774 research outputs found

    Value-driven Security Agreements in Extended Enterprises

    Get PDF
    Today organizations are highly interconnected in business networks called extended enterprises. This is mostly facilitated by outsourcing and by new economic models based on pay-as-you-go billing; all supported by IT-as-a-service. Although outsourcing has been around for some time, what is now new is the fact that organizations are increasingly outsourcing critical business processes, engaging on complex service bundles, and moving infrastructure and their management to the custody of third parties. Although this gives competitive advantage by reducing cost and increasing flexibility, it increases security risks by eroding security perimeters that used to separate insiders with security privileges from outsiders without security privileges. The classical security distinction between insiders and outsiders is supplemented with a third category of threat agents, namely external insiders, who are not subject to the internal control of an organization but yet have some access privileges to its resources that normal outsiders do not have. Protection against external insiders requires security agreements between organizations in an extended enterprise. Currently, there is no practical method that allows security officers to specify such requirements. In this paper we provide a method for modeling an extended enterprise architecture, identifying external insider roles, and for specifying security requirements that mitigate security threats posed by these roles. We illustrate our method with a realistic example

    Alter ego, state of the art on user profiling: an overview of the most relevant organisational and behavioural aspects regarding User Profiling.

    Get PDF
    This report gives an overview of the most relevant organisational and\ud behavioural aspects regarding user profiling. It discusses not only the\ud most important aims of user profiling from both an organisation’s as\ud well as a user’s perspective, it will also discuss organisational motives\ud and barriers for user profiling and the most important conditions for\ud the success of user profiling. Finally recommendations are made and\ud suggestions for further research are given

    The State of e-New Zealand

    Get PDF
    Our study is based upon publicly available sources of information. Internationally published statistics have been used to supplement New Zealand data to assess New Zealand's relative position. While international studies have provided some basis for comparison the supplementary information sourced for this study has enabled a more complete picture of New Zealand to be painted. The infrastructures we examine to make our assessment of E-New Zealand are those of Internet penetration and uptake the electronic banking backbone of the payments system and the telecommunications environment. We then use this base to explore the extent to which this infrastructural base is utilised in electronic commerce applications. While we acknowledge that it is limited by the shortage of reliable and publicly available information this analysis enables us to postulate some explanations for apparent and observed behaviours which may have led others to conclude that despite the infrastructural advantage New Zealand's application uptake is not as advanced

    Consumption Taxation in a Digital World: A Primer

    Get PDF
    The paper reviews the economic and administrative issues that arise in the taxation of electronic commerce; addresses how best to meet the criteria of an ideal tax system; and examines recent policy developments.It is argued that destination-based taxation-is presently the norm for goods taxation is technically more complex for digital products and intangible services sold over the Internet, reflecting the difficulty of determining the location of the buyer and seller.Most of the potential solutions to this problem require a great deal of administrative cooperation between national tax authorities.Case studies of several countries show that policy responses to electronic commerce have di.ered, with the European Union taking the lead on implementing a system of destination-based registration.Destination principle;international consumption taxation;electronic commerce;origin taxation;cross-border trade

    Review Of E-Commerce Issues: Consumers Perception On Security And Privacy

    Get PDF
    Web security has been a major issue of debate in the recent years. The lack of security is perceived as a major stumbling block for doing business online. Electronic cash payment systems are becoming more important than ever to facilitate online transactions and thus replacing traditional payment methods such as checks The prime objective of this paper is to determine the perception of consumers towards the security aspects of e-commerce technology. Specifically this paper examines the perception and awareness of security from the consumers standpoint especially in recent e-business processes that facilitate transfer of payment via electronic systems such as e-wallet, credit card and e-cash. The paper also examines the measures that can be taken so that the mindset of users can be changed to suit this new on-line culture

    Building trust in e-commerce

    Get PDF
    Bibliography : leaves B1-B8.This study primarily investigates the processes and capabilities which are important for building and developing trust in e-Commerce. The main area of focus of this study is on the factors and enablers which can be applied by online retailers to build trust and communicate trustworthiness to online consumers. Throughout the study these factors and enablers are commonly referred to as the 'building blocks of trust in e-Commerce'. It is argued that without trust, e-Commerce cannot reach its full potential and that the building blocks of trust in e-Commerce can be applied to build and develop trust in e-Commerce. This study further investigates consumer perceptions of e-Commerce, and the deterrents to online shopping. Special emphasis was placed on important e-Commerce issues, central to building and developing trust in e-Commerce, such as privacy, security and fulfilment. As part of the recommendations, a conceptual model for building trust In e-Commerce is presented, which maps out the online trust building process with the general building blocks of trust in e-Commerce at its core

    Top 10 technologies and their impact on CPA\u27s

    Get PDF
    https://egrove.olemiss.edu/aicpa_guides/2474/thumbnail.jp

    Development of an M-commerce security framework

    Get PDF
    Research shows how M-Commerce has managed to find its way to previously inaccessible parts of the world as a major Information and Communication Technologies (ICT) tool for development due to widespread introduction of mobile phones in remote areas. M-Commerce has offered valuable advantages: anytime, anywhere, more personal, more location-aware, more context-aware, more age aware, always online and instant connectivity. But this is not without its problems, of which security is high on the list. The security issues span the whole M-Commerce spectrum, from the top to the bottom layer of the OSI network protocol stack, from machines to humans. This research proposes a threat-mitigation modular framework to help address the security issues lurking in M-Commerce systems being used by marginalised rural community members. The research commences with a literature survey carried out to establish security aspects related to M-Commerce and to determine requirements for a security framework. The framework classifies M-Commerce security threat-vulnerability-risks into four levels: human behaviour and mobile device interaction security, mobile device security, M-Commerce access channel security, wireless network access security. This is followed by a review of the supporting structures or related frameworks that the proposed framework could leverage to address security issues on M-Commerce systems as ICT4D initiatives. The proposed security framework based on the requirements discovered is then presented. As a proof-of-concept, a case study was undertaken at the Siyakhula Living Lab at Dwesa in the Eastern Cape province of South Africa in order to validate the components of the proposed framework. Following the application of the framework in a case study, it can be argued that the proposed security framework allows for secure transacting by marginalised users using M-Commerce initiatives. The security framework is therefore useful in addressing the identified security requirements of M-Commerce in ICT4D contexts

    Girişimcilik bağlamında e-ticaret ortamına dayalı kurumsal bilgi yönetimi platformu

    Get PDF
    Addressing the e-commerce environment, this study is designed to validate the feasibility of an enterprise information management platform based on cloud storage technology and system testing. Experimental results show that the platform designed in this article has approximately 195 fluctuating processes per second in the average number of transactions per second, which has a better test effect in terms of business efficiency. In addition, other performance index tests have reached the standard. These include a user authentication time of just 0.96 seconds, a material information input time of 2.54 seconds, a material information query response time of only 0.97 seconds, and a relatively fast response time. This research is expected to provide an efficient information management platform for the entire production process for the sales of the enterprise and encourage the development of business management informatics in Turkey.E-ticaret ortamına değinen bu çalışma, bulut depolama teknolojisine ve sistem testlerine dayalı bir kurumsal bilgi yönetimi platformunun fizibilitesini doğrulamak için tasarlanmıştır. Deneysel sonuçlar, bu makalede tasarlanan platformun saniyede ortalama işlem sayısında saniyede yaklaşık 195 dalgalı işleme sahip olduğunu ve bunun iş verimliliği açısından daha iyi bir test etkisine sahip olduğunu göstermektedir. Buna ek olarak, diğer performans endeksi testleri standarda ulaşmıştır. Bunlar arasında yalnızca 0,96 saniyelik bir kullanıcı kimlik doğrulama süresi, 2,54 saniyelik bir malzeme bilgi giriş süresi, yalnızca 0,97 saniyelik bir malzeme bilgi sorgusu yanıt süresi ve nispeten hızlı bir yanıt süresi bulunur. Araştırma Türkiye ile sınırlıdır. Bu araştırmanın işletmenin satışları için tüm üretim süreci için verimli bir bilgi yönetim platformu sağlaması ve Türkiye'de işletme yönetimi bilişiminin geliştirilmesini teşvik etmesi beklenmektedir. Çalışma, bulut depolama teknolojisi konusu ile sınırlıdır ve sistem testine dayanmaktadır

    eLoanDocs: Riding the Tide of Technology Without Wiping Out

    Get PDF
    This teaching case describes how eLoanDocs, a professional services business serving the mortgage loan industry, recognized the benefits of emerging technologies to reduce costs and improve process throughput to establish a competitive position in its in marketplace. The case documents how the company adapted to changes in the technological landscape over the past two decades and presents the reader with the decisions the company now faces with the evolution of “cloud computing”. The case gives students a fundamental understanding of the concept of cloud computing and presents the advantages and risks of this IT infrastructure
    corecore