Security aspects of e-business models in a network environment
Keywords:
information technology, digital economy, e-business, digital information, business models, systems of protectionAbstract
The high degree of technological change which characterizes the modern economy and the intensive use of information and communication technologies have led to significant changes in the business environment. They have provided the conditions for the creation of an electronic business platform that enables better positioning of business systems in the global market, competitive advantage, higher profits and providing customer service in a more efficient manner. New business models that are created in the network environment become open and easily accessible to customers and service users but also to potential attackers that violate the integrity of the systems on the network. In such conditions, the construction of adequate protection systems in the form of information systems security are becoming an important part of managing business models in a network environment.
References
Đorđević G. (2007) Informaciona sigurnost – strategija zaštite senzitivnih podataka u svetu promenljivih rizika«, VII Međunarodna konferencija o elektronskoj trgovini i elektronskom poslovanju, E-trgovina, 18. – 20. april 2007, Palić, u zborniku radova - elektronsko izdanje
Đorđević G. (2007) Sistemi informacione sigurnosti u poslovnim modelima mrežne ekonomije, neobjavljena doktorska disertacija, Fakultet za trgovinu i bankarstvo, Beograd..
IBM (2005) »Introduction to Business Security Patterns«, White Paper.
Laudon C.K., Traver G.C. (2001) E-Commerce: business, technology, society, Addison-Wesley.
NIST (2012) »An Introduction to Computer Security: The NIST Handbook«, Special Publication 800-12, jul 2002.
Oltsik J. (2006) »The Time Has Come for Information-Centric Security« Enterprise Strategy Group, White Paper, april 2006.
Organisation for Economic Co-operation and Development (1992) »Guidelines for the Security of Information Systems«, Paris
Symantec (2014) »Internet Security Threat Report»
The Ponemon Institute (2013) »Cost of Cyber Crime Study: Global Report«, October 2013.
UNCTAD (2005) »Information Economy Report«, New York and Geneva.
Whitmore J.J. (2001) »A Metod for Designing Secure Solutions«, IBM.
Downloads
Published
Issue
Section
License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.