CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Case Study of Database Security in Campus ERP System

by Varang Acharya, Sweta Jethava, Adarsh Patel
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 79 - Number 15
Year of Publication: 2013
Authors: Varang Acharya, Sweta Jethava, Adarsh Patel
10.5120/13814-1546

Varang Acharya, Sweta Jethava, Adarsh Patel . Case Study of Database Security in Campus ERP System. International Journal of Computer Applications. 79, 15 ( October 2013), 1-4. DOI=10.5120/13814-1546

@article{ 10.5120/13814-1546,
author = { Varang Acharya, Sweta Jethava, Adarsh Patel },
title = { Case Study of Database Security in Campus ERP System },
journal = { International Journal of Computer Applications },
issue_date = { October 2013 },
volume = { 79 },
number = { 15 },
month = { October },
year = { 2013 },
issn = { 0975-8887 },
pages = { 1-4 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume79/number15/13814-1546/ },
doi = { 10.5120/13814-1546 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:53:02.613479+05:30
%A Varang Acharya
%A Sweta Jethava
%A Adarsh Patel
%T Case Study of Database Security in Campus ERP System
%J International Journal of Computer Applications
%@ 0975-8887
%V 79
%N 15
%P 1-4
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Database Security essentially refers to protection of the information content in database. In general, the decision regarding who should be allowed access to the databases or alternatively who should be denied access to the database is dictated by the security policies of the organization concerned. The implementation of ERP systems has been problematic for much organization because of one of the reason is lack of database security. The aim of this study is to identify the risks and controls used in ERP database access, with the objective to understand the ways in which organizations can minimize the business risks involved. In this paper are describe different types of vulnerability of database and Suggestions are offered in resolving the issues for database security in ERP system

References
  1. Goel, Shivani, Ravi Kiran, and Deepak Garg. "Vulnerability Management for an Enterprise Resource Planning System. " arXiv preprint arXiv:1209. 6484 (2012).
  2. Molnár, Bálint, and Gyula Szabó. "Information architecture of ERP systems at globalised enterprises in a small EU member state. " Information Technology Interfaces (ITI), Proceedings of the ITI 2011 33rd International Conference on. IEEE, 2011.
  3. Adam, Rubina, Paula Kotzé, and Alta Van der Merwe. "Acceptance of enterprise resource planning systems by small manufacturing enterprises. " (2011).
  4. Shaul, Levi, and Doron Tauber. "CSFs along ERP life-cycle in SMEs: a field study. " Industrial Management & Data Systems 112. 3 (2012): 360-384.
  5. Khosrowpour, Mehdi, ed. Emerging Trends and Challenges in Information Technology Management: 2006 Information Resources Management Association International Conference, Washington, DC, USA, May 21-24, 2006. Vol. 1. IGI Global, 2006.
Index Terms

Computer Science
Information Sciences

Keywords

ERP Database Security ERP Security Issues