Abstract
Electronic commerce is slowly changing the way companies do business; however, firms are becoming increasingly apprehensive about doing business electronically because of security concerns (Bhimani, 1996). Horror stories about hackers, thefts of sensitive financial data, and insecure systems have built psychological barriers that many businesses and executives have yet to overcome (Ahuja, 1997).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Addonizio, M. L. and Balaguer, N. S.: 1992, Chrysler Corporation: JIT and EDI (A), HBS Case No. 9–191–146, Harvard Business School.
Ahuja, V.: 1997, Secure Commerce on the Internet, AP Professional, Boston.
Applegate, L. M., et al.: 1996, Electronic commerce: Building blocks of new business opportunity, Journal of Organizational Computing and Electronic Commerce, 6(1), 1–10.
Applegate, L. M. and Gogan, J. L.: 1996, Open Market, Inc., HBS Case No. 9–195–205, Harvard Business School.
Bhimani, A.: 1996, Securing the commercial Internet, Communications of the ACM 39(6), 29–35.
Clemons, E. K. and McFarlan, F. W.: 1986, Telecom: Hook up or lose out, Harvard Business Review, 91–97.
Clemons, E. K. and Row, M.: 1988, McKesson Drug Company: A case study of Economost - A Strategic Information System, Journal of Management Information Systems, 5(1),3850.
Hopper, M. D.: 1990, Rattling SABRE - New ways to compete on information, Harvard Business Review, 118–125.
Ives, B., and Cheney, P. H.: 1987, Loose lips, Information Strategy: The Executive’s Journal 3(4), 19–24.
Laudon, K. C. and Laudon, J. L.: 1997, Essentials of Management Information Systems,Prentice-Hall, New Jersey.
Liddy, C.: 1996, Commercial security on the Internet, Internet Research: Electronic Networking Applications and Policy, 6(2/3), 75–78.
Porter, M. E. and Millar, V. E.: 1985, How information gives you competitive advantage, Harvard Business Review, 149–160.
Porter, M. E.: 1980, Competitive Strategy, Free Press, New York.
Rayport, J. F. and Sviokla, J. J.: 1995, Exploiting the virtual value chain, Harvard Business Review, 75–97.
Shaw, N. G. and Yadav, S. B.: 1997, Characteristics of system requirements for electronic commerce, Proceedings 3rd Americas Conference on Information Systems,Indianapolis.
Yadav, S. B., and Shaw, N. G.: 1997, A comprehensive framework for understanding electronic commerce, Proceedings 8`“ International Conference of the Information Resources Management Association,Vancouver, BC, Canada.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1998 Springer-Verlag London Limited
About this chapter
Cite this chapter
Shaw, N.G. (1998). Leveraging Security Policy for Competitive Business Advantage in Electronic Commerce. In: Romm, C.T., Sudweeks, F. (eds) Doing Business Electronically. Computer Supported Cooperative Work. Springer, London. https://doi.org/10.1007/978-1-4471-0591-6_5
Download citation
DOI: https://doi.org/10.1007/978-1-4471-0591-6_5
Publisher Name: Springer, London
Print ISBN: 978-3-540-76159-4
Online ISBN: 978-1-4471-0591-6
eBook Packages: Springer Book Archive