IT Governance, Risk, and Compliance:

Electronic Commerce

1

August 22, 2012  12:49 AM

IT Hardware Validity Checks – Part IV



Posted by: Robert Davis
Configuration Management, Control Methods, Control Processes, Control Techniques, CPU, Digital Storage Devices, EDI, Electronic Commerce, Electronic Data Interchange, Feedback Control, Firmware, Hardware Controls, Information Communication Technology, Information Security, Infrastructure, Integrity, IT Architecture, IT Configuration, IT Infrastructure, IT Security, Media Errors, Risk Management

Some IT configurations are capable of assigning whole sections of memory for prescribed operations, programs, and/or data. These assigned sections of memory can be protected by a hardware address validity check. This type of control is also known as

August 17, 2012  11:59 PM

IT Hardware Validity Checks – Part III



Posted by: Robert Davis
Configuration Management, Control Methods, Control Processes, Control Techniques, CPU, Digital Storage Devices, EDI, Electronic Commerce, Electronic Data Interchange, Feedback Control, Firmware, Hardware Controls, Information Communication Technology, Information Security, Infrastructure, Integrity, IT Architecture, IT Configuration, IT Infrastructure, IT Security, Media Errors, Risk Management

Validity checking of datum passed to peripheral devices A data validity check compares characters or fields that are written or read with a set of all valid characters or fields. It is particularly useful technique with peripheral devices such as printers. For example, a...


August 15, 2012  12:34 AM

IT Hardware Validity Checks – Part II



Posted by: Robert Davis
Configuration Management, Control Methods, Control Processes, Control Techniques, Digital Storage Devices, EDI, Electronic Commerce, Electronic Data Interchange, Feedback Control, Hardware Controls, Information Communication Technology, Information Security, Infrastructure, Integrity, IT Architecture, IT Configuration, IT Infrastructure, IT Security, Media Errors, Risk Management

Information validity implies data elements represent real conditions, rules or relationships rather than physical object characteristics. IT hardware validity checks are preventive and/or detective control measures that should be implemented to ensure appropriate data processing. There are three...


August 11, 2012  12:36 AM

IT Hardware Validity Checks – Part I



Posted by: Robert Davis
Configuration Management, Control Methods, Control Processes, Control Techniques, Digital Storage Devices, EDI, Electronic Commerce, Electronic Data Interchange, Feedback Control, Hardware Controls, Information Communication Technology, Information Security, Infrastructure, Integrity, IT Architecture, IT Configuration, IT Hardware, IT Infrastructure, IT Security, Media Errors, Risk Management

IT hardware validity checks are preventive and/or detective control measures that should be implemented to ensure appropriate data processing. An important component of enabling information integrity is sustaining data and task validity. Within...


May 26, 2009  6:14 PM

Electronic Commerce – Part IV



Posted by: Robert Davis
B2B, B2C, B2E, B2G, Business-to-Business, Business-to-Consumer, Business-to-Employee, Business-to-Government, E-commerce, EDI, Electronic Commerce, Electronic Data Interchange, Internet, Message Integrity, PKI, Public Key Infrastructure, UCC, Uniform Commercial Code

EDI is commonly defined as the transfer of data between different companies utilizing networks. For the vast majority of entities, enhanced transactional traceability, reliability, and accessibility are derived EDI benefits; but without appropriate...

Bookmark and Share     0 Comments     RSS Feed     Email a friend


May 22, 2009  7:00 PM

Electronic Commerce – Part III



Posted by: Robert Davis
B2B, B2C, B2E, B2G, Business-to-Business, Business-to-Consumer, Business-to-Employee, Business-to-Government, E-commerce, EDI, Electronic Commerce, Electronic Data Interchange, Internet, Message Integrity, UCC, Uniform Commercial Code

EDI between trading partners can be interpreted as legally binding contracts. For instance, when a transaction is initiated by one of the trading partners, such as a purchase order, it constitutes an "offer". In turn, if a trading partner agrees to supply the merchandise requested, it normally is...


May 19, 2009  7:52 PM

Electronic Commerce – Part II



Posted by: Robert Davis
B2B, B2C, B2E, B2G, Business-to-Business, Business-to-Consumer, Business-to-Employee, Business-to-Government, E-commerce, EDI, Electronic Commerce, Electronic Data Interchange, Internet

Delineated, B2B is E-commerce between discernibly distinct entities. B2B links enable the exchange of products, services, or information between entities. Cascading down, Electronic Data Interchange (EDI) methodologies are the precursors and pillars of Internet integrated B2B relationships....


May 15, 2009  6:48 PM

Electronic Commerce – Part I



Posted by: Robert Davis
B2B, B2C, B2E, B2G, Business-to-Business, Business-to-Consumer, Business-to-Employee, Business-to-Government, E-commerce, Electronic Commerce, Internet

With an ever-increasing number of organizations and individuals relying on the Internet to exchange confidential and sensitive information, adequate message security continues to be a technological management concern. Serviceable standard electronic commerce (E-commerce) models include...


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: