Login | Register

Security of E-Procurement Transactions in Supply Chain Reengineering


Security of E-Procurement Transactions in Supply Chain Reengineering

Stephens, Juliette and Valverde, Raul (2013) Security of E-Procurement Transactions in Supply Chain Reengineering. Computer and Information Science, 6 (3). ISSN 1913-8989

[thumbnail of 23142-91217-1-PB.pdf]
Text (application/pdf)
23142-91217-1-PB.pdf - Published Version

Official URL: http://dx.doi.org/10.5539/cis.v6n3p1


With the rapid rise of Business to Business (B2B) transactions over the internet and the increasing use of e-procurement solutions by large organizations for purchasing, there is a need to reengineer current legacy supply chain management systems in order to integrate them with modern e-procurement systems. Although there is a great deal of research in the area of integration with e-procurement systems, there is little attention for security aspect of this integration that responds to the need for accurate and secure information exchange has become essential to doing business. Security is a consistent and growing problem for e-commerce and procurement solutions. As the number and frequency of security violations continues to rise, there is a corresponding dependence on information technology to drive business value, which in turn increases the importance and criticality of transaction data. The result is an increasing demand for secure e-procurement transactions to ensure the confidentiality, integrity and availability of data. Secure transactions are essential if organizations are to fully realize the benefits of e-procurement which include increased productivity, lower purchasing pricing, streamlined processes, reduced order fulfillment time and greater budgetary control; all of which can contribute to increasing an organization’s competitive advantage. This research is a case study which evaluates the security of transactions for the integration of an e-procurement solution in a large organization. It addresses both business and technological issues by examining the current threat model, security policies, system architecture, and security controls that have been implemented to ensure data integrity and confidentiality. Finally, a new model will be proposed for reengineering projects that require the integration of e-procurement systems which includes recommendations for improvements that will be benchmarked against common security designed principles.

Divisions:Concordia University > John Molson School of Business > Decision Sciences and Management Information Systems
Item Type:Article
Authors:Stephens, Juliette and Valverde, Raul
Journal or Publication:Computer and Information Science
  • Concordia Open Access Author Fund
Digital Object Identifier (DOI):10.5539/cis.v6n3p1
ID Code:977921
Deposited On:08 Oct 2013 15:06
Last Modified:18 Jan 2018 17:45
All items in Spectrum are protected by copyright, with all rights reserved. The use of items is governed by Spectrum's terms of access.

Repository Staff Only: item control page

Downloads per month over past year

Research related to the current document (at the CORE website)
- Research related to the current document (at the CORE website)
Back to top Back to top