Site MapHelpFeedbackChapter Overview
Chapter Overview
(See related pages)

There is no question that the use of information technology in business presents major security challenges, poses serious ethical questions, and affects society in significant ways. Therefore, in this section we will explore the threats to businesses and individuals posed by many types of computer crime and unethical behavior. In Section II, we will examine a variety of methods that companies use to manage the security and integrity of their business systems. Now let’s look at a real world example.

As we saw in Section I, there are many significant threats to the security of e-business and e-commerce systems. That’s why this section is dedicated to exploring the methods that companies can use to manage their security. Business managers and professionals alike are responsible for the security, quality, and performance of the business information systems in their business units. Like any other vital business assets, hardware, software, networks, and data resources need to be protected by a variety of security measures to ensure their quality and beneficial use. That’s the business value of security management.








O'BrienOnline Learning Center

Home > Chapter 11 > Chapter Overview