ALBERT

All Library Books, journals and Electronic Records Telegrafenberg

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Collection
Publisher
Years
  • 1
    Electronic Resource
    Electronic Resource
    Bradford : Emerald
    Information management & computer security 13 (2005), S. 121-134 
    ISSN: 0968-5227
    Source: Emerald Fulltext Archive Database 1994-2005
    Topics: Computer Science
    Notes: Purpose - One of the purposes of this paper is to discuss special security concerns and new challenges at front-end e-business and back-end supply chain operations. An e-enterprise security management life cycle (eSMLC) is then proposed to ensure the unification and congruity of e-enterprise security management. Design/methodology/approach - To demonstrate the practicality of the eSMLC, a case study is presented to depict the application and implementation of the methodology at a leading US heating, ventilating, and air-conditioning manufacturing company. Findings - The case study substantiates that the eSMLC methodology can be employed as a unified mechanism to provide central, cohesive control and global visibility. It helps security professionals in the company develop practical steps and sustainable solutions for tackling the unique security challenges arising in an open, unbounded e-enterprise environment. Practical implications - Implementing eSMLC can help the security specialists focus on different critical security management jobs in a sequential but interrelated and logical manner. Through the use of eSMLC, in-depth understanding of the potential environmental risks can be properly acquired. The methodology also helps managers perform a proactive analysis of the consequences of security breaches in relation to risks. Originality/value - The proposed eSMLC methodology provides a viable foundation for building a secure and manageable computing environment using a recommended set of solutions, processes, procedures, and technologies. eSMLC methodology renders a unified, structured framework which helps develop an actual security plan and solutions and/or improve currently used security standards, practices, and configurations in response to special security requirements and long-term e-business needs.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 2
    Publication Date: 2008-04-25
    Print ISSN: 0965-3562
    Electronic ISSN: 1758-6100
    Topics: Technology
    Published by Emerald
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...