A thorough evaluation of the compatibility of an e−business security negotiations support tool
For the benefits of e-business to be fully realized, there are numerous challenges to be overcome particularly with respect to security. Some of the most significant of these difficulties is incurred even before businesses fully enter the joint e-business interactions. A key example is the challenge...
Main Authors: | , |
---|---|
Format: | Journal article |
Published: |
International Association of Engineers
2010
|
_version_ | 1797094461554032640 |
---|---|
author | Nurse, J Sinclair, J |
author_facet | Nurse, J Sinclair, J |
author_sort | Nurse, J |
collection | OXFORD |
description | For the benefits of e-business to be fully realized, there are numerous challenges to be overcome particularly with respect to security. Some of the most significant of these difficulties is incurred even before businesses fully enter the joint e-business interactions. A key example is the challenge faced as partnering e-businesses come together initially to share, compare and negotiate on their individual security needs. In previous work, we have proposed a support tool to assist in this activity and streamline several of the difficult security negotiation tasks which arise. This paper aims to advance the research of that tool by engaging in a very detailed evaluation of its compatibility with existing security needs determination methods (commonly, risk management and assessment techniques). Compatibility forms a crucial requirement as it evidences feasibility and yields worthwhile initial feedback on the ultimate usefulness and practicality of the tool. |
first_indexed | 2024-03-07T04:14:23Z |
format | Journal article |
id | oxford-uuid:c8ec111b-9e95-485f-959a-69420801a16c |
institution | University of Oxford |
last_indexed | 2024-03-07T04:14:23Z |
publishDate | 2010 |
publisher | International Association of Engineers |
record_format | dspace |
spelling | oxford-uuid:c8ec111b-9e95-485f-959a-69420801a16c2022-03-27T06:55:25ZA thorough evaluation of the compatibility of an e−business security negotiations support toolJournal articlehttp://purl.org/coar/resource_type/c_dcae04bcuuid:c8ec111b-9e95-485f-959a-69420801a16cDepartment of Computer ScienceInternational Association of Engineers2010Nurse, JSinclair, JFor the benefits of e-business to be fully realized, there are numerous challenges to be overcome particularly with respect to security. Some of the most significant of these difficulties is incurred even before businesses fully enter the joint e-business interactions. A key example is the challenge faced as partnering e-businesses come together initially to share, compare and negotiate on their individual security needs. In previous work, we have proposed a support tool to assist in this activity and streamline several of the difficult security negotiation tasks which arise. This paper aims to advance the research of that tool by engaging in a very detailed evaluation of its compatibility with existing security needs determination methods (commonly, risk management and assessment techniques). Compatibility forms a crucial requirement as it evidences feasibility and yields worthwhile initial feedback on the ultimate usefulness and practicality of the tool. |
spellingShingle | Nurse, J Sinclair, J A thorough evaluation of the compatibility of an e−business security negotiations support tool |
title | A thorough evaluation of the compatibility of an e−business security negotiations support tool |
title_full | A thorough evaluation of the compatibility of an e−business security negotiations support tool |
title_fullStr | A thorough evaluation of the compatibility of an e−business security negotiations support tool |
title_full_unstemmed | A thorough evaluation of the compatibility of an e−business security negotiations support tool |
title_short | A thorough evaluation of the compatibility of an e−business security negotiations support tool |
title_sort | thorough evaluation of the compatibility of an e business security negotiations support tool |
work_keys_str_mv | AT nursej athoroughevaluationofthecompatibilityofanebusinesssecuritynegotiationssupporttool AT sinclairj athoroughevaluationofthecompatibilityofanebusinesssecuritynegotiationssupporttool AT nursej thoroughevaluationofthecompatibilityofanebusinesssecuritynegotiationssupporttool AT sinclairj thoroughevaluationofthecompatibilityofanebusinesssecuritynegotiationssupporttool |