There is no question that the use of information technology in business presents
major security challenges, poses serious ethical questions, and affects society in
significant ways. Therefore, in this section we will explore the threats to businesses
and individuals posed by many types of computer crime and unethical behavior. In
Section II, we will examine a variety of methods that companies use to manage the
security and integrity of their business systems. Now let’s look at a real world example. As we saw in Section I, there are many significant threats to the security of
e-business and e-commerce systems. That’s why this section is dedicated to exploring
the methods that companies can use to manage their security. Business managers
and professionals alike are responsible for the security, quality, and performance of
the business information systems in their business units. Like any other vital business
assets, hardware, software, networks, and data resources need to be protected
by a variety of security measures to ensure their quality and beneficial use. That’s
the business value of security management. |