Holistic security requirement engineering for electronic commerce
โ Scribed by Albin Zuccato
- Publisher
- Elsevier Science
- Year
- 2004
- Tongue
- English
- Weight
- 389 KB
- Volume
- 23
- Category
- Article
- ISSN
- 0167-4048
No coin nor oath required. For personal study only.
โฆ Synopsis
With the introduction of electronic commerce, business is becoming dependent on information systems in a new way. Information security is thus becoming more and more important to companies' self-protection. In contrast to previous systems, this is also directly visible to the customer. The changing situation means, however, that the requirements for security cannot be solely filled by new policies and risk analysis. This article proposes an approach called ''holistic security requirement engineering'' meant to elicit security requirements according to system-theoretic considerations. It will show that security requirements can be defined with the help of investigations in the business environment, workshops with stakeholders and risk analysis. This multidimensional approach will lead to a holistic understanding of the requirements that fit into the system development life cycles.
๐ SIMILAR VOLUMES
This article presents the experience gained over many years by Shell in the use of electronic business communications which have resulted in carefully developed strategies for maintaining control and security of sensitive electronic messages. These ideas include accreditation and certification schem
In this paper, we will describe a thread of research, which we have followed off and on at Cambridge for about three years. Our topic is the security of electronic documents, in the broad sense: how can we be sure of the authenticity of things that are published electronically? This started off as
Negotiation is of critical importance in e-commerce applications where the supply chain is dynamic and reconfiguring. In this research supply chain negotiation problems are addressed as constraint-satisfaction problems. In general each negotiation is handled in the largest scope possible to avoid th
acquire details of goods, evaluate items available and place orders by using a home terminal or an adapted television set. Two experiments examined different sorts of demand that the videotex ordering task might impose on users. The first experiment assessed the usability of four types of 'response