Evolution entropy risk assessment of ERP information security based on the business process

ERP internal security holes often bind with business process closely,make the value of information assets has dynamic properties and difficult to determined,so such security will not be prompt capture and evaluation.Compored the difference of ERP system and other information system in the informatio...

Full description

Saved in:
Bibliographic Details
Main Authors: Biao SONG, Jian-ming ZHU
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2012-09-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2012.z1.027/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539884911689728
author Biao SONG
Jian-ming ZHU
author_facet Biao SONG
Jian-ming ZHU
author_sort Biao SONG
collection DOAJ
description ERP internal security holes often bind with business process closely,make the value of information assets has dynamic properties and difficult to determined,so such security will not be prompt capture and evaluation.Compored the difference of ERP system and other information system in the information security,the risk assessment model which adapt to the characteristics of ERP system was proposed,and gave a new idea for the ERP system information safety risk assessment.
format Article
id doaj-art-dd4ec9ff98184060965496d4270762a4
institution Kabale University
issn 1000-436X
language zho
publishDate 2012-09-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-dd4ec9ff98184060965496d4270762a42025-01-14T06:33:55ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2012-09-013321021559667698Evolution entropy risk assessment of ERP information security based on the business processBiao SONGJian-ming ZHUERP internal security holes often bind with business process closely,make the value of information assets has dynamic properties and difficult to determined,so such security will not be prompt capture and evaluation.Compored the difference of ERP system and other information system in the information security,the risk assessment model which adapt to the characteristics of ERP system was proposed,and gave a new idea for the ERP system information safety risk assessment.http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2012.z1.027/business processERPinformation securityentropyrisk assessment
spellingShingle Biao SONG
Jian-ming ZHU
Evolution entropy risk assessment of ERP information security based on the business process
Tongxin xuebao
business process
ERP
information security
entropy
risk assessment
title Evolution entropy risk assessment of ERP information security based on the business process
title_full Evolution entropy risk assessment of ERP information security based on the business process
title_fullStr Evolution entropy risk assessment of ERP information security based on the business process
title_full_unstemmed Evolution entropy risk assessment of ERP information security based on the business process
title_short Evolution entropy risk assessment of ERP information security based on the business process
title_sort evolution entropy risk assessment of erp information security based on the business process
topic business process
ERP
information security
entropy
risk assessment
url http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2012.z1.027/
work_keys_str_mv AT biaosong evolutionentropyriskassessmentoferpinformationsecuritybasedonthebusinessprocess
AT jianmingzhu evolutionentropyriskassessmentoferpinformationsecuritybasedonthebusinessprocess