A thorough evaluation of the compatibility of an e−business security negotiations support tool

For the benefits of e-business to be fully realized, there are numerous challenges to be overcome particularly with respect to security. Some of the most significant of these difficulties is incurred even before businesses fully enter the joint e-business interactions. A key example is the challenge...

Full description

Bibliographic Details
Main Authors: Nurse, J, Sinclair, J
Format: Journal article
Published: International Association of Engineers 2010
_version_ 1797094461554032640
author Nurse, J
Sinclair, J
author_facet Nurse, J
Sinclair, J
author_sort Nurse, J
collection OXFORD
description For the benefits of e-business to be fully realized, there are numerous challenges to be overcome particularly with respect to security. Some of the most significant of these difficulties is incurred even before businesses fully enter the joint e-business interactions. A key example is the challenge faced as partnering e-businesses come together initially to share, compare and negotiate on their individual security needs. In previous work, we have proposed a support tool to assist in this activity and streamline several of the difficult security negotiation tasks which arise. This paper aims to advance the research of that tool by engaging in a very detailed evaluation of its compatibility with existing security needs determination methods (commonly, risk management and assessment techniques). Compatibility forms a crucial requirement as it evidences feasibility and yields worthwhile initial feedback on the ultimate usefulness and practicality of the tool.
first_indexed 2024-03-07T04:14:23Z
format Journal article
id oxford-uuid:c8ec111b-9e95-485f-959a-69420801a16c
institution University of Oxford
last_indexed 2024-03-07T04:14:23Z
publishDate 2010
publisher International Association of Engineers
record_format dspace
spelling oxford-uuid:c8ec111b-9e95-485f-959a-69420801a16c2022-03-27T06:55:25ZA thorough evaluation of the compatibility of an e−business security negotiations support toolJournal articlehttp://purl.org/coar/resource_type/c_dcae04bcuuid:c8ec111b-9e95-485f-959a-69420801a16cDepartment of Computer ScienceInternational Association of Engineers2010Nurse, JSinclair, JFor the benefits of e-business to be fully realized, there are numerous challenges to be overcome particularly with respect to security. Some of the most significant of these difficulties is incurred even before businesses fully enter the joint e-business interactions. A key example is the challenge faced as partnering e-businesses come together initially to share, compare and negotiate on their individual security needs. In previous work, we have proposed a support tool to assist in this activity and streamline several of the difficult security negotiation tasks which arise. This paper aims to advance the research of that tool by engaging in a very detailed evaluation of its compatibility with existing security needs determination methods (commonly, risk management and assessment techniques). Compatibility forms a crucial requirement as it evidences feasibility and yields worthwhile initial feedback on the ultimate usefulness and practicality of the tool.
spellingShingle Nurse, J
Sinclair, J
A thorough evaluation of the compatibility of an e−business security negotiations support tool
title A thorough evaluation of the compatibility of an e−business security negotiations support tool
title_full A thorough evaluation of the compatibility of an e−business security negotiations support tool
title_fullStr A thorough evaluation of the compatibility of an e−business security negotiations support tool
title_full_unstemmed A thorough evaluation of the compatibility of an e−business security negotiations support tool
title_short A thorough evaluation of the compatibility of an e−business security negotiations support tool
title_sort thorough evaluation of the compatibility of an e business security negotiations support tool
work_keys_str_mv AT nursej athoroughevaluationofthecompatibilityofanebusinesssecuritynegotiationssupporttool
AT sinclairj athoroughevaluationofthecompatibilityofanebusinesssecuritynegotiationssupporttool
AT nursej thoroughevaluationofthecompatibilityofanebusinesssecuritynegotiationssupporttool
AT sinclairj thoroughevaluationofthecompatibilityofanebusinesssecuritynegotiationssupporttool