Contact Us
Sign In / Sign Up for FREE
Go to advanced search...

Electronic Commerce and Information Security and Ethics - Essay Example

Comments (0) Cite this document
The paper "Electronic Commerce and Information Security and Ethics" aims to evaluate tools and strategies needed to follow in order to implement electronic and mobile commerce in business and policies and procedures that organizations should implement to protect themselves…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER94.8% of users find it useful
Electronic Commerce and Information Security and Ethics
Read TextPreview

Extract of sample "Electronic Commerce and Information Security and Ethics"

Download file to see previous pages The essay tells that most of the products and services involved include; shopping for goods and services, conducting banking and monetary transactions, playing online interactive games, sending and receiving emails, linking to social networks to connect to people and finally trading stocks and shares. On the other hand, online presence refers to the sum of all identities created either personally or business-wise, interactions created by these identities and those that a business or a person have participated in online. A successful online presence is bound to earn an individual or business followers, fans and customers. Another benefit of a good online presence is that it is bound to spread brand awareness which is the dream of every business out there. Therefore, building an online presence entails establishing the goals of an individual or the business, creating accounts and profiles, building a website which will serve as the home base and finally working on the best ways to engage and interact online. The first step businesses need to take into account when creating an online presence is strategizing their business goals. By doing this it will help them understand their business goals whether short term or long term that are driving them to create an online presence. This is the time to also assess the impact of the online presence to your business goals. This stage helps in creating an online presence that will impact positively on the goals of the business. The next step is creating a solid platform. The most important thing in this step is to create a website which is going to be the home base for the business. A website facilitates your online presence by creating a platform for your business where people can find it easily and learn more about what they offer. Through this, they can interact, engage, and contact you in case they need your services. Therefore, search engine optimization, clear message about the business, contact page, are a prerequisite in ensuring a good website to establish your online presence. ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(Electronic Commerce and Information Security and Ethics Essay, n.d.)
Electronic Commerce and Information Security and Ethics Essay. Retrieved from
(Electronic Commerce and Information Security and Ethics Essay)
Electronic Commerce and Information Security and Ethics Essay.
“Electronic Commerce and Information Security and Ethics Essay”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Electronic Commerce and Information Security and Ethics

Electronic commerce

...advantage, the virtual market should be untapped so as to reach so the many internet users (Baye, Morgan, 2001). Electronic commerce is defined as the buying and selling of goods, services or information through computer networks using the internet. E -commerce offers new ways of doing business that no company can ignore. Electronic commerce has brought with it several benefits, and it is also extremely convenient. Some of the benefits of e-commerce include; shortened remittance time, companies have managed to easily promote their product, both consumers and the companies have saved on the cost; it has enhanced the...
7 Pages(1750 words)Essay

Information Security and Ethics

...? Policies and Procedures That Organizations Should Implement to Protect Themselves Introduction Information about an organization and its operations provides one of the most important success factors for any firm. Private and confidential information, for instance, information about a production procedure, can be a source of competitive advantage for a company over its rivals in the market. As such, organizations need to protect their confidential information from unauthorized people, within and outside the organization. Organizations usually place great accountability and trust in their security professionals to protect their confidential...
4 Pages(1000 words)Essay

Electronic Commerce

... coupled messaging, multiple connectivity and information sharing scenarios via services that are self describing and can be automatically discovered. This advancement will allow for a common uniform interface to build on their Web Services and deploy them in the UDDI registries for other companies to find them, ensuring the generic interface covers all possible services which a delivery agent may provide. This web services model will allow any user access through the use of XML tags for information exchange, and behind the scenes the other three standards (SOAP, UDDI, and WSDL) without loss of performance. To deliver a properly through architecture, the project will define the Service Oriented Architecture as a way of designing... and...
4 Pages(1000 words)Essay

Electronic Commerce and enter them into the order entry system. A Franke worker assembles the equipment, packages them, make them tagged using RFID, etc, and then distributes them to the customer. The delivery process is monitored and tracked by Franke’s SCM system to get the latest information of order status. “Most B2B E-commerce is an adaption of EDI or is based on EDI principles.” (Deitel, Deitel & Nieto, 2001) EDI stands for electronic data interchange and it can minimize the cost, mistakes and suspensions common to the traditional ways of exchanging and recording paper documents such as purchase orders and customer information. Franke can build an EDI to increase the...
10 Pages(2500 words)Essay

Developing security policy (Security, Ethics and Electronic Commerce Systems)

...and tokens, confidential Notify immediately to the concerning party about the loss or misuse of corporation’s information. Policy enforcement Certain technologies and devices are used in order to keep the information in consistent format and managing the risk for loss of integrity, confidentiality and availability of information. Virus scanning software is permitted by the Information Security Officer that ensures all electronic files are correctly scanned for viruses. Moreover, users are not allowed to disable anti-virus software. Some authentication method needed to be implemented for instance, username and passwords, biometric...
10 Pages(2500 words)Essay

Electronic commerce

...government also does not approve the sale of prescription drugs over the internet, from countries whose quality and standards of the drugs are not the same as the US’s. CONSUMER PROTECTION OVER THE INTERNET The United States government stance on this is that a consumer should be given protection equivalent to that which he/she would have if dealing in the physical transaction. A buyer should also be made aware that some of the legal protections which he/she enjoys on off-line transactions may not apply on online transactions. Government should be at the forefront in protecting consumers through coordination with FTC at national level, and other locally oriented task forces. ...
1 Pages(250 words)Assignment

Information Security and Ethics

...Information Security and Ethics Security Threat A of the security threat, its impact, and an example. What can be done keep information secure from the threat. (Technology: software or hardware), organizational strategies. Computer Virus Description: these are created programs or data that are introduces in the networks or even the personal computer, with the intention of destroying the computer. Impact: the viruses change the coding of the program hence making them unusable. Others will destroy or even scramble the saved data in the computer. Some of the characteristics of these viruses are that they undertake the...
2 Pages(500 words)Essay

ELECTRONIC COMMERCE AND INFORMATION SECURITY AND ETHICS bulky in expensive deals (Chellappa & Pavlou, 2002). Therefore, electronic commerce has brought a lot of convenience on the business world by making transactions faster reliable and efficient. Challenges affecting electronic commerce are issues of security and private issues. Part two Security Threat Description of the security threat and its impact to organizations. Provide an example. Solutions for organizations to keep their information safe from threat. Technology tools (software or hardware) as well as the organizational strategies (policies, leadership, training, etc.). Computer...
4 Pages(1000 words)Essay

Security Plan- Human, Electronic Information

...significant use of the Internet for services such as Electronic Commerce and Electronic Service Delivery” (, 2008). As a result of this finding, the Office of the Privacy Commissioner has issued security guidelines for all Federal and local government websites in Australia. The National Archives of Australia (NAA) is another government body whose objective it is to inform citizens, public administrators and business owners about their legislative obligations in the area of content security. The Privacy Act and Electronic Transactions Act were particularly conceived to tackle the growing concern over...
17 Pages(4250 words)Essay

Electronic Commerce the research of OECD (2010) which shows that jobs may be created from the need by companies to have a presence in both the cyber commerce world and the physical world thereby an increase in staff. Instead of job losses, what is envisaged is growth in a new segment of the job market as there now will be need for informational technology professionals whose expertise will be used to develop the electronic commerce medium. Lubbe and Maria Van Heerden (2003) point to the fact that the progressive use of electronic commerce actually necessitates the need for professionals who will develop applications needed to help its running....
5 Pages(1250 words)Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Electronic Commerce and Information Security and Ethics for FREE!

Contact Us