Skip to main content

Driving safely on the information superhighway

Buy Article:

$47.97 plus tax (Refund Policy)

Information technology (IT) has become part and parcel of the business world today. In fact, it will continue to become an even larger factor in the future. Organizations will interlink their IT systems as a result of linking to the Internet, electronic data interchange (EDI), electronic funds transfer at point of sale (EFTPoS), etc. All of this might hold an information security risk for an organization. Organizations attempt to secure their own IT environment, but they have little control over the IT systems they link with. If those external IT environments are insecure, they might pose a threat to the IT systems in the host environment. Organizations would like to obtain some proof that the IT systems of their business partners are secure before they link with their individual systems. Such a proof can only be given through some security evaluation and certification process. Shows and explains the need for such a process.
No Reference information available - sign in for access.
No Citation information available - sign in for access.
No Supplementary Data.
No Data/Media
No Metrics

Keywords: Data Security; Edi; Eftpos; Internal Control; Internet; It; Security

Document Type: Research Article

Publication date: 1997-01-01

  • Access Key
  • Free content
  • Partial Free content
  • New content
  • Open access content
  • Partial Open access content
  • Subscribed content
  • Partial Subscribed content
  • Free trial content
Cookie Policy
Cookie Policy
Ingenta Connect website makes use of cookies so as to keep track of data that you have filled in. I am Happy with this Find out more