Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

EDI security: a model of EDI risks and associated controls

View through CrossRef
Defines the rationale for developing a model of EDl risks and associated controls. Highlights how and which EDI controls will alleviate and/or eliminate the specified EDI risks. The findings of the seven case studies identified additional EDI risks and controls, which paved the way for a new mapping of relationships between risks and controls. Offers a further insight into the perceptions of and responses to security threats faced by organizations in adopting EDI.
Title: EDI security: a model of EDI risks and associated controls
Description:
Defines the rationale for developing a model of EDl risks and associated controls.
Highlights how and which EDI controls will alleviate and/or eliminate the specified EDI risks.
The findings of the seven case studies identified additional EDI risks and controls, which paved the way for a new mapping of relationships between risks and controls.
Offers a further insight into the perceptions of and responses to security threats faced by organizations in adopting EDI.

Related Results

The Impact of EDI Controls on the Relationship Between EDI Implementation and Performance
The Impact of EDI Controls on the Relationship Between EDI Implementation and Performance
The evaluation of EDI controls is important in ensuring the high performance of an EDI system. Although penetration level is strongly associated with performance, the benefits deri...
The EDI and ECS logos and female ratios of awards in geoscience academic societies of Japan
The EDI and ECS logos and female ratios of awards in geoscience academic societies of Japan
<p>The EDI (Equality, Diversity and Inclusion) and ECS (Early Career Scientist) logos has been introduced since the EGU General Assembly 2021 held in19<sup&...
Are Cervical Ribs Indicators of Childhood Cancer? A Narrative Review
Are Cervical Ribs Indicators of Childhood Cancer? A Narrative Review
Abstract A cervical rib (CR), also known as a supernumerary or extra rib, is an additional rib that forms above the first rib, resulting from the overgrowth of the transverse proce...
Public budget security administration: development of primary mechanisms
Public budget security administration: development of primary mechanisms
The current state of public administration of budget security indicates its actual absence. With the extremely important role of budget security, both in the life of the country as...
THE SECURITY AND PRIVACY MEASURING SYSTEM FOR THE INTERNET OF THINGS DEVICES
THE SECURITY AND PRIVACY MEASURING SYSTEM FOR THE INTERNET OF THINGS DEVICES
The purpose of the article: elimination of the gap in existing need in the set of clear and objective security and privacy metrics for the IoT devices users and manufacturers and a...
Development, Distribution and Maintenance of Application Security Controls for Nuclear
Development, Distribution and Maintenance of Application Security Controls for Nuclear
The generic concept of Security Controls, as initially deployed in the information security domain, is gradually used in other business domains, including industrial security for c...
Evaluation, Security
Evaluation, Security
Abstract Security evaluation is a broad term that encompasses diverse subjects, from product and system certification to an organization's operat...

Back to Top