Proceedings. Tenth International Workshop on Database and Expert Systems Applications. DEXA 99 1999
DOI: 10.1109/dexa.1999.795288
|View full text |Cite
|
Sign up to set email alerts
|

IT-security in electronic commerce: from cost to value driver

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2005
2005
2015
2015

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 3 publications
0
3
0
Order By: Relevance
“…For example, the information security risk analysis method (ISRAM) helps to check the risks attached to the information system with the participation from the managers and staffs of the company (Karabacak and Sogukpinar, 2005). Types of the businesses included in prior research encompass the common Internet shops (Holbein and Gaugler, 1999), aviation companies (Chang, 2005), or telecommunications industry (Ekenberg, Oberoi, and Orci, 1995).…”
Section: Classification Of Information Assetsmentioning
confidence: 99%
“…For example, the information security risk analysis method (ISRAM) helps to check the risks attached to the information system with the participation from the managers and staffs of the company (Karabacak and Sogukpinar, 2005). Types of the businesses included in prior research encompass the common Internet shops (Holbein and Gaugler, 1999), aviation companies (Chang, 2005), or telecommunications industry (Ekenberg, Oberoi, and Orci, 1995).…”
Section: Classification Of Information Assetsmentioning
confidence: 99%
“…Holbein and Gaugler (1999) set the need for security in simple terms by the statement that 'EC transactions will simply not happen without implementation of adequate IT-security infrastructure'. There are mainly two basic blocks that IT security tends to provide:…”
Section: The Synthesis Of Economic Scepticmentioning
confidence: 99%
“…According to the CERT Coordination Center [1] the number of reported incidents doubled in the last two years (3780 reported incidents in the year 2004 and 8064 reported incidents in the year 2006) and especially organizations, which run business-critical applications, processing sensitive data, have to pay attention to this increase [2]. In the course of time, most IT environments have become heterogeneous due to several technology changes.…”
Section: Introductionmentioning
confidence: 99%