Showing 6,481 - 6,490 of 6,512
The security of organizational databases has received considerable attention in the literature in recent years. This can be attributed to a simultaneous increase in the amount of data being stored in databases, the analysis of such data, and the desire to protect confidential data. Data...
Persistent link: https://www.econbiz.de/10009214531
Purpose – This paper leverages the concept of business information intensity (BII) with the aim of developing a model to assess control deficiency risk (CDR) in organizations. BII measures the extent of use of IT by an organization in its products and value chain. Design/methodology/approach...
Persistent link: https://www.econbiz.de/10009350125
Countries across the globe are working towards e-government realisation. One of the issues arising with the efforts to this realisation is the assurance of secure transactions while withholding high privacy standards. Different systems require different levels of security according to the...
Persistent link: https://www.econbiz.de/10009352622
Data bases are one of the most important components in every large informatics system which stores and processes data and information. Because data bases contain all of the valuable information about a company, its clients, its financial activity, they represent one of the key elements in the...
Persistent link: https://www.econbiz.de/10009357712
Number of theories and opinions regarding globalisation is overwhelming. Economically approaching this matter it may be said that globalisation is the opposite of protectionism and economic nationalism manifesting a good relationship with the free market and neo liberalism having common...
Persistent link: https://www.econbiz.de/10008854806
Data security and privacy are important issues in the success of a financial business operation. Implementing and applying policies related to data security and privacy, therefore, has become one of the core and important activities for large organisations. The data classification process can be...
Persistent link: https://www.econbiz.de/10008592718
Users can be authenticated by three different ways: on the basis of what they know (password/pin), or what they have (smartcard etc.), or what they are (biometrics). The price and complexness of these methods increases in this order. One would think that the more complex or more expensive a...
Persistent link: https://www.econbiz.de/10010627635
Purpose - The purpose of the paper is to determine if banks that solved the Y2K problem early created value for their shareholders. Design/methodology/approach -The method of analysis is an event study. Findings - The primary finding of the analysis is that solving the Y2K problem did not create...
Persistent link: https://www.econbiz.de/10010755938
Purpose – The purpose of this paper is to forward specific policy proposals permitting greater sharing of health data across multi-level government agencies with the purpose of improving rapid identification of bioterrorist attack or disease epidemics while protecting patient privacy....
Persistent link: https://www.econbiz.de/10014796082
Purpose – The eChain type of bank accounting information system (eCBAS) is proposed to facilitate standard business document electronic exchanges between banks, central factories, and their satellite vendors in the virtual world. This framework integrates various software applications, running...
Persistent link: https://www.econbiz.de/10014823874