An e-enterprise is heavily dependent on computer networks and electronic data and information to run their key business processes. The threats to security have become a paramount concern in an enterprise. Any compromise of security objectives could lead to significant damage to business. This paper defines security objectives and identifies the major risks associated with e-enterprise security. The paper is intended to propose a framework to help prepare for challenges and issues in enterprise security. The paper uses the new version of the ISO/IEC 17799 as a foundation for establishing security framework. The proposed framework stresses security management responsibility with addressing of auditing and compliance with applicable laws and r...
In this article it presents the electronic security of the computer networks. The electronic securit...
Internet age changes the business exchange style and conveys numerous business chances to the e-comm...
Security issues and threats in the e-commerce environment are varied and can be caused intentionally...
Enterprise integration is the key enabler for transforming the collaboration among people, organizat...
The e-business concept goes beyond traditional electronic enterprise systems that are typically owne...
Ensuring security for e-business information exchange is essential as it entails exchange of sensiti...
This paper presents results from the analysis of methodologies and standards aiming to meet the requ...
During the electronic business, the clients and the merchants make use of the internet. Thus, we can...
E-business has become a trend setter in today’s business environment. E-business is dependent on sev...
E-commerce Security is a part of the Information Security framework and is specifically applied to t...
Security has become one of the most urgent issues for many organizations. It is an essential require...
AbstractWith the wide spread use of e-transactions in enterprises, information security risk managem...
This chapter identifies various levels of governance followed by a focus on the role of information ...
With the increasing use of the Internet and the advancement in information and communications techno...
This paper illustrates business aligned security approach as a key element of an enterprises’s ove...
In this article it presents the electronic security of the computer networks. The electronic securit...
Internet age changes the business exchange style and conveys numerous business chances to the e-comm...
Security issues and threats in the e-commerce environment are varied and can be caused intentionally...
Enterprise integration is the key enabler for transforming the collaboration among people, organizat...
The e-business concept goes beyond traditional electronic enterprise systems that are typically owne...
Ensuring security for e-business information exchange is essential as it entails exchange of sensiti...
This paper presents results from the analysis of methodologies and standards aiming to meet the requ...
During the electronic business, the clients and the merchants make use of the internet. Thus, we can...
E-business has become a trend setter in today’s business environment. E-business is dependent on sev...
E-commerce Security is a part of the Information Security framework and is specifically applied to t...
Security has become one of the most urgent issues for many organizations. It is an essential require...
AbstractWith the wide spread use of e-transactions in enterprises, information security risk managem...
This chapter identifies various levels of governance followed by a focus on the role of information ...
With the increasing use of the Internet and the advancement in information and communications techno...
This paper illustrates business aligned security approach as a key element of an enterprises’s ove...
In this article it presents the electronic security of the computer networks. The electronic securit...
Internet age changes the business exchange style and conveys numerous business chances to the e-comm...
Security issues and threats in the e-commerce environment are varied and can be caused intentionally...