
(FIVE YEARS 13)

H-INDEX

1
(FIVE YEARS 1)

Published By IGI Global

9781522584551, 9781522584568

Author(s):  
Dana Maria (Oprea) Constantin ◽  
Dan Ioan Topor ◽  
Sorinel Căpușneanu ◽  
Mirela Cătălina Türkeș ◽  
Mădălina-Gabriela Anghel

This chapter illustrates some aspects of the green reporting and its impact on the business strategy of an economic entity. The main objectives of this chapter are to present the green reporting and the green accounting synthesis documents and, also, to present the computer program for the green report of an economic entity. Based on the national and international literature, the authors present the concepts of the green reporting and integrated report and a computer program specifically designed to record green costs and green reporting. They present the types of green costs and the legislation related to the green reporting. The aspects presented by the authors are based on the national and international literature, specialized studies related to the topic of this study. A new theoretical-empirical framework is created by the authors through their contribution, which facilitates the identification of new ideas, themes, and debates of other issues encountered in the world business environment.


Author(s):  
Ionica Oncioiu ◽  
Oana Claudia Ionescu

By its nature, the improvement of the individual's health is a service that involves a rigorous sharing of data in real time. Integrating innovative advances in technologies into the healthcare system by organizations from Turkey is a challenge, an approach to the economic and social boundary, and an attempt to balance consumer-oriented actions. This chapter aims to contribute to the decrease of the shortcomings that exist in the healthcare security assessment by focusing on data mining for public institutions and organizations in Turkey.


Author(s):  
Ana Maria Ifrim ◽  
Alina Stanciu ◽  
Rodica Gherghina ◽  
Ioana Duca

The digital era has brought along the exponential growth of the economic and technological opportunities that entities can access and implement in the development of their own activities, along with a series of threats with strategic impact. Being a global, multinational, sustainable, profitable, and credible concept, it also involves a leadership connected to market threats for the entity. Moreover, this leadership must be adaptable, identifying with the vision of the entity and conveying it to its members through the organizational culture it cultivates, but above all a leader who understands and is aware of the functioning of the entity, both managerially and economically. And in order to achieve this, a permanent assessment and re-evaluation of the entity's performance is imperative. This chapter seeks to understand the economic and managerial mechanisms of operation to base the making of pertinent, real, and especially timely decisions in counteracting the threats of a turbulent environment while increasing the potential of the entity.


Author(s):  
Anca Gabriela Petrescu ◽  
Mirela Anca Postole ◽  
Marilena Ciobanasu

The goal of information security is to be able not just to put in place measures to detect and mitigate attacks but also to predict attacks, deter attackers from attacking, and thus defend the systems from attack in the first place. Data protection should be based on the lessons learned over time, both within the organization and in other organizations. Over the time, a large number of methodologies for identifying information security risks were proposed and adopted and simplified approach to different methodologies has led to their classification in quantitative and qualitative, especially in terms of metrics used to quantify risk. This chapter proposes an international overview regarding the quantitative and qualitative analysis methods for information risk analysis. In practice almost always use a combination of these methods, depending on the characteristics of the organization investigated the degree of uncertainty associated with the method of analysis and risk management.


Author(s):  
Louis Delcart

The literature on the development of SMEs is clear: one of the most important obstacles to developing a private sector that also creates jobs is access to financial resources. This chapter presents the various economic players and their accessibility to finance: the public authorities, national, regional and local, the enterprises, and then in particular the SMEs and the traditional civil society. It also shows the conditions that succeed with the most effective results, incentives for start-ups and further developing companies, and the way targets are to be measured.


Author(s):  
Husam AlFahl

Mobile commerce can be a great potential to generate new streams of revenue for many established and new businesses. The penetration rates for mobile phone subscriptions in many countries show that there are significant opportunities to invest in and introduce mobile commerce services in many of these markets. The aim of this chapter is to explore and identify the various factors that influence the intention to adopt mobile commerce in Saudi banks and telecoms. A number of these factors were included in this research as they are chosen from well-known theories and investigated in the current study within the mobile commerce context using principal component analysis technique. The findings of the research show that seven components can affect the intention to adopt mobile commerce in Saudi banks and telecoms. The three most significant components that can affect the intention to adopt mobile commerce services in Saudi banks and telecoms are performance expectancy, organizational readiness, and mobile commerce features and opportunities.


Author(s):  
Alexandru Lucian Manole ◽  
Cristian-Marian Barbu ◽  
Ileana-Sorina Rakos ◽  
Catalina Motofei

Information technology instruments are a very important asset in the hands of every manager. The higher education institutions make no exception from these rules. The exposure to the modern technology and communication tools is very quickly assimilated by students, who acquire the skills to address and even master it and have high expectations from the university they study in to provide them with accurate and real-time information on their particular needs. The management of the university should have at its hand data on students, including personal data, data on academic achievements of any kind, housing in hostels, due and paid tuition fees, data on research, emphasizing both resources allocated and the results obtained, even providing links to online platforms and databases that index these results. The authors approach both operational databases and decision-oriented data warehouses and will aim to capitalize their own research interests in the field of IT to synthesize a set of solutions for this type of software.


Author(s):  
Jayapandian N.

The main objective of this chapter is to discuss various security threats and solution in business transactions. The basic working principle and theoretical background of near field communication (NFC) technology is discussed. A component of NFC communication section is to be discussed on various NFC operation modes and RFID tags. NFC technology is used in various fields such as electronic toll collection and e-payment collection for shopping. This device-to-device payment system is facing major security issues. This NFC communication data is transferred from one terminal to another terminal by using short-range radio frequency. Data hackers try to access this radio frequency and attack the business transaction. This hybrid encryption algorithm is used to solve business transaction data security issues. This chapter deals with both key encryption and data encryption processes.


Author(s):  
Winfred Yaokumah ◽  
Alex Ansah Dawson

This chapter explored communications security through the use of an empirical survey to assess the extent of network and data transfer security management in Ghanaian higher educational institutions. Network security management controls consist of monitoring of networks, posture checking, network segmentation, and defense-in-depth. Data transfer security management includes encryption, media access control, and protection of data from public networks. Data were collected from information technology (IT) personnel. The ISO/IEC 21827 maturity model for assessing IT security posture was used to measure the controls. Overall, the result showed that the institutions were at the planned stage of communications security management. In particular, network monitoring, defense-in-depth, and the protection of data from public networks were the most applied controls. Conversely, posture checking was the least applied control. Higher educational institutions need to review their communications security plans and better manage network and data transfer security controls to mitigate data breaches.


Author(s):  
Alok Sharma ◽  
Nidhi Sharma

This noble algorithm to provide security to online data transfer is an excellent means by which security can be received in transferring data over the network, and it cannot be detected by any technique or tools available in the market with attacker, unwanted parties, and intruder. In this chapter, a noble algorithm to secure data in online transmission is proposed that provides one hundred percent security to online data. This process makes the communication one hundred percent secure.


Sign in / Sign up

Export Citation Format

Share Document