2012 45th Hawaii International Conference on System Sciences 2012
DOI: 10.1109/hicss.2012.148
|View full text |Cite
|
Sign up to set email alerts
|

Challenges in Cross-Organizational Security Management

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 14 publications
(9 citation statements)
references
References 30 publications
0
9
0
Order By: Relevance
“…Another limitation related to the generalizability of the findings results from the use of one specific scenarios provided by the industry partners. Insight gained through the interviews as well as related literature (Thalmann et al, 2012;Takabi et al, 2010) made us confident that the selected scenario is not unusual in terms of the challenges faced.…”
Section: Discussionmentioning
confidence: 98%
See 2 more Smart Citations
“…Another limitation related to the generalizability of the findings results from the use of one specific scenarios provided by the industry partners. Insight gained through the interviews as well as related literature (Thalmann et al, 2012;Takabi et al, 2010) made us confident that the selected scenario is not unusual in terms of the challenges faced.…”
Section: Discussionmentioning
confidence: 98%
“…Our research also indicates that satisfying the information needs of auditors is more challenging the greater the number of requirements and the wider the distribution of the IT landscape. Software support is considered particularly important in such situations (Thalmann et al, 2012). Furthermore, we found that software used by service providers holds a considerable portion of the information needed.…”
Section: Accessing the Information Held By Service Providersmentioning
confidence: 88%
See 1 more Smart Citation
“…If a service provider outsources a service to a third party where functionality is not transparent, users must be able to inspect the whole process [12]. Security standards (C1) and governing bodies are part of service level agreements (SLA) (I4) and legal aspects, respectively which have not been taken into practices for cloud computing [32,33]. SLA defines the relationship among parties (provider-recipient) and is extremely important for both parties [9].…”
Section: C5 Datamentioning
confidence: 99%
“…However, the increasingly widespread distribution of business processes also creates new challenges such as [10] cloud auditing, management of service heterogeneity, coordination of involved parties, management of client-vendor relationships, localizing and migrating data, and coping with a significant lack of security awareness [11], [12]. One of most evident challenges is distributed process tracing and validation which directly affects cross-organizational security management [13], [14], [15]. To address these challenges, several process-aware information systems have been introduced that support the automated enactment and execution of business processes and have been applied to different business process management tasks [16].…”
Section: Introductionmentioning
confidence: 99%