Contact Us
Sign In / Sign Up for FREE
Go to advanced search...

Significant Importance of E-Commerce Security - Research Paper Example

Comments (0) Cite this document
This essay discusses that new technologies have been introduced through e-commerce to give a wider exposure and innovate new ways of conducting businesses. E-commerce presence is important for expansion in business, dissemination of information and access to physically inaccessible markets…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.4% of users find it useful
Significant Importance of E-Commerce Security
Read Text Preview

Extract of sample "Significant Importance of E-Commerce Security"

Download file to see previous pages In today’s dynamic world companies spent heavily on their IT departments for the technical support to smoothly run their e-commerce activities. Companies even develop e-commerce strategies to reduce the cost of the business, expand sales and increase customer services and satisfaction in the long run. (Ghosh, 2001; Khosrowpour, 2004; Smith, 2004) The introduction of e-commerce into businesses has widened the scope of all business activities. Due to increasing use of e-commerce by the businesses and customers, it is now essential to provide a secure structure of e-commerce. Unfortunately, the current internet security policies don’t support these needs. In order to gain a competitive edge in the market company needs to adopt a security policy which caters the needs of everyone involved in the e-commerce process. (Al-Slamy, 2008) The businesses operating widely over e-commerce don’t want to lose their customers due to risks involved in using online services. Solid security measures are now needed to run the businesses effectively and safely. (Oswald, 2005) E-Commerce in Organizations: In most organizations e-commerce total security programs are installed to protect firm’s resources and e-commerce operations. Such programs are necessary for e-commerce survival and their effectiveness in the organization. Such programs are kept updated and management practices and latest technologies are incorporated from time to time. (Khosrowpour, 2004) E-commerce is widely used for many business purposes like product research, order entry; customer’s related matters like support, services, communication, inquiry, invoicing etc., outbound and inbound logistics. E-commerce has revolutionized not only businesses but every aspect of life - the world is now a click away. (Smith, 2004) E-commerce system and related threats: Developing an e-commerce system is a challenging and crucial step to any organization. The initial process would be to conduct a research regarding the importance of e-commerce program to the organization and impact of e-commerce on the long-term profitability. Leadership and commitment to upper management in the implementation of the e-commerce is essential. The next step is developing a privacy policy for the organization that outlines privacy issues, the sensitivity of information and purchasing guidelines. The next step would be to assess risks imposed by the system regarding its security, both internally and externally. It is often seen that identifying internal threats is difficult compared to external ones. For the purpose, many software packages are available and are installed in order to ensure that the system is safeguarded against the internal and external threats. (Khosrowpour, 2004; Epstein, 2004) An organization can face many problems due to poor security in e-commerce systems. An e-commerce continuity plan is extremely important which provides the outline to deal and prevent any problems in the system. The basic security step is the use of anti-virus programs and firewalls installation. The risks usually faced by an e-commerce system include loss of data due to fire or explosion or any other accident, intentional destruction and theft of hardware and software or important documents, loss of key e-commerce security personnel, loss of communication, vendors and technology etc.  ...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
(“Significant Importance of E-Commerce Security Research Paper”, n.d.)
Significant Importance of E-Commerce Security Research Paper. Retrieved from
(Significant Importance of E-Commerce Security Research Paper)
Significant Importance of E-Commerce Security Research Paper.
“Significant Importance of E-Commerce Security Research Paper”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Significant Importance of E-Commerce Security

The Importance of Place in a Groups Ethnic Identity

His work spans a broad range of subjects from ethnography among peasants in Algeria, to sociological analysis of nineteenth-century artists and writers, education, language, consumer and cultural tastes, religion, and science in modern French society. (p. 2)
Bourdieu’s major theoretical contributions to sociology are his notion of habitus and its associated concepts of social field and agency. Given the breadth of literature and uses of examples that Bourdieu produced in order to articulate these concepts, there is much room for interpretation of what they meant and how much social agency they afford to individuals. Nonetheless, this paper will explore the habitus, field, and agency in terms of the fluid dynamics of the...
13 Pages (3250 words) Assignment

The Importance of Employee Empowerment in the Global World

Empowerment is the authority to make decisions within one’s area of operation without having to get approval; from anyone else. Here the operatives are encouraged to use their initiative to do things the way they like. To this end, the employees are given not just authority but resources as well so that they not only take decisions but implement them quickly. This empowerment means giving the employees the authority to make decisions and providing them with financial resources to implement these decisions (Koch & Godden, 1997 11).
Employee participation and empowerment participation means sharing the decision making power with the lower ranks of an organization in an appropriate manner (Lashley & McGoldrick, 199...
9 Pages (2250 words) Assignment

Social Security: Is It in Danger and What Should Be Done

A country that realized the importance of giving the elderly the respect and financial stability they deserve for their lifetime efforts is the United States of America. There was a need for a system that would guarantee a monthly income for retired people. The Great Recession of 1929 left a sour taste in the minds of most American citizens and created greater instability for the nation.  On August 14, 1935, the Social Security Act was passed which created the social security system under the mandate of President Franklin D. Roosevelt (Social security). In 1962 the program was expanded to include medical insurance benefits. Social security has helped bring social justice to American retirees for over 70 years. 
6 Pages (1500 words) Term Paper

The Relationship Between Security, Risk and Health in a Large Organisation

Managers in modern organizations tend to use appropriately customized policies – in accordance with their firms’ needs and resources (employees, funds, technology) available. The current paper focuses on the examination of the various aspects of security, risk, health and safety within large organizations; Particular emphasis is paid on the fact that the demands of each one of these factors may be differentiated under the pressure of the market conditions and the organizational priorities. The case of Shell in Nigeria has been used as an example in order to show the potential co-existence and interaction of these factors within a specific organizational environment. The measures required and the role of the security ma...
9 Pages (2250 words) Coursework

Active Directory - Security, User, and Resource Management

Administrators make use of group policies to launch principles for desktop predilections and software. For many corporate information technology groups, concurrence with group policies to identify what software should be presented to each category of user, even without human intervention installing it on demand from a corporate server (Silberschatz, Galvin, & Gagine 2002. P. 838). The capability of the AD was introduced in the year 1999, its initial release was with the MS Windows 2000 Server Ed., additionally personalized to spread out functionality, security parameters and build up administration in MS Win Server 2003. The most recent better facilities and efficient edition of the AD are introduced in the Windows Server 2008...
6 Pages (1500 words) Report

Information Security Management

Security is a group of activities that include the policies, measures, and actions which are utilized to stop unlawful access or alteration, theft, and physical damage to information or computer. Security can be supported by an assortment of techniques and tools to safeguard computer hardware, software communications networks, and data (Laudon & Laudon, 1999, p. 502). In the modern age of information technology, there are many threats happened for organizational information. We need a security model that has the ability to manage and secure our information reserves. Technical administrative safety /security measures like security plans, actions and techniques are the main practices for the organizational information security m...
10 Pages (2500 words) Research Paper

Information Security Policy of Organization

In the modern age of information technology, there are many threats created for organizational information. Organizations need a security model that has the capability to handle and secure our information reserves. Technical administrative safety /security measures like security plans, actions and procedures are the general practices for the organizational information security procedures. The attentiveness of producing actions is concerned by the organizations to an appreciably smaller level, on the other hand at the same time these are weighed up as being further efficient organizational actions than technical administrative ones. Information security encompasses organizational features, officially authorized aspects, institution...
6 Pages (1500 words) Research Paper

Role of the Police and Private Security

...Report to the Legislator - Committee on Crime and Criminal Justice Congratulations on being appointed to the Committee on Crime and Criminal Justice. As a public servant you are holding a very responsible post that covers many areas of administration including the important role of providing security to the citizens of your constituency and to those individuals who visit it. This report will provide you with a clear picture on the role of security agencies with regard to homeland security. Many of the points mentioned here may be new or already known to you, but they are provided here in any case. It is common knowledge that apart from local and organized crime within the United States, the country is now facing new forms of threats like...
8 Pages (2000 words) Case Study

Importance of ISO 9000 for Plym Yachts

As we know that today’s business world is rapidly changing, it has become extremely important and crucial for any company or business to implement ISO 9000 in the business.

While talking about ISO 9000, let’s now describe its importance for the company, Plym Yachts. As we have encountered a big problem of losing our precious and potential customers in the recent times because of not paying enough attention and interest towards the implementation of ISO 9000 in the company, we need to know its importance and significance to the company. So describing the importance of ISO 9000, it is a common fact that when a company or any specific business will not have any proper implementation of any quality management sy...
6 Pages (1500 words) Case Study

Validating Late Mover Advantages in e-commerce: Evidence from Selected Companies

The market dynamics have been drastically changed over the years as marketing and selling over the internet has become an integral part of business strategies. The changing trends in the consumer behavior and attitude towards shopping at their own ease have pushed businesses to rethink their strategies and approach the business in an entirely new way to which they may not be accustomed to. E-commerce poses greater challenges for companies to change and adapt to the needs of the disequilibrium that is continuously created within the online market space. The challenges faced by the companies are in the form of “weak intellectual property rights, technical interdependence, technical uncertainties, and rapid technical innovation...
12 Pages (3000 words) Research Proposal
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Paper on topic Significant Importance of E-Commerce Security for FREE!

Contact Us