Skip to main content

Driving safely on the information superhighway

Buy Article:

$54.08 plus tax (Refund Policy)

Abstract:

Information technology (IT) has become part and parcel of the business world today. In fact, it will continue to become an even larger factor in the future. Organizations will interlink their IT systems as a result of linking to the Internet, electronic data interchange (EDI), electronic funds transfer at point of sale (EFTPoS), etc. All of this might hold an information security risk for an organization. Organizations attempt to secure their own IT environment, but they have little control over the IT systems they link with. If those external IT environments are insecure, they might pose a threat to the IT systems in the host environment. Organizations would like to obtain some proof that the IT systems of their business partners are secure before they link with their individual systems. Such a proof can only be given through some security evaluation and certification process. Shows and explains the need for such a process.

Keywords: Data Security; Edi; Eftpos; Internal Control; Internet; It; Security

Document Type: Research Article

DOI: http://dx.doi.org/10.1108/09685229710168006

Publication date: January 1, 1997

Access Key

Free Content
Free content
New Content
New content
Open Access Content
Open access content
Partial Open Access Content
Partial Open access content
Subscribed Content
Subscribed content
Free Trial Content
Free trial content
Cookie Policy
X
Cookie Policy
Ingenta Connect website makes use of cookies so as to keep track of data that you have filled in. I am Happy with this Find out more