Enterprise security architecture in business convergence environments

被引:11
|
作者
Kim, S [1 ]
Leem, CS
机构
[1] Yonsei Univ, Program Elect Commerce, Seoul 120749, South Korea
[2] Yonsei Univ, Dept Comp & Ind Engn, Seoul 120749, South Korea
关键词
modelling; data security; information systems; risk management;
D O I
10.1108/02635570510616111
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Purpose - To provide the strategic model of approach which helps enterprise executives to solve the managerial problems of planning, implementation and operation about information security in business convergence environments. Design/methodology/approach - A risk analysis method and baseline controls of BS7799 were used to generate security patterns of business convergence. With the analysis of existing enterprise architecture (EA) methods, the framework of the enterprise security architecture was designed. Findings - The adaptive framework, including the security patterns with quantitative factors, enterprise security architecture with 18 dimensions, and reference models in business convergence environments, is provided. Research limitations/implications - Information assets and baseline controls should be subdivided to provide more detailed risk factors and weight factors of each business convergence strategy. Case studies should be performed continuously to consolidate contents of best practices. Practical implications - With the enterprise security architecture provided in this paper, an enterprise that tries to create a value-added business model using convergence model can adapt itself to mitigate security risks and reduce potential losses. Originality/value - This paper outlined the business risks in convergence environments with risk analysis and baseline controls. It is aguably the first attempt to adapt the EA approach for enterprise executives to solve the security problems of business convergence.
引用
收藏
页码:919 / 936
页数:18
相关论文
共 50 条
  • [1] Convergence of Business Architecture, Business Process Architecture, Enterprise Architecture and Service-Oriented Architecture
    Sanz, Jorge L. C.
    Zhao, J. Leon
    [J]. 13TH IEEE INTERNATIONAL CONFERENCE ON COMMERCE AND ENTERPRISE COMPUTING (CEC 2011), 2011,
  • [2] An Enterprise Security Program and Architecture to Support Business Drivers
    Ritchot, Brian
    [J]. TECHNOLOGY INNOVATION MANAGEMENT REVIEW, 2013, : 25 - 33
  • [3] Dynamic Convergence of Business and IT Systems through Enterprise Isomorphic Architecture
    Gan Mingxin
    Lily, Sun
    [J]. 2009 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND COMPUTER SCIENCE, VOL 1, PROCEEDINGS, 2009, : 366 - +
  • [4] Dynamic Convergence of Business and IT Systems through Enterprise Isomorphic Architecture
    Kinugasa, T.
    Haji, T.
    Yoshida, K.
    Amano, H.
    Osuka, K.
    [J]. ICAR: 2009 14TH INTERNATIONAL CONFERENCE ON ADVANCED ROBOTICS, VOLS 1 AND 2, 2009, : 30 - +
  • [5] The Impact of Enterprise Security Performance on Business Performance in Industrial Convergence Environment
    Shin, Eunhee
    Yu, Harang
    Bae, Sungyun
    Chang, Hangbae
    [J]. HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2022, 12 : 1 - 13
  • [6] Architecture environments for E-business agent based on security
    Shin, HJ
    Lee, SG
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 1, 2004, 3043 : 625 - 634
  • [7] Business Security Architecture: Weaving Information Security into Your Organization's Enterprise Architecture through SABSA (R)
    Burkett, Jason S.
    [J]. INFORMATION SECURITY JOURNAL, 2012, 21 (01): : 47 - 54
  • [8] Fujitsu enterprise security architecture
    Shiozaki, Tetsuo
    Okuhara, Masayuki
    Yoshikawa, Nobuo
    [J]. FUJITSU SCIENTIFIC & TECHNICAL JOURNAL, 2007, 43 (02): : 153 - 158
  • [9] A roadmap to the enterprise security architecture
    Kim, Young-Gab
    Kang, Seung-Seok
    [J]. BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2018, 123 : 47 - 48
  • [10] From Enterprise Architecture to Business Ecosystem Architecture
    Drews, Paul
    Schirmer, Ingrid
    [J]. 2014 IEEE 18TH INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE WORKSHOPS AND DEMONSTRATIONS (EDOCW), 2014, : 13 - 22