STUDY ON COMPANY SECURITY POLICIES FROM DIGITAL MEDIA
The Internet development has brought both new opportunities and risks for either retailers or consumers. For example, electronic commerce is much faster and less expensive, but this openness makes it difficult to secure. People are aware of the fact that online businesses collecting, process and d...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
Academica Brâncuşi
2015-12-01
|
Series: | Analele Universităţii Constantin Brâncuşi din Târgu Jiu : Seria Economie |
Subjects: | |
Online Access: | http://www.utgjiu.ro/revista/ec/pdf/2015-Special%20ECOTREND/48_Radulescu.pdf |
id |
doaj-99984642ebfe45c3a0be4b89b0e43dee |
---|---|
record_format |
Article |
spelling |
doaj-99984642ebfe45c3a0be4b89b0e43dee2020-11-24T22:40:06ZengAcademica BrâncuşiAnalele Universităţii Constantin Brâncuşi din Târgu Jiu : Seria Economie 1844-70071844-70072015-12-011Special Issue ECO-TREND 2015291 296STUDY ON COMPANY SECURITY POLICIES FROM DIGITAL MEDIACRISTINA-MARIA RĂDULESCU0BABES-BOLYAI UNIVERSITY, FACULTY OF ECONOMICS AND BUSINESS ADMINISTRATIONThe Internet development has brought both new opportunities and risks for either retailers or consumers. For example, electronic commerce is much faster and less expensive, but this openness makes it difficult to secure. People are aware of the fact that online businesses collecting, process and distribute enormous amounts of personal data and therefore, are concerned about their unauthorized use or their use in other purposes than intended by third parties in order to gain unauthorized access to them. There are more examples of cyber criminal activities, such as: hacking, software piracy, passwords attack, service prohibition attacks, scamming, etc. Such fears led to the editing of protection policies meant to secure personal data and to develop some mechanisms to ensure the reliability and confidentiality of electronic information. Security measures include access control devices, installation of firewalls and intrusion detection devices, of some security procedures to identify and authenticate authorized users of network systems. Such mechanisms constitute the core of this study. We will also analyze security and confidentiality policy of personal data of Google Inc. http://www.utgjiu.ro/revista/ec/pdf/2015-Special%20ECOTREND/48_Radulescu.pdfdigital economysecurity policiestrustconfidentialitysecurity mechanismscookiesencryption. |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
CRISTINA-MARIA RĂDULESCU |
spellingShingle |
CRISTINA-MARIA RĂDULESCU STUDY ON COMPANY SECURITY POLICIES FROM DIGITAL MEDIA Analele Universităţii Constantin Brâncuşi din Târgu Jiu : Seria Economie digital economy security policies trust confidentiality security mechanisms cookies encryption. |
author_facet |
CRISTINA-MARIA RĂDULESCU |
author_sort |
CRISTINA-MARIA RĂDULESCU |
title |
STUDY ON COMPANY SECURITY POLICIES FROM DIGITAL MEDIA |
title_short |
STUDY ON COMPANY SECURITY POLICIES FROM DIGITAL MEDIA |
title_full |
STUDY ON COMPANY SECURITY POLICIES FROM DIGITAL MEDIA |
title_fullStr |
STUDY ON COMPANY SECURITY POLICIES FROM DIGITAL MEDIA |
title_full_unstemmed |
STUDY ON COMPANY SECURITY POLICIES FROM DIGITAL MEDIA |
title_sort |
study on company security policies from digital media |
publisher |
Academica Brâncuşi |
series |
Analele Universităţii Constantin Brâncuşi din Târgu Jiu : Seria Economie |
issn |
1844-7007 1844-7007 |
publishDate |
2015-12-01 |
description |
The Internet development has brought both new opportunities and risks for either retailers or consumers.
For example, electronic commerce is much faster and less expensive, but this openness makes it difficult to
secure. People are aware of the fact that online businesses collecting, process and distribute enormous amounts
of personal data and therefore, are concerned about their unauthorized use or their use in other purposes than
intended by third parties in order to gain unauthorized access to them. There are more examples of cyber
criminal activities, such as: hacking, software piracy, passwords attack, service prohibition attacks, scamming,
etc. Such fears led to the editing of protection policies meant to secure personal data and to develop some
mechanisms to ensure the reliability and confidentiality of electronic information. Security measures include
access control devices, installation of firewalls and intrusion detection devices, of some security procedures to
identify and authenticate authorized users of network systems. Such mechanisms constitute the core of this study.
We will also analyze security and confidentiality policy of personal data of Google Inc.
|
topic |
digital economy security policies trust confidentiality security mechanisms cookies encryption. |
url |
http://www.utgjiu.ro/revista/ec/pdf/2015-Special%20ECOTREND/48_Radulescu.pdf |
work_keys_str_mv |
AT cristinamariaradulescu studyoncompanysecuritypoliciesfromdigitalmedia |
_version_ |
1725705906095652864 |