Improving the Security and Reliability of a Quality Marketing Information System: A Priority Prerequisite for Good Strategic Management of a Successful Entrepreneurial Project
Editor: Prof. Dr. Javier González Argote, https://orcid.org/0000-0003-0257-1176
Guest Editor: Yousef Farhaoui, https://orcid.org/0000-0003-0870-6262
Note: Paper presented at the International Conference on Artificial Intelligence and Smart Environments (ICAISE'2023).
Keywords:Marketing information system, cryptography, hashing, intrusions, encryption, decryption
Thanks to the security policy of the marketing information system which includes physical, administrative and logical safeguards, organizations are today able to design marketing and sales strategies that enable them to effectively respond and satisfy their customers' needs and expectations in a timely and cost effective manner and this by protecting the relevant information and data circulating in the said information system against any attempt at attack or malicious intrusion which seeks only to harm its reliability, confidentiality, integrity, availability and credibility. Indeed with this security policy we arrive easily to identify each discrepancy observed in the behavior of persons accessing this marketing information system as well as each mismatch between the service provided to users and the service expected by them, a context that pushes this security system to generate automatically some countermeasures such as encryption, decryption, hashing, electronic signature, intrusion detection and prevention and certification.
Bennani A-E, Laghzaoui S. The articulation between the monitoring of the company's environment and the information system: The contribution of a systemic approach. Int J Econ Intell. 2009;1(2):257-270.
Bertino E, Ferrari E, Atluri V. The specification and enforcement of authorization constraints in workflow management systems. ACM Trans Inf Syst Secur. 1999;2(1):65-104.
Brien RH, Stafford JE. Marketing Information Systems: A New Dimension for Marketing Research. J Mark. 1968;32(3):19-23.
Chandola V, Banerjee A, Kumar V. Anomaly detection: A survey. ACM Comput Surv. 2009;41(3):1-58.
Cox DF, Good E. How to build a marketing information system. Harv Bus Rev. 1967;45(3):145-154.
Denning DE. An Intrusion-Detection Model. IEEE Trans Softw Eng. 1987;13(2):222-232.
De Séréville E. In terms of information systems security, are normalization and standardization factors of efficiency? Int J Econ Intell. 2009;1(2):271-287.
Goudalo W, Kolski C, Vanderhaegen F. Towards advanced engineering for enterprise IS security: A joint approach to security, usability and resilience in socio-technical systems. Inf Syst Eng. 2017;22(1):65-107.
Majdalawi YK, Hamad F. Security, Privacy Risks and Challenges that Face Using of Cloud Computing. Int J Adv Sci Technol. 2019;13(3):156-166.
Ruault J, Kolski C, Luzeaux D, Vanderhaegen F, Goudalo W. Built-in resiliency of system safety and security: Monitor the system and alert operators to navigate on sight. Software Eng. 2016;117:2-12.
Vistro DM, Rehman AU, Mehmood S, Idrees M, Munawar A. A literature review on security issues in cloud computing: Opportunities and challenges. J Crit Rev. 2020;7(10):1446-1455.
How to Cite
Copyright (c) 2023 Khalid Lali, Abdellatif Chakor
This work is licensed under a Creative Commons Attribution 4.0 International License.
The article is distributed under the Creative Commons Attribution 4.0 License. Unless otherwise stated, associated published material is distributed under the same licence.