Evolution entropy risk assessment of ERP information security based on the business process
ERP internal security holes often bind with business process closely,make the value of information assets has dynamic properties and difficult to determined,so such security will not be prompt capture and evaluation.Compored the difference of ERP system and other information system in the informatio...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2012-09-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2012.z1.027/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539884911689728 |
---|---|
author | Biao SONG Jian-ming ZHU |
author_facet | Biao SONG Jian-ming ZHU |
author_sort | Biao SONG |
collection | DOAJ |
description | ERP internal security holes often bind with business process closely,make the value of information assets has dynamic properties and difficult to determined,so such security will not be prompt capture and evaluation.Compored the difference of ERP system and other information system in the information security,the risk assessment model which adapt to the characteristics of ERP system was proposed,and gave a new idea for the ERP system information safety risk assessment. |
format | Article |
id | doaj-art-dd4ec9ff98184060965496d4270762a4 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2012-09-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-dd4ec9ff98184060965496d4270762a42025-01-14T06:33:55ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2012-09-013321021559667698Evolution entropy risk assessment of ERP information security based on the business processBiao SONGJian-ming ZHUERP internal security holes often bind with business process closely,make the value of information assets has dynamic properties and difficult to determined,so such security will not be prompt capture and evaluation.Compored the difference of ERP system and other information system in the information security,the risk assessment model which adapt to the characteristics of ERP system was proposed,and gave a new idea for the ERP system information safety risk assessment.http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2012.z1.027/business processERPinformation securityentropyrisk assessment |
spellingShingle | Biao SONG Jian-ming ZHU Evolution entropy risk assessment of ERP information security based on the business process Tongxin xuebao business process ERP information security entropy risk assessment |
title | Evolution entropy risk assessment of ERP information security based on the business process |
title_full | Evolution entropy risk assessment of ERP information security based on the business process |
title_fullStr | Evolution entropy risk assessment of ERP information security based on the business process |
title_full_unstemmed | Evolution entropy risk assessment of ERP information security based on the business process |
title_short | Evolution entropy risk assessment of ERP information security based on the business process |
title_sort | evolution entropy risk assessment of erp information security based on the business process |
topic | business process ERP information security entropy risk assessment |
url | http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2012.z1.027/ |
work_keys_str_mv | AT biaosong evolutionentropyriskassessmentoferpinformationsecuritybasedonthebusinessprocess AT jianmingzhu evolutionentropyriskassessmentoferpinformationsecuritybasedonthebusinessprocess |