Improving the Security and Reliability of a Quality Marketing Information System: A Priority Prerequisite for Good Strategic Management of a Successful Entrepreneurial Project

Authors

DOI:

https://doi.org/10.56294/dm202340

Keywords:

Marketing Information System, Cryptography, Hashing, Intrusions, Encryption, Decryption

Abstract

Thanks to the security policy of the marketing information system which includes physical, administrative and logical safeguards, organizations are today able to design marketing and sales strategies that enable them to effectively respond and satisfy their customers' needs and expectations in a timely and cost effective manner and this by protecting the relevant information and data circulating in the said information system against any attempt at attack or malicious intrusion which seeks only to harm its reliability, confidentiality, integrity, availability and credibility. Indeed with this security policy we arrive easily to identify each discrepancy observed in the behavior of persons accessing this marketing information system as well as each mismatch between the service provided to users and the service expected by them, a context that pushes this security system to generate automatically  some countermeasures such as encryption, decryption, hashing, electronic signature, intrusion detection and prevention and certification

References

1. Bennani A-E, Laghzaoui S. The articulation between the monitoring of the company's environment and the information system: The contribution of a systemic approach. Int J Econ Intell. 2009;1(2):257-270.

2. Bertino E, Ferrari E, Atluri V. The specification and enforcement of authorization constraints in workflow management systems. ACM Trans Inf Syst Secur. 1999;2(1):65-104.

3. Brien RH, Stafford JE. Marketing Information Systems: A New Dimension for Marketing Research. J Mark. 1968;32(3):19-23.

4. Chandola V, Banerjee A, Kumar V. Anomaly detection: A survey. ACM Comput Surv. 2009;41(3):1-58.

5. Cox DF, Good E. How to build a marketing information system. Harv Bus Rev. 1967;45(3):145-154.

6. Denning DE. An Intrusion-Detection Model. IEEE Trans Softw Eng. 1987;13(2):222-232.

7. De Séréville E. In terms of information systems security, are normalization and standardization factors of efficiency? Int J Econ Intell. 2009;1(2):271-287.

8. Goudalo W, Kolski C, Vanderhaegen F. Towards advanced engineering for enterprise IS security: A joint approach to security, usability and resilience in socio-technical systems. Inf Syst Eng. 2017;22(1):65-107.

9. Majdalawi YK, Hamad F. Security, Privacy Risks and Challenges that Face Using of Cloud Computing. Int J Adv Sci Technol. 2019;13(3):156-166.

10. Ruault J, Kolski C, Luzeaux D, Vanderhaegen F, Goudalo W. Built-in resiliency of system safety and security: Monitor the system and alert operators to navigate on sight. Software Eng. 2016;117:2-12.

11. Vistro DM, Rehman AU, Mehmood S, Idrees M, Munawar A. A literature review on security issues in cloud computing: Opportunities and challenges. J Crit Rev. 2020;7(10):1446-1455.

Downloads

Published

2023-05-08

Issue

Section

Original

How to Cite

1.
Lali K, Chakor A. Improving the Security and Reliability of a Quality Marketing Information System: A Priority Prerequisite for Good Strategic Management of a Successful Entrepreneurial Project. Data and Metadata [Internet]. 2023 May 8 [cited 2024 Dec. 21];2:40. Available from: https://dm.ageditor.ar/index.php/dm/article/view/171