EDI security: a model of EDI risks and associated controls

Article Properties
Abstract
Cite
Ratnasingham, Pauline. “EDI Security: A Model of EDI Risks and Associated Controls”. Information Management &Amp; Computer Security, vol. 5, no. 2, 1997, pp. 63-71, https://doi.org/10.1108/09685229710182848.
Ratnasingham, P. (1997). EDI security: a model of EDI risks and associated controls. Information Management &Amp; Computer Security, 5(2), 63-71. https://doi.org/10.1108/09685229710182848
Ratnasingham P. EDI security: a model of EDI risks and associated controls. Information Management & Computer Security. 1997;5(2):63-71.
Description

In today's interconnected world, can businesses confidently secure their Electronic Data Interchange (EDI) systems? This research addresses the critical need for robust EDI security by defining a comprehensive model of risks and associated controls. The model pinpoints how specific controls alleviate or eliminate identified risks, enhancing data protection and system integrity. Through seven in-depth case studies, the research uncovers additional risks and controls, offering a refined mapping of the relationships between them. The study provides crucial insights into how organizations perceive and respond to security threats when adopting EDI. It emphasizes the importance of a multi-layered approach, incorporating technological, procedural, and organizational controls to address vulnerabilities effectively. This analysis of EDI risks and controls provides a foundation for establishing secure EDI practices. By understanding these insights, organizations can better protect their sensitive data, maintain operational efficiency, and foster trust with trading partners. Ultimately, this research provides a valuable resource for organizations seeking to enhance their EDI security posture. By proactively addressing potential vulnerabilities and implementing effective controls, businesses can minimize the risk of data breaches, ensure regulatory compliance, and maintain a competitive edge in today's digital landscape. Future research can build upon this model to explore emerging EDI security threats and develop innovative mitigation strategies, such as the use of **information technology** to improve the **cybersecurity** of these systems.

This paper on EDI security aligns with the journal's focus on information management and computer security. It contributes by providing a model for mitigating risks associated with EDI, a critical aspect of secure data exchange. The paper enhances the journal's content by offering insights into the perceptions and responses to security threats in EDI adoption, a topic of relevance to the journal's readership.

Refrences
Citations
Citations Analysis
The first research to cite this article was titled Internet‐based EDI trust and security and was published in 1998. The most recent citation comes from a 2017 study titled Internet‐based EDI trust and security . This article reached its peak citation in 2016 , with 2 citations.It has been cited in 9 different journals. Among related journals, the Computers in Human Behavior cited this research the most, with 2 citations. The chart below illustrates the annual citation trends for this article.
Citations used this article by year