2008
DOI: 10.1080/17517570802242893
|View full text |Cite
|
Sign up to set email alerts
|

A security evaluation approach for information systems in telecommunication enterprises

Abstract: In recent years, information systems in telecommunication enterprises have been characterised by boundary expansion and increase of departmental-level applications. These changes increase the complexity of security evaluation and pose new challenges to enterprises' information security. Taking into account the behaviour characters of system users, we put forward a system security evaluation approach based on access paths. This approach can help evaluators and users find out potential security risks without fig… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2009
2009
2015
2015

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 20 publications
(20 reference statements)
0
6
0
Order By: Relevance
“…Between 1999 and 2002, China invested 106 million landlines, attracted 163 million new cell phone subscribers and 36 million new cable television subscribers (WEF, 2004;Raven et al, 2007) to promote e-business. According to Economist (2005), China is adding four million mobile subscribers a month and has the world's largest broadband Internet market (Qi et al, 2006;Yan, 2008). Clearly, China is building an infrastructure to sustain future growth in e-business technology and to support the needs of global supply chain.…”
Section: Introductionmentioning
confidence: 99%
“…Between 1999 and 2002, China invested 106 million landlines, attracted 163 million new cell phone subscribers and 36 million new cable television subscribers (WEF, 2004;Raven et al, 2007) to promote e-business. According to Economist (2005), China is adding four million mobile subscribers a month and has the world's largest broadband Internet market (Qi et al, 2006;Yan, 2008). Clearly, China is building an infrastructure to sustain future growth in e-business technology and to support the needs of global supply chain.…”
Section: Introductionmentioning
confidence: 99%
“…This is especially important in the context of e‐business applications. In the light of the rapid growth of e‐business, many enterprise systems have to provide more services to meet the increasing demand of e‐commerce as well as paying more close attention to network security (Behesti et al ., ; Li et al ., ; Yan, ).…”
Section: Resultsmentioning
confidence: 99%
“…Discussion from Systems Perspectives 1. Information security is the bottleneck for development and the key is achieving a unified platform Electronic administration has a high requirement for information security given its importance to the interest of the nation or related departments (Yan, 2008). As the Internet is an open network, computer viruses, hackers, information espionage and potential escalation of internet terrorism after the 9/11 attacks will all pose an appalling threat to the electronic government.…”
Section: The Misperception That the Highest Level Can Be Attained In mentioning
confidence: 99%