Volume 6 Issue 1
Authors: DJENOUHAT Assia; DJAOUAHDOU Reda
Abstract: Since Algerian internet usage has continuously grown to the point at which China became the primary supplier of Algeria in 2013, there is evidence that Algerian companies trade via e-marketplaces to import from China. This study demonstrates how internet usage and importation from China grew from 2000 to 2014, and its impact on the development of Sino-Algerian business relationships. For this study, 250 Algerian companies were reviewed to evaluate their trade practices with Chinese companies via the e-marketplace. The aim of this study is to investigate the extent of e-marketplace usage when trading with Chinese companies, by examining the basic pre-purchase and after-purchase activities of the Algerian import companies, and to examine the impact of these transactions on Sino-Algerian business relationships. This research identifies the reasons behind the partial use of the e-marketplace when trading with Chinese companies, and the obstacles faced by Algerian import companies.
Keywords: E-Marketplace; Algerian Importation; Sino-Algerian Business Relationship
Authors: Dien D. Phan; Kim G. Phan
Abstract: Information security has received great attention from the government, businesses, and the public. As information becomes more valuable, it attracts more hacker attacks, and organizations are becoming more vulnerable to losses of valuable information. Data breaches cause losses of competitive advantages, revenues, reputation, trust, and customers. In some instances, they lead to the removal of top management. Thus, protection of organizational data becomes vital to the operations and survival of businesses. This study investigates the challenges that business enterprises face in information security and proposes a total security management model. An empirical study of recent major data breaches is examined. The study finds that while technology plays the central role in information security, more attention to security management, process and policy are needed. The paper ends with lessons learned, and a comprehensive security model is proposed.
Keywords: Information Security; Data Breach; Information Risk; Authentication; Information Security Policy