IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Integrated E-Enterprise Supply Chain Security Design and Implementation

Integrated E-Enterprise Supply Chain Security Design and Implementation
View Sample PDF
Author(s): Stephen C. Shih (Southern Illinois University, USA), Michael Camarata (University of Akron, USA)and H. Joseph Wen (Southeast Missouri State University, USA)
Copyright: 2007
Pages: 27
Source title: Supply Chain Management: Issues in the New Era of Collaboration and Competition
Source Author(s)/Editor(s): William Yu Chung Wang (University of South Australia, Australia), Michael S. H. Heng (Universitas 21 Global, Singapore)and Patrick Y. K. Chau (The University of Hong Kong - School of Business, Hong Kong)
DOI: 10.4018/978-1-59904-231-2.ch011

Purchase

View Integrated E-Enterprise Supply Chain Security Design and Implementation on the publisher's website for pricing and purchasing information.

Abstract

Web technology has enabled many organizations to form an e-enterprise for effective communicating, collaborating, and information sharing. To gain competitive advantages, it is necessary for e-enterprises to integrate the entire lines of business operations and critical business data with external supply chain participants over the Web, which may introduce significant security risks to the organizations’ critical assets and infrastructures. This chapter reports a case study of e-service security design and implementation at a leading U.S. company. First, the chapter reviews security concerns and challenges in front-end e-business and back-end supply chain operations. This is followed by the analysis of the company’s e-service and its security problems. The case then presents an integrated e-enterprise security methodology to guide the company for meeting its security needs. The results of this case study provides security professionals with practical steps and sustainable solutions for tackling the unique security challenges arising in an open, unbounded e-enterprise supply chain environment.

Related Content

Hamed Nozari. © 2024. 13 pages.
Maryam Rahmaty. © 2024. 13 pages.
Mahmonir Bayanati. © 2024. 13 pages.
Kamalendu Pal. © 2024. 33 pages.
Kamalendu Pal. © 2024. 35 pages.
Aminmasoud Bakhshi Movahed, Ali Bakhshi Movahed, Hamed Nozari. © 2024. 31 pages.
Esmael Najafi, Iman Atighi. © 2024. 11 pages.
Body Bottom