Information technology (IT) has become part and parcel of the business world today. In fact, it will continue to become an even larger factor in the future. Organizations will interlink their IT systems as a result of linking to the Internet, electronic data interchange (EDI), electronic funds transfer at point of sale (EFTPoS), etc. All of this might hold an information security risk for an organization. Organizations attempt to secure their own IT environment, but they have little control over the IT systems they link with. If those external IT environments are insecure, they might pose a threat to the IT systems in the host environment. Organizations would like to obtain some proof that the IT systems of their business partners are secure before they link with their individual systems. Such a proof can only be given through some security evaluation and certification process. Shows and explains the need for such a process.
Article navigation
1 March 1997
This article was originally published in
Information Management & Computer Security
Viewpoint|
March 01 1997
Driving safely on the information superhighway Available to Purchase
Rossouw von Solms
Rossouw von Solms
Professor in the Department of Information Technology, Port Elizabeth Technikon, Port Elizabeth, South Africa
Search for other works by this author on:
Publisher: Emerald Publishing
Online ISSN: 1758-5805
Print ISSN: 0968-5227
© MCB UP Limited
1997
Information Management & Computer Security (1997) 5 (1): 20–22.
Citation
von Solms R (1997), "Driving safely on the information superhighway ". Information Management & Computer Security, Vol. 5 No. 1 pp. 20–22, doi: https://doi.org/10.1108/09685229710168006
Download citation file:
181
Views
Suggested Reading
Internet‐based EDI trust and security
Information Management & Computer Security (March,1998)
EDI security: a model of EDI risks and associated controls
Information Management & Computer Security (May,1997)
Clarifying communication
Journal of Workplace Learning (August,1999)
Identifying effectiveness criteria for Internet payment systems
Internet Research (August,1998)
Legal implications of doing business on the Internet
Information Management & Computer Security (March,1997)
Related Chapters
Digital Conflicts in Production and Planning
Conflict Management in Digital Business: New Strategy and Approach
Internal Control, Corporate Life Cycle, and Firm Performance
The Political Economy of Chinese Finance
The Role of Auditing in the Management of Corporate Fraud
Ethics, Governance and Corporate Crime: Challenges and Consequences
Recommended for you
These recommendations are informed by your reading behaviors and indicated interests.
