Information Security Standards for E-businesses

نویسندگان

  • Muhammad M. Satti
  • Brian J. Garner
  • Mahmood H. Nagrial
چکیده

The process of buying, selling or interacting with customers via Internet, Tele-sale, Smart card or other computer network is referred to as Electronics Commerce. Whereas online trade has been touting its flexibility, convenience and cost savings, the newest entrant is wireless e-commerce. This form of business offers many attractions; including 24 hours seven days’ open shop–business, vastly reduced fixed cost, and increased profitability. Amazon.com is an example of a successful venture, in e-business. Internet Service providers (ISP/ASP) have a significant influence on the feasibility, security and cost competitiveness of an e-business venture. In the ISP model of services, multiple users and their databases are normally offered on a single hardware, platform sharing the same IP address and Domain name. Clients will require a mechanism, which allows them to update their Web contents and databases frequently even many times daily without intervention of local system Administrator (ISP Admin). The paper overviews few steps to enable corporate clients to update their web content more securely. Keywords-E-Commerce, E-business, Information Security, ISP/ASP, Satti, Nagrial, Garner,

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Adoption of Information Security Management Standards A Literature Review

This chapter introduces major information security management methods and standards, and particularly ISO/IEC 27001 and 27002 standards. A literature review was conducted in order to understand the reasons for the low level of adoption of information security standards by companies, and to identify the drivers and the success factors in implementation of these standards. Based on the findings o...

متن کامل

Information Protection Management Structures in Australian E-courts

This issues paper is concerned with ensuring the integrity of Australia’s e-court processes through the development of information protection standards and protocols. The integrity of the court process is important to the national interest because businesses and citizens depend on the certainty of court decisions, naturally assuming that their information and privacy is protected. This paper is...

متن کامل

A Model for Information Security Governance in Developing Countries

The proliferation of e-business, e-services and e-governance in developing countries has resulted in businesses and governments becoming highly dependent on business information and related information technologies. Such information is, however, constantly exposed to real threats that could result in security breaches. If these are realised, the prevailing economic structure of a developing cou...

متن کامل

Determining the appropriate methodology for the security evaluation of equipment related to information and communication technology in the power industry

Providing security in the vital infrastructures of the country, is one of the essential operations that must be taken in order to improve the security of the country. Resistant security strategies need to be regularly implemented as a dynamic process to improve security, and security evaluation is one of the most important steps in this process. Methodology in the field of evaluation in both te...

متن کامل

Information Security Compliances and Knowledge Management Capabilities in International Diversification

Information security compliance has become one of the top priorities for firms to remain competitive in this era. It is even more challenging to comply with foreign standards and laws, when a firm aims to internationalize its operations and remain competitive. This paper discusses the role of information security compliances in international diversification phenomena. Specifically, drawing from...

متن کامل

Towards an Ontology-Driven Approach for the Interoperability Problem in Security Compliance

In today’s IT-centric, regulated and competitive environment, businesses rely more heavily on IT technologies. Organizations are often challenged by customers, business partners and legal entities to demonstrate their compliance to different IT security and performance standards. The existence of heterogeneous standards and regulations raises the interoperability problem for organizations havin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002