Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

erp II System Vulnerabilities and Threats: An exploratory Study

erp II System Vulnerabilities and Threats: An exploratory Study
View Free PDF
Author(s): Richard S. Swart (Utah State University, USA), Bryan A. Marshall (Georgia College and State University, USA), David Olsen (Utah State University, USA)and Robert Erbacher (Utah State University, USA)
Copyright: 2007
Pages: 4
Source title: Managing Worldwide Operations and Communications with Information Technology
Source Editor(s): Mehdi Khosrow-Pour, D.B.A. (Information Resources Management Association, USA)
DOI: 10.4018/978-1-59904-929-8.ch209
ISBN13: 9781599049298
EISBN13: 9781466665378


Enterprise Resource Planning II (ERP II) systems integrate external entities into an organization’s ERP system, primarily through integrating supply chain partners. This integration is facilitated through web services, a loosely coupled, platform independent way of linking applications within different organizations. Though many web services security standards exist, many organizations fail to implement these standards completely, therefore leaving the company vulnerable to security threats. This research study proposes a planning model for ERP II security. Some best practices related to managing and securing an ERP II system are gathered from extensive interviews with industry experts and government officials.

Body Bottom