STUDY ON COMPANY SECURITY POLICIES FROM DIGITAL MEDIA

The Internet development has brought both new opportunities and risks for either retailers or consumers. For example, electronic commerce is much faster and less expensive, but this openness makes it difficult to secure. People are aware of the fact that online businesses collecting, process and d...

Full description

Bibliographic Details
Main Author: CRISTINA-MARIA RĂDULESCU
Format: Article
Language:English
Published: Academica Brâncuşi 2015-12-01
Series:Analele Universităţii Constantin Brâncuşi din Târgu Jiu : Seria Economie
Subjects:
Online Access:http://www.utgjiu.ro/revista/ec/pdf/2015-Special%20ECOTREND/48_Radulescu.pdf
id doaj-99984642ebfe45c3a0be4b89b0e43dee
record_format Article
spelling doaj-99984642ebfe45c3a0be4b89b0e43dee2020-11-24T22:40:06ZengAcademica BrâncuşiAnalele Universităţii Constantin Brâncuşi din Târgu Jiu : Seria Economie 1844-70071844-70072015-12-011Special Issue ECO-TREND 2015291 296STUDY ON COMPANY SECURITY POLICIES FROM DIGITAL MEDIACRISTINA-MARIA RĂDULESCU0BABES-BOLYAI UNIVERSITY, FACULTY OF ECONOMICS AND BUSINESS ADMINISTRATIONThe Internet development has brought both new opportunities and risks for either retailers or consumers. For example, electronic commerce is much faster and less expensive, but this openness makes it difficult to secure. People are aware of the fact that online businesses collecting, process and distribute enormous amounts of personal data and therefore, are concerned about their unauthorized use or their use in other purposes than intended by third parties in order to gain unauthorized access to them. There are more examples of cyber criminal activities, such as: hacking, software piracy, passwords attack, service prohibition attacks, scamming, etc. Such fears led to the editing of protection policies meant to secure personal data and to develop some mechanisms to ensure the reliability and confidentiality of electronic information. Security measures include access control devices, installation of firewalls and intrusion detection devices, of some security procedures to identify and authenticate authorized users of network systems. Such mechanisms constitute the core of this study. We will also analyze security and confidentiality policy of personal data of Google Inc. http://www.utgjiu.ro/revista/ec/pdf/2015-Special%20ECOTREND/48_Radulescu.pdfdigital economysecurity policiestrustconfidentialitysecurity mechanismscookiesencryption.
collection DOAJ
language English
format Article
sources DOAJ
author CRISTINA-MARIA RĂDULESCU
spellingShingle CRISTINA-MARIA RĂDULESCU
STUDY ON COMPANY SECURITY POLICIES FROM DIGITAL MEDIA
Analele Universităţii Constantin Brâncuşi din Târgu Jiu : Seria Economie
digital economy
security policies
trust
confidentiality
security mechanisms
cookies
encryption.
author_facet CRISTINA-MARIA RĂDULESCU
author_sort CRISTINA-MARIA RĂDULESCU
title STUDY ON COMPANY SECURITY POLICIES FROM DIGITAL MEDIA
title_short STUDY ON COMPANY SECURITY POLICIES FROM DIGITAL MEDIA
title_full STUDY ON COMPANY SECURITY POLICIES FROM DIGITAL MEDIA
title_fullStr STUDY ON COMPANY SECURITY POLICIES FROM DIGITAL MEDIA
title_full_unstemmed STUDY ON COMPANY SECURITY POLICIES FROM DIGITAL MEDIA
title_sort study on company security policies from digital media
publisher Academica Brâncuşi
series Analele Universităţii Constantin Brâncuşi din Târgu Jiu : Seria Economie
issn 1844-7007
1844-7007
publishDate 2015-12-01
description The Internet development has brought both new opportunities and risks for either retailers or consumers. For example, electronic commerce is much faster and less expensive, but this openness makes it difficult to secure. People are aware of the fact that online businesses collecting, process and distribute enormous amounts of personal data and therefore, are concerned about their unauthorized use or their use in other purposes than intended by third parties in order to gain unauthorized access to them. There are more examples of cyber criminal activities, such as: hacking, software piracy, passwords attack, service prohibition attacks, scamming, etc. Such fears led to the editing of protection policies meant to secure personal data and to develop some mechanisms to ensure the reliability and confidentiality of electronic information. Security measures include access control devices, installation of firewalls and intrusion detection devices, of some security procedures to identify and authenticate authorized users of network systems. Such mechanisms constitute the core of this study. We will also analyze security and confidentiality policy of personal data of Google Inc.
topic digital economy
security policies
trust
confidentiality
security mechanisms
cookies
encryption.
url http://www.utgjiu.ro/revista/ec/pdf/2015-Special%20ECOTREND/48_Radulescu.pdf
work_keys_str_mv AT cristinamariaradulescu studyoncompanysecuritypoliciesfromdigitalmedia
_version_ 1725705906095652864