E-Business Security: Methodological Considerations

نویسندگان

  • Jawed Siddiqi
  • Babak Akhgar
  • Mohammad Hjouj Btoush
چکیده

A great deal of research works in the field information systems security has been based on a positivist paradigm. Applying the reductionism concept of the positivist paradigm for information security means missing the bigger picture and thus, the lack of holism which could be one of the reasons why security is still overlooked, comes as an afterthought or perceived from a purely technical dimension. We need to reshape our thinking and attitudes towards security especially in a complex and dynamic environment such as eBusiness to develop a holistic understanding of e-Business security in relation to its context as well as considering all the stakeholders in the problem area. In this paper we argue the suitability and need for more inductive interpretive approach and qualitative research method to investigate e-Business security. Our discussion is based on a holistic framework of enquiry, nature of the research problem, the underling theoretical lens and the complexity of e-Business environment. At the end we present a research strategy for developing a holistic framework for understanding of e-Business security problems in the context of developing countries based on an interdisciplinary inquiry which considers their needs and requirements. Keywords—e-Business Security, Complexity, Methodological considerations, interpretive qualitative research and Case study method.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Securing Collaborative Business Processes: A Methodology for Security Management in Service-Based Infrastructure

In order to secure collaborative business processes, we present a methodological approach that early integrates security and risk management throughout the design process of service-oriented architectures. We develop our methodology based on two complementary axes: the first being the business needs while the second, is ensuring a consistent security between partners at the runtime. The informa...

متن کامل

Customer Confidence and Security

With the size E-Commerce Market is enlarging, e-Business more and more critical for bringing the Enterprise to customer. This kind of E-Channel is very new and unknown way of doing business; it makes the foundation of “Trust” even more difficult and critical because the "Trust" affects lots of essentials to online transactions, such as privacy and security. From service provider point of view, ...

متن کامل

Diffusion of Business-to-Government IT Innovations: The Case of e-Customs

.................................................................................................................... ix Sommario .................................................................................................................. xi 1. Introduction ..................................................................................................... 1 1.1. Motivation .............

متن کامل

In Their Own Words? Methodological Considerations in the Analysis of Terrorist Autobiographies

Despite the growth of terrorism literature in the aftermath of the 9/11 attacks, there remain several methodological challenges to studying certain aspects of terrorism. This is perhaps most evident in attempts to uncover the attitudes, motivations, and intentions of individuals engaged in violent extremism and how they are sometimes expressed in problematic behavior. Such challenges invariably...

متن کامل

Trade and National Security: A Test for Best-Known Hypothesis

National security depends on soft power, the ability of a country to generate and use its economic power and to project its national values. It also depends on long-term factors that contribute to economic growth and increase the total resources base available not only for defense but to provide economic security in the form of income and business opportunities for individuals. The economic iss...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009