E-security issues and policy development in an information-sharing and networked environment

被引:5
|
作者
Smith, AD [1 ]
机构
[1] Robert Morris Univ, Dept Management & Mkt, Pittsburgh, PA USA
来源
ASLIB PROCEEDINGS | 2004年 / 56卷 / 05期
关键词
electronic commerce; data security; criminals;
D O I
10.1108/00012530410560878
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid growth of e-commerce, governmental and corporate agencies are taking extra precautions when it comes to protecting information. The development of e-security as a discipline has enabled organisations to discover a wider array of similarities between attacks occurring across their security environment and develop appropriate countermeasures. To further improve the security of information, there is a need for conceptualising the interrelationships between e-security and the major elements involved in changing a company's infrastructure. Organisations should act in an ethical manner, especially when it comes to e-security and e-privacy policies, procedures, and practices. The consequential theory of utilitarianism is used and applied to a conceptual model to help explain how organisations may develop better secured information in an information-sharing and globally networked environment.
引用
收藏
页码:272 / 285
页数:14
相关论文
共 50 条
  • [1] Information-sharing and cooperation in networked collective action groups
    Harrell, Ashley
    Wolff, Tom
    [J]. PNAS NEXUS, 2023, 2 (12):
  • [2] Security Automation and Threat Information-Sharing Options
    Kampanakis, Panos
    [J]. IEEE SECURITY & PRIVACY, 2014, 12 (05) : 42 - 51
  • [3] Security screening metrics for information-sharing partnerships
    Yu, Wendy
    Collier, Zachary A.
    Thekdi, Shital
    [J]. RISK ANALYSIS, 2024, 44 (07) : 1560 - 1572
  • [4] FIRMS INFORMATION-SHARING POLICY AND STRIKE INCIDENCE
    WANG, YJ
    [J]. ECONOMICS LETTERS, 1995, 48 (01) : 73 - 76
  • [5] Information Security Strategies for Information-Sharing Firms Considering a Strategic Hacker
    Wu, Yong
    Xu, Mengyao
    Cheng, Dong
    Dai, Tao
    [J]. DECISION ANALYSIS, 2022, 19 (02) : 99 - 122
  • [6] Intranets and push technology: creating an information-sharing environment
    Knight, J
    [J]. PROGRAM-ELECTRONIC LIBRARY AND INFORMATION SYSTEMS, 2001, 35 (01) : 104 - 105
  • [7] DevClear: An Information-Sharing Platform for Rural Development
    Chisholm, Alyssa A.
    Genda, Camrynn L.
    Pailla, Siddhartha
    Martin, Jeremy L.
    Thrash, Andrew M.
    Sheehy, Kevin J.
    Louis, Garrick E.
    [J]. 2013 IEEE SYSTEMS AND INFORMATION ENGINEERING DESIGN SYMPOSIUM (SIEDS), 2013, : 201 - 206
  • [8] Multi-Agent Reinforcement Learning with Information-sharing Constrained Policy Optimization for Global Cost Environment
    Okawa, Yoshihiro
    Dan, Hayato
    Morita, Natsuki
    Ogawa, Masatoshi
    [J]. IFAC PAPERSONLINE, 2023, 56 (02): : 1558 - 1565
  • [9] ISBP: Understanding the Security Rule of Users' Information-Sharing Behaviors in Partnership
    Wu, Hongchen
    Wang, Xinjun
    [J]. PLOS ONE, 2016, 11 (03):
  • [10] An interaction analysis of frequent contributors in an on-line information-sharing environment
    Heath, A
    [J]. CANADIAN JOURNAL OF INFORMATION AND LIBRARY SCIENCE-REVUE CANADIENNE DES SCIENCES DE L INFORMATION ET DE BIBLIOTHECONOMIE, 2003, 27 (04): : 69 - 70