Skip to main content

Leveraging Security Policy for Competitive Business Advantage in Electronic Commerce

  • Chapter
Doing Business Electronically

Part of the book series: Computer Supported Cooperative Work ((CSCW))

  • 82 Accesses

Abstract

Electronic commerce is slowly changing the way companies do business; however, firms are becoming increasingly apprehensive about doing business electronically because of security concerns (Bhimani, 1996). Horror stories about hackers, thefts of sensitive financial data, and insecure systems have built psychological barriers that many businesses and executives have yet to overcome (Ahuja, 1997).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Addonizio, M. L. and Balaguer, N. S.: 1992, Chrysler Corporation: JIT and EDI (A), HBS Case No. 9–191–146, Harvard Business School.

    Google Scholar 

  • Ahuja, V.: 1997, Secure Commerce on the Internet, AP Professional, Boston.

    Google Scholar 

  • Applegate, L. M., et al.: 1996, Electronic commerce: Building blocks of new business opportunity, Journal of Organizational Computing and Electronic Commerce, 6(1), 1–10.

    Article  Google Scholar 

  • Applegate, L. M. and Gogan, J. L.: 1996, Open Market, Inc., HBS Case No. 9–195–205, Harvard Business School.

    Google Scholar 

  • Bhimani, A.: 1996, Securing the commercial Internet, Communications of the ACM 39(6), 29–35.

    Article  Google Scholar 

  • Clemons, E. K. and McFarlan, F. W.: 1986, Telecom: Hook up or lose out, Harvard Business Review, 91–97.

    Google Scholar 

  • Clemons, E. K. and Row, M.: 1988, McKesson Drug Company: A case study of Economost - A Strategic Information System, Journal of Management Information Systems, 5(1),3850.

    Google Scholar 

  • Hopper, M. D.: 1990, Rattling SABRE - New ways to compete on information, Harvard Business Review, 118–125.

    Google Scholar 

  • Ives, B., and Cheney, P. H.: 1987, Loose lips, Information Strategy: The Executive’s Journal 3(4), 19–24.

    Google Scholar 

  • Laudon, K. C. and Laudon, J. L.: 1997, Essentials of Management Information Systems,Prentice-Hall, New Jersey.

    Google Scholar 

  • Liddy, C.: 1996, Commercial security on the Internet, Internet Research: Electronic Networking Applications and Policy, 6(2/3), 75–78.

    Article  Google Scholar 

  • Porter, M. E. and Millar, V. E.: 1985, How information gives you competitive advantage, Harvard Business Review, 149–160.

    Google Scholar 

  • Porter, M. E.: 1980, Competitive Strategy, Free Press, New York.

    Google Scholar 

  • Rayport, J. F. and Sviokla, J. J.: 1995, Exploiting the virtual value chain, Harvard Business Review, 75–97.

    Google Scholar 

  • Shaw, N. G. and Yadav, S. B.: 1997, Characteristics of system requirements for electronic commerce, Proceedings 3rd Americas Conference on Information Systems,Indianapolis.

    Google Scholar 

  • Yadav, S. B., and Shaw, N. G.: 1997, A comprehensive framework for understanding electronic commerce, Proceedings 8`“ International Conference of the Information Resources Management Association,Vancouver, BC, Canada.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag London Limited

About this chapter

Cite this chapter

Shaw, N.G. (1998). Leveraging Security Policy for Competitive Business Advantage in Electronic Commerce. In: Romm, C.T., Sudweeks, F. (eds) Doing Business Electronically. Computer Supported Cooperative Work. Springer, London. https://doi.org/10.1007/978-1-4471-0591-6_5

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-0591-6_5

  • Publisher Name: Springer, London

  • Print ISBN: 978-3-540-76159-4

  • Online ISBN: 978-1-4471-0591-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics