StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Cyber crime and security affair in e-business - Article Example

Cite this document
Summary
The study will define Cybercrime and its meanings along with defining E-Commerce. Effect of cyber crime on E commerce will be discussed in detail. It will be established whether Cybercrime and cyber criminals are a threat to E Commerce especially online shopping…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.2% of users find it useful
Cyber crime and security affair in e-business
Read Text Preview

Extract of sample "Cyber crime and security affair in e-business"

Download file to see previous pages

This essay discusses that technology is essential part of business today. The internet has become a backbone and nervous system of business nowadays. Internet is already affecting our lives at home and offices to a great extent. While this dimension improves our lives it also creates enormous risks. Many individuals and businesses are still not aware of the risks posed by internet and the cyber space. The efficiency, complexity and speed of businesses today are attributed to technology and particularly E commerce.

This enormous growth in E commerce provides a chance for internal and external fraud and exploitation. E commerce has become a driving force for world economy however it also poses a dangerous scenario once it is attacked or hacked. E commerce is vulnerable to cybercrime within seconds. Cyber criminals take advantage of loopholes in software and hardware architecture and make big organizations collapse in days. In a Globally networked environment, cybercrime can be initiated from any location across the globe.

With the growth in size and speed of organizations, a need arose to make the systems automated and less dependent on humans. According to McQuade Robert T Morris carried out first major cybercrime attack on November 2 1988 which resulted in slow down of thousands of computers. He noted that on June 20 2007, Department of defense was attacked by coordinated hackers, as a result it had to shut down 1500 computers. Assessment of human behavior in an automated world is becoming difficult. Organizations are dependent on outsourcing and do not completely control people who work for them.

Organizations are very cautious about cyber attacks however appear helpless in front of expertise displayed by hackers. There is a greater risk to organizations from their own employees and business rivals in addition to hackers. Businesses are continuously improving their systems however there is still a lesser consideration towards privacy, access control and sharing of data. According to Wada and Odulaga (2011) phishing has been a cause of direct loss amounting $1.2 billion in USA for banks and card industry in 2003 (Wada & Odulaga 2011, P 71).

There is a need to create awareness amongst businesses, the lack of which is evident from growing number cyber attacks in year 2011. Today cyber risks are increasingly surrounding E commerce. It is evident that organizations are

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cyber crime and security affair in e-business Article”, n.d.)
Retrieved from https://studentshare.org/information-technology/1395365-cyber-crime-and-security-affair-in-e-business
(Cyber Crime and Security Affair in E-Business Article)
https://studentshare.org/information-technology/1395365-cyber-crime-and-security-affair-in-e-business.
“Cyber Crime and Security Affair in E-Business Article”, n.d. https://studentshare.org/information-technology/1395365-cyber-crime-and-security-affair-in-e-business.
  • Cited: 0 times

CHECK THESE SAMPLES OF Cyber crime and security affair in e-business

Cyber security

Cyber security Name Institution Topic 1 Cultural values as viewed in the static sense represent the heritage and traditional norms that govern behavior in society.... In addition guidelines regarding security of both data collected and user should be addressed.... Consequently, security measures such as encryptions and firewall software are to be applied in the company's computer server system (Criddle).... Furthermore, by extension, the same behaviors instigated by our cultural values are what impact on cyber ethics....
3 Pages (750 words) Coursework

Organizational Business Mission and Related Security Goals

Vulnerabilities that can be exploited through cyber crime and cyber warfare Valuable information and content is continuously being posted on the Net by publishers and content providers, but with an increasing concern on how to control access and use of this... The electronic environment provides ease of operation across borders, which renders issues of cyber crime an international affair and which inevitably requires renegotiation of agreements between governments, and signing of new treaties in international mediums....
5 Pages (1250 words) Coursework

Corporate Security Breaches

The Management of Corporate security (Name) (Institution) (Course) (Tutor) (Date) Introduction Corporations are incorporated bodies that consist of tremendously large number of shareholders, and in which the actual ownership of the entity can be transferred any moment without the approval of other shareholders.... hellip; Such entities are in most cases under different forms of security attacks, which come from the general society (McCrie 2006).... Corporate security categorizes and efficiently moderates or manages, at the early phases, any form of progression that may intimidate the pliability and unrelenting survival of the very corporation (McCrie 2006)....
8 Pages (2000 words) Essay

Cyber Techniques and International Tensions

Once it has knowledge of this, then it is its responsibility to ensure that it has put in place the best security systems that it can get its hands on.... The paper "cyber Techniques and International Tensions" describes that the development of better cyber techniques has led to a situation where a number of countries attempt to hack into other countries' computer systems for the sole purpose of stealing trade secrets.... hellip; It is important that governments and other organizations should carry on with their operational roles while the following guidance on response to cyber incidents....
11 Pages (2750 words) Essay

Cyber Crime, Cyber Security Awareness and Cyber Incident Reporting

nbsp; The most acceptable definition for cybercrime was laid out in 2000 by the 10th UN Congress on the Prevention of crime and the Treatment of Offenders (Gercke, 2012).... Regardless of the presence or absence of cybercrime laws however, the apprehension and prosecution of perpetrators have been made difficult by the nature of the offence, including the complications related to the cyber security awareness and cyber incident reporting (McGuire and Dowling, 2013; KPMG, 2011)....
28 Pages (7000 words) Literature review

Computer Crimes and Digital Investigations

nbsp;… The following unlawful activities are conducted using the computer, for example, cyber defamation, e-mail spoofing, pornography, forgery, financial crimes, intellectual property crime, a sale of illegal articles, online gambling, and cyberstalking.... The concept of crime is not much different than cybercrime except the distinction between the use of a digital computer as an object and subject of conduct amounting to a crime.... yber-crime demote to all the activities done with criminal purpose on the internet or in cyber-space....
12 Pages (3000 words) Essay

Criminal Justice: Cyber Crime Investigation

The author states that cybercrime and its investigation process area necessity in today's time....
13 Pages (3250 words) Research Paper

Do You Think Internet Security Is a Threat to Developing Countries

The Internet has reached developing countries, but the governance and security mechanism has not been equally implemented across each individual country.... "Do You Think Internet security Is a Threat to Developing Countries" paper argues that developing nations need to take key measures in the use of ICT and technology to enable users (organization, youth, and adults) to navigate and browse through the internet without fear of insecurity.... Internet use is a crucial factor for human, social, and economic development around the world, but the developing countries may not be able to utilize the full potential due to several factors that affect privacy, trust, the security of systems, and consumer protection on these countries' end....
6 Pages (1500 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us