Nobody downloaded yet

Technological Alternatives For Solving E-Commerce Security Problem - Term Paper Example

Comments (0) Cite this document
Summary
This research paper is about e-commerce security. It also describes four technological alternatives for solving this problem as well as a review and comparative analysis of what the literature says about the alternatives. It gives a recommendation that is justified through comparative analysis…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER93.5% of users find it useful
Technological Alternatives For Solving E-Commerce Security Problem
Read TextPreview

Extract of sample "Technological Alternatives For Solving E-Commerce Security Problem"

Download file to see previous pages For a company to realize the maximum benefits of e-commerce it must invest in the technology and workforce (Chan, Lee, & Dillon, 2001). In e-commerce, the buyer gets all information concerning the goods and services he wants to purchase. 
Security is the biggest problem that businesses are facing in e-commerce on a global scale. This is because the internet there is no one to either control or manage the internet thus posing a wide range of threats and risks. According to Miller (2002), a large number of internet fraud that media reports, theft of identity and the compromise of banking and online transaction systems have made customers be much reluctant to embrace new transaction technology. This is the key challenge that faces many organizations conducting their businesses using e-commerce. The authorities must put all measures in place to increase levels of security in order to restore the confidence of customers.
In e-commerce, the attacker can besiege the operators and their resources with various damaging schemes that result in the exploitation of a system. When addressing vulnerabilities and threats in e-commerce, one considers integrity, availability, and confidentiality of the system. The vulnerability that exists in the system of e-commerce makes it easier for attackers to hack the system because they use them as entry points to make manipulations. The attackers normally attack major websites that conduct e-commerce and hence obtain sensitive information. System hackers find it easy to attack e-commerce web sites because the developers producing e-commerce software are similar to those from other developers so they find it easier to make their manipulations. ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Technological Alternatives For Solving E-Commerce Security Problem Term Paper, n.d.)
Technological Alternatives For Solving E-Commerce Security Problem Term Paper. Retrieved from https://studentshare.org/information-technology/1757769-business-technology-analysis-paper
(Technological Alternatives For Solving E-Commerce Security Problem Term Paper)
Technological Alternatives For Solving E-Commerce Security Problem Term Paper. https://studentshare.org/information-technology/1757769-business-technology-analysis-paper.
“Technological Alternatives For Solving E-Commerce Security Problem Term Paper”, n.d. https://studentshare.org/information-technology/1757769-business-technology-analysis-paper.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Technological Alternatives For Solving E-Commerce Security Problem

Transaction Security in E-commerce

... Id # Transaction Security in E-commerce Introduction E-commerce refers to the business deals between organizations and individuals carried out through the digital technologies. Normally, it is acknowledged as the Internet-based electronic commerce. According to this scenario, e-commerce offers numerous benefits for businesses to carry out business activities on the Internet (Qi and McGilligan). E-commerce has been offering to the worldwide economy very much, all through the past decade, as more companies and corporate owners and entrepreneurs have started building their own web based Business Empire. In view of the fact that the Internet carries on to grow, and more and more people began to utilize the Internet for a wide variety... of...
10 Pages(2500 words)Research Paper

E-commerce

...-Commerce on the management of organizations It is important to understand that security is not only about technology. The security of e-commerce activities ultimately reflects through proper decision making and management of the organization. The primary essence of the management in any organization is decision making. Managers are constantly required to evaluate between multiple alternatives and chose the one most suited for the moment. Like the way there are multiple managerial styles, the decision making styles in the organization may also vary. Managers are required to deal with various risks, uncertainties evaluate...
12 Pages(3000 words)Essay

E-commerce: VOIP Security

...?E-commerce: VOIP Security Introduction VoIP refers to the abbreviation of voice Over Internet Protocol. This terminology refers to the communicationtechnology used for transimitting sound signals via the internet. The voice in this case becomes converted into binary form in order to be relayed digitally through the internet. Due to the security implication of transmitting data via the internet, the data (binary) can be encoded on transmission and decoded on retrieval. The use of cryptography in this case tries to prevent eavesdropping by unwelcome parties.Even with the use of cryptography to protect calls; hijacking of calls also proves to be a major threat. This can be done by diverting the direction of the call. A person... with the...
18 Pages(4500 words)Essay

Problem solving

...? SMOKING Institute Smoking Smoking has become a global issue and it is one of the major causes for many health problems and deaths around theglobe. Cigarettes alone are responsible for the waste of more human lives than collective danger of alcohol, accidents, suicidal crimes, AIDS and illegal drugs. Despite of these facts, 21% of adults, 22% of high school students and 8% of middle school students smoke. One in five of all deaths every year in the United States have been credited to smoking, killing more than AIDS, suicide, alcohol, car accidents, homicide, and illegal drugs combined (Smith et al 2004). Smoking is badly affecting the society and steps need to be taken to solve this...
2 Pages(500 words)Essay

E-commerce Security

...card numbers, and session identities among other customer information to avoid information manipulation. The security measures taken by the company include a 3-tier modular architecture, validation routines, open source cryptographic standards usage as well as practices of secure coding (Nick, 2010). Competitive advantage the technology gives the GAP Company The competitive advantage that GAP Company gets from technology include; access to massive market, marketing sales online, easy processing of transactions, and ease of handling and shipping services and products. These will ensure the company makes good sales and treats their customers well. Barriers in global...
5 Pages(1250 words)Assignment

E-Commerce and IT Security

...life at such a level that the warnings on the risks from its extensive use are ignored – like in the case of ‘electrosensitivity’ a health problem related with the use of mobile phone (Rubin et al., 2008, p.1). On the other hand, even in cases that rules were set for the use of mobile phone (for instance, when driving) these rules were not applied (Walsh et al., 2008, p.1893). Current paper examines key points on the use and the advances of mobile phones, e-commerce and IT-security aiming to explain their development internationally. 2. Mobile phones – key advances and limitations 2.1. Airtexting Airtexting offers the ability to communicate ‘in silence’ – i.e. without...
10 Pages(2500 words)Essay

Problem solving

...ACUPUNCTURE AS AN ALTERNATIVE MEDICAL PRACTICE Acupuncture as an Alternative Medical Practice ………. ……………… Unit …., Semester………, Academic Level………. Name of the professor…….. Date of Submission………………….. Health care is one of the fundamental issues in the contemporary society. Though conventional medicine has dominated the global healthcare system, alternative medical practices have also played a significant role in the health sector and cannot be ignored. There are many such practices, but the paper will examine acupuncture. Acupuncture is one of the major traditional Chinese medical practices, and it involves a myriad of techniques where particular body parts are stimulated and are aimed...
1 Pages(250 words)Essay

Problem Solving

...Problem Solving Problem Solving A Problems is defined as a conflict that needs to be solved or found a solution . This is done in a sequence of procedures that involve breaking down the main problem into more digestible subproblems that are easy to understand and which will help the person arrive at the most appropriate conclusions on the possible solution(s) to that problem. Problems are made up of many small problems and arise in every aspect of life thus the need to find the ultimate solution to solve them is essential. Therefore, to come up with...
5 Pages(1250 words)Research Paper

Problem solving

...Problem Solving: Software Piracy Affiliation: Q5: Software Piracy Piracy is a challenge and problem to software developers and organizations as well. Software piracy is such a problem that companies are unwilling to buy software from independent developers as these are considered fraudsters who sell part of a software code and retain some accessibility rights. While development and consumption of software continues to increase as technology becomes more of a business essential, organizations are finding it difficult to cope with the threat and challenge of piracy. In order for organizations to mitigate the problem, new software protection...
1 Pages(250 words)Essay

Problem Solving

...Management Problem Solving Musa Module Module ID: Part One Problem identification and description: Two of the software programmes had been bought and installed for recording the attendance of the students and staff members appeared to be corrupted only one month after its successful functioning. It also affected the communication between the management, and the performance of teachers regarding regularity and punctuality could not be monitored. Consequently, the data could not demonstrate any record of the arrival of students and teachers in the school, which created great concerns of the administration and staff alike subsequent to the problem, appeared because of...
7 Pages(1750 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Term Paper on topic Technological Alternatives For Solving E-Commerce Security Problem for FREE!

Contact Us