Contents
1. Introduction………………………………………………………………………..3
2. Information Security Management in E-Commerce Organization……………….4
Current Issues & Risks Associated with Information Security Management
Efficiency in Information Security Management in E-Commerce Organization
Characteristics of Information Security Management in E-Commerce Organization
Defense Strategies Against the Information Security Management in E-Commerce Organization
3. Conclusion……………………………………………………………………….11
4. References………………………………………………………………………..12
Description
The new millennium has posed challenges for information security management which is as vital as any other aspect of business. With the increasing focus of companies on information technologies and communication technologies, have made it imperative for management to secure the data for attaining strategic advantage in business arena. With the business expansion on global front, the importance of information and communication technology has been brought to the forefront. The use of information technology, has allowed the companies to operate across the geographical boundaries, ensuring the confidentiality to the information, integrity in information and maintain availability across all major locations of its operations (Calder, A., 2005). Much important to this, is the need for responsible people, maintaining integrity among them, and principles of ethicality and trustworthiness in using the business information.
The recent survey on information security management points that there has been a shortage of adequate policies to secure the information management online. The e-commerce organizations are facing policy vacuum to effectively deal with the issues related to information security management. With increasing dependence on computers and use of information technology, the comprehensive essays tends to elaborate on the issues encountered and inefficiency in information security management. It further focuses on the management of information security system in e-commerce organizations. The essay concludes with the recovery plans which need to be implemented for information security, data management and generate greater revenue.