Advanced Search
MyIDEAS: Login to save this paper or follow this series

Une sécurisation globalisée des systèmes d’information de gestion (Globalized securization of management information systems)

Contents:

Author Info

  • Pierre E. Edorh

    ()
    (labrii, ULCO)

Registered author(s):

    Abstract

    Depuis la fin de la décennie 1980, nombre d’organisations construisent ou se font construire leur site Web. Ce site peut, selon le cas, servir de support au commerce électronique en ligne, à la présentation de l’entreprise, à l’information sur celle-ci. Le site Web peut aussi servir de moyen de communication entre une organisation et ses filiales ou ses partenaires. Mais la connexion à l’Internet présente des risques, au sens où cette technologie constitue pour l’organisation l’ayant adoptée, une ouverture sur l’extérieur. Ceci se traduit par des dangers : piratages par jeux, espionnage concurrentiel, malveillance. Dans tous les cas, les menaces sont importantes et les coûts sont plus ou moins élevés : pertes d’exploitation, applications spécifiques et à la recréation des données. Cet article n’est pas doté d’exhaustivité. Il étudie les risques et les menaces d’attaques pesant sur les systèmes d’information de gestion des organisations et examine les mesures que ces organisations devraient prendre pour se doter d’un niveau élevé de protection (surtout dans le cadre d’un service Web). Since the end of the 80’s, many organizations have built their own Web sites. These sites can be a support for the on-line commercial business or give information about the firm. Web sites can also be a communication tool between the entreprise and its subsidiaries or its partners. But Internet network is also a risk for the organization, since Internet Technology represents an opening of the organization to the environment, wich means new threats : games high jacking, competitive espionage, malevolent actions. In all cases, the threats are important and the costs are more or less high: operating losses, specific applications and data losses. Without pretending to exhaustivity, this paper studies the risks and attack threats which the management information systems is confronted to, and examines the measures that should be taken by these organizations to have a high level of protection (especially in a web service context).

    Download Info

    If you experience problems downloading a file, check if you have the proper application to view it first. In case of further problems read the IDEAS help page. Note that these files are not on the IDEAS site. Please be patient as the files may be large.
    File URL: http://riifr.univ-littoral.fr/wp-content/uploads/2007/04/doc93.pdf
    Download Restriction: no

    Bibliographic Info

    Paper provided by Laboratoire de Recherche sur l'Industrie et l'Innovation. ULCO / Research Unit on Industry and Innovation in its series Working Papers with number 93.

    as in new window
    Length: 20 pages
    Date of creation: Jan 2005
    Date of revision:
    Publication status: Published in Cahiers du Lab.RII, janvier 2005
    Handle: RePEc:rii:riidoc:93

    Contact details of provider:
    Postal: Maison de la recherche en sciences de l'homme, 21 quai de la Citadelle, 59140 Dunkerque
    Phone: (33) 3 28 23 71 35
    Fax: (33) 3 28 23 71 43 or (33) 3 28 23 71 10
    Email:
    Web page: http://riifr.univ-littoral.fr/
    More information through EDIRC

    Related research

    Keywords: Système d'information; Internet; sécurité; commerce électronique; en ligne/ information system; Internet; security; on line; commercial business;

    Find related papers by JEL classification:

    References

    No references listed on IDEAS
    You can help add them by filling out this form.

    Citations

    Lists

    This item is not listed on Wikipedia, on a reading list or among the top items on IDEAS.

    Statistics

    Access and download statistics

    Corrections

    When requesting a correction, please mention this item's handle: RePEc:rii:riidoc:93. See general information about how to correct material in RePEc.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Philippe Chagnon).

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If references are entirely missing, you can add them using this form.

    If the full references list an item that is present in RePEc, but the system did not link to it, you can help with this form.

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your profile, as there may be some citations waiting for confirmation.

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.