Enterprise security architecture in business convergence environments

Author:

Kim Sangkyun,Seong Leem Choon

Abstract

PurposeTo provide the strategic model of approach which helps enterprise executives to solve the managerial problems of planning, implementation and operation about information security in business convergence environments.Design/methodology/approachA risk analysis method and baseline controls of BS7799 were used to generate security patterns of business convergence. With the analysis of existing enterprise architecture (EA) methods, the framework of the enterprise security architecture was designed.FindingsThe adaptive framework, including the security patterns with quantitative factors, enterprise security architecture with 18 dimensions, and reference models in business convergence environments, is provided.Research limitations/implicationsInformation assets and baseline controls should be subdivided to provide more detailed risk factors and weight factors of each business convergence strategy. Case studies should be performed continuously to consolidate contents of best practices.Practical implicationsWith the enterprise security architecture provided in this paper, an enterprise that tries to create a value‐added business model using convergence model can adapt itself to mitigate security risks and reduce potential losses.Originality/valueThis paper outlined the business risks in convergence environments with risk analysis and baseline controls. It is aguably the first attempt to adapt the EA approach for enterprise executives to solve the security problems of business convergence.

Publisher

Emerald

Subject

Industrial and Manufacturing Engineering,Strategy and Management,Computer Science Applications,Industrial relations,Management Information Systems

Reference38 articles.

1. Abrams, C. (2001), Convergence: Understanding a Transformation Imperative, Gartner Inc., Stamford, CT.

2. Amoroso, E.G. (1994), Fundamentals of Computer Security Technology, Prentice‐Hall, Englewood Cliffs, NJ.

3. Baccarini, D., Salm, G. and Love, P.E.D. (2004), “Management of risks in information technology projects”, Industrial Management & Data Systems, Vol. 104 No. 4, pp. 286‐95.

4. Bass, L., Clements, P. and Kazman, R. (1997), Software Architecture in Practice, Addison‐Wesley, Boston, MA.

5. Bayle, A.J. (1988), “Security in open system networks: a tutorial survey”, Information Age, Vol. 10 No. 3, pp. 131‐45.

Cited by 11 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Higher Education Model for Security Literacy using Bloom’s Revised Taxonomy;Cybersecurity Pedagogy and Practice Journal;2024-04

2. Security literacy model for strategic, tactical, & operational management levels;Information Security Journal: A Global Perspective;2024-01-21

3. Economic security of agricultural enterprises in the trajectory of resource flow;Studies of Applied Economics;2021-07-20

4. Enterprise Architecture: A Literature Review;Journal of Industrial Integration and Management;2017-06

5. Interdisciplinary Approaches and Methods for Sustainable Transformation and Innovation;Sustainability;2015-04-03

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3