To read this content please select one of the options below:

E‐enterprise security management life cycle

Stephen C. Shih (Department of Information Management Systems, College of Applied Sciences and Arts, Southern Illinois University, Carbondale, Illinois, USA)
H. Joseph Wen (Department of Accounting and Management Information Systems, Harrison College of Business, Southeast Missouri State University, Cape Girardeau, Missouri, USA)

Information Management & Computer Security

ISSN: 0968-5227

Article publication date: 1 April 2005

3784

Abstract

Purpose

One of the purposes of this paper is to discuss special security concerns and new challenges at front‐end e‐business and back‐end supply chain operations. An e‐enterprise security management life cycle (eSMLC) is then proposed to ensure the unification and congruity of e‐enterprise security management.

Design/methodology/approach

To demonstrate the practicality of the eSMLC, a case study is presented to depict the application and implementation of the methodology at a leading US heating, ventilating, and air‐conditioning manufacturing company.

Findings

The case study substantiates that the eSMLC methodology can be employed as a unified mechanism to provide central, cohesive control and global visibility. It helps security professionals in the company develop practical steps and sustainable solutions for tackling the unique security challenges arising in an open, unbounded e‐enterprise environment.

Practical implications

Implementing eSMLC can help the security specialists focus on different critical security management jobs in a sequential but interrelated and logical manner. Through the use of eSMLC, in‐depth understanding of the potential environmental risks can be properly acquired. The methodology also helps managers perform a proactive analysis of the consequences of security breaches in relation to risks.

Originality/value

The proposed eSMLC methodology provides a viable foundation for building a secure and manageable computing environment using a recommended set of solutions, processes, procedures, and technologies. eSMLC methodology renders a unified, structured framework which helps develop an actual security plan and solutions and/or improve currently used security standards, practices, and configurations in response to special security requirements and long‐term e‐business needs.

Keywords

Citation

Shih, S.C. and Wen, H.J. (2005), "E‐enterprise security management life cycle", Information Management & Computer Security, Vol. 13 No. 2, pp. 121-134. https://doi.org/10.1108/09685220510589307

Publisher

:

Emerald Group Publishing Limited

Copyright © 2005, Emerald Group Publishing Limited

Related articles