<div class="csl-bib-body">
<div class="csl-entry">Wohlgemuth, S., Sackmann, S., Sonehara, N., & Tjoa, A. M. (2014). Security and privacy in business networking. <i>Electronic Markets</i>, <i>24</i>(2), 81–88. https://doi.org/10.1007/s12525-014-0158-6</div>
</div>
-
dc.identifier.issn
1019-6781
-
dc.identifier.uri
http://hdl.handle.net/20.500.12708/156589
-
dc.description.abstract
Business networking relies on application-specific quantity and quality of information in order to support social infrastructures in, e.g., energy allocation coordinated by smart grids, healthcare services with electronic health records, traffic management with personal sensors, RFID in retail and logistics, or integration of individuals' social network information into good, services, and rescue operations. Due to the increasing reliance of networking applications on sharing ICT services, dependencies threaten privacy, security, and reliability of information and, thus, innovative business applications in smart societies. Resilience is becoming a new security approach, since it takes dependencies into account and aims at achieving equilibriums in case of opposite requirements. This special issue on 'Security and Privacy in Business Networking' contributes to the journal 'Electronic Markets' by introducing a different view on achieving acceptable secure business networking applications in spite of threats due to covert channels. This view is on adapting resilience to enforcement of IT security in business networking applications. Our analysis shows that privacy is an evidence to measure and improve trustworthy relationships and reliable interactions between participants of business processes and their IT systems. The articles of this special issue, which have been accepted after a double-blind peer review, contribute to this view on interdisciplinary security engineering in regard to the stages of security and privacy requirements analysis, enforcement of resulting security requirements for an information exchange, testing with a privacy-preserving detection of policy violations, and knowledge management for the purpose of keeping business processes resilient.
en
dc.language.iso
en
-
dc.publisher
SPRINGER HEIDELBERG
-
dc.relation.ispartof
Electronic Markets
-
dc.subject
Computer Science Applications
-
dc.subject
Marketing
-
dc.subject
Economics and Econometrics
-
dc.subject
Business and International Management
-
dc.subject
Management of Technology and Innovation
-
dc.title
Security and privacy in business networking
en
dc.type
Artikel
de
dc.type
Article
en
dc.description.startpage
81
-
dc.description.endpage
88
-
dc.type.category
Editorial
-
tuw.container.volume
24
-
tuw.container.issue
2
-
tuw.journal.peerreviewed
true
-
tuw.peerreviewed
false
-
tuw.researchTopic.id
I6
-
tuw.researchTopic.name
Business Informatics
-
tuw.researchTopic.value
100
-
dcterms.isPartOf.title
Electronic Markets
-
tuw.publication.orgunit
E194-01 - Forschungsbereich Software Engineering
-
tuw.publisher.doi
10.1007/s12525-014-0158-6
-
dc.identifier.eissn
1422-8890
-
dc.description.numberOfPages
8
-
tuw.author.orcid
0000-0002-8295-9252
-
wb.sci
true
-
wb.sciencebranch
Informatik
-
wb.sciencebranch.oefos
1020
-
item.languageiso639-1
en
-
item.openairetype
editorial
-
item.grantfulltext
restricted
-
item.fulltext
no Fulltext
-
item.cerifentitytype
Publications
-
item.openairecristype
http://purl.org/coar/resource_type/c_b239
-
crisitem.author.dept
E194-04 - Forschungsbereich Data Science
-
crisitem.author.orcid
0000-0002-8295-9252
-
crisitem.author.parentorg
E194 - Institut für Information Systems Engineering