A thorough evaluation of the compatibility of an e-business security negotiations support tool

[thumbnail of IJCS_37_4_07.pdf] PDF
IJCS_37_4_07.pdf - Published Version
Embargoed item. Restricted access to Repository staff only - Requires a PDF viewer.

Download (812kB)

Request Changes to record.

Abstract

For the benefits of e-business to be fully realized, there are numerous challenges to be overcome particularly with respect to security. Some of the most significant of these difficulties is incurred even before businesses fully enter the joint e-business interactions. A key example is the challenge faced as partnering e-businesses come together initially to share, compare and negotiate on their individual security needs. In previous work, we have proposed a support tool to assist in this activity and streamline several of the difficult security negotiation tasks which arise. This paper aims to advance the research of that tool by engaging in a very detailed evaluation of its compatibility with existing security needs determination methods (commonly, risk management and assessment techniques). Compatibility forms a crucial requirement as it evidences feasibility and yields worthwhile initial feedback on the ultimate usefulness and practicality of the tool.

Item Type: Journal Article
Divisions: Faculty of Science, Engineering and Medicine > Science > Computer Science
Journal or Publication Title: International Journal of Computer Science
Publisher: Newswood Ltd.
ISSN: 1819-656X
Official Date: 23 November 2010
Dates:
Date
Event
23 November 2010
Published
Volume: Volume 37
Number: Number 4
Page Range: pp. 376-387
Status: Peer Reviewed
Publication Status: Published
Access rights to Published version: Open Access (Creative Commons open licence)
Date of first compliant deposit: 26 December 2015
Related URLs:
URI: https://wrap.warwick.ac.uk/59712/

Export / Share Citation


Request changes or add full text files to a record

Repository staff actions (login required)

View Item View Item