Skip to main content

Key Dimensions of Security

Key Dimensions
 
·         Integrity: Ability to ensure that information being displayed on a web site or transmitted/received over the Internet has not been altered in any way by an unauthorized party.
Content should be unaltered.

·         Non repudiation: Ability to ensure that e-commerce participants do deny (repudiate) online auctions.
Eg: Phishing(cloning of a website) occurs for online web portals of banks. 

·         Authenticity: Ability to identify the identity of a person or entity with whom you are dealing on the Internet.

·         Confidentiality : Ability to ensure that messages and data are available only to those authorized users to view them.

·         Privacy: Ability to control use of information a customer provides about himself/herself to a merchant.
Privacy is a very big issue online. We are continuously being tracked. We need to be vigilant.
·         Availability: Ability to ensure that the data/information is available ubiquitously that is can be accessed any time from anywhere.
 

Comments

Popular posts from this blog

Advantages and Disadvantages of EIS Advantages of EIS Easy for upper-level executives to use, extensive computer experience is not required in operations Provides timely delivery of company summary information Information that is provided is better understood Filters data for management Improves to tracking information Offers efficiency to decision makers Disadvantages of EIS System dependent Limited functionality, by design Information overload for some managers Benefits hard to quantify High implementation costs System may become slow, large, and hard to manage Need good internal processes for data management May lead to less reliable and less secure data

Inter-Organizational Value Chain

The value chain of   a company is part of over all value chain. The over all competitive advantage of an organization is not just dependent on the quality and efficiency of the company and quality of products but also upon the that of its suppliers and wholesalers and retailers it may use. The analysis of overall supply chain is called the value system. Different parts of the value chain 1.  Supplier     2.  Firm       3.   Channel 4 .   Buyer

CONCEPTUAL VIEW OF MIS

The concept is a blend of principles, theories and practices of management, information and system giving rise to a single product called MANAGEMENT INFORMATION SYSTEM . The concept of management gives high regard to the individual and his ability to use the information. MIS gives information through data analysis. While analyzing the information, it relies on many academic disciplines like management science, OR, organization behavior, psychology, etc. The foundation of MIS is the principles of management and its practices. MIS uses the concept of management control in its design and relies heavily on the fact that the decision maker is a human being and is a human processor of information. A MIS can be evolved for a specific objective it is evolved after systematic planning and design. It calls for an analysis of business, management views and policies, organization culture and the management style. The MIS,therefore relies heavily on systems theory.The systems theory offers soluti