StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

E-Commerce Insider Threats - Research Paper Example

Cite this document
Summary
At the present, every business implements the techniques of e-commerce for getting more income and gaining competitive edge. Although, the implementation of e-commerce brings a lot of benefits to the…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.7% of users find it useful
E-Commerce Insider Threats
Read Text Preview

Extract of sample "E-Commerce Insider Threats"

Download file to see previous pages

In addition, a major element of the problem appears from poor systems engineering of networks and software. However, to effectively deal with these imprecision and ambiguities in the business information system there is need to minimize the system loop holes and problems regarding the effective management and operational handling. Furthermore, the management of the business information security and operations has turned out to be a main task in business. This paper presents a detailed analysis of the current state of insider threats to computer systems and infrastructure in terms of numbers, costs and potential problems.

The main intention of this research is offer a comprehensive overview of the different insider threats to computer systems for E-Commerce. Shaw, Ruby, & M. (1998) outlined that the ideal business information systems protection besides all outer and inner threats is not possible. The main difficulty of monitoring against the business information security threats has been an important aspect of the literature, and business information system development (Shaw, Ruby, & M., 1998). However, the main problem is the inherent complexity of the business systems.

Thus, here are problems in terms of some recognized techniques offering business impressions that are not practical solutions. In this case more and more challenges are coming out in form of virus and worms (Graham, 2005). Cho, Chang, Kim, & Choi (2003) stated that in this new age of information corporations are completely dependent upon the complex information systems. In addition, these systems are in a greater danger in terms of vulnerability of systems to computer information security and crime attacks.

Thus, the high-tech environment and technological experts are needed to develop, manage, and maintain these business information systems (Cho, Chang, Kim, & Choi, 2003). According to (Shaw,

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“E-Commerce Insider Threats Research Paper Example | Topics and Well Written Essays - 1000 words”, n.d.)
Retrieved from https://studentshare.org/miscellaneous/1562924-e-commerce-insider-threats
(E-Commerce Insider Threats Research Paper Example | Topics and Well Written Essays - 1000 Words)
https://studentshare.org/miscellaneous/1562924-e-commerce-insider-threats.
“E-Commerce Insider Threats Research Paper Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/miscellaneous/1562924-e-commerce-insider-threats.
  • Cited: 0 times

CHECK THESE SAMPLES OF E-Commerce Insider Threats

Information Security

However, the possession of complete information is considered to be an incomplete victory if it is not protected in an effective manner against prevailing threats and vulnerabilities.... threats and Vulnerabilities There are numerous types of threats and vulnerabilities that are required to be considered for the protection of information.... Outside sources of threats and vulnerabilities include denial of service (DOS) attack, virus and worms attacks....
3 Pages (750 words) Research Paper

IT Security Threats and Countermeasures

This paper ''IT Security threats and Countermeasures'' discusses that IT security has become one of the inevitable expenses for any organization or individual since it threatens the integrity, confidentiality, and availability of their computing resources and data.... Alongside all the advantages of IT, there exists an appalling consequence that compels the organizations to invest hefty amounts- IT security threats.... This paper shall discuss the most commonly witnessed IT security threats, along with the countermeasures that are used to safeguard data and systems....
8 Pages (2000 words) Literature review

The Windows Blind E-Commerce Website

This paper "The Windows Blind e-commerce Website" describes the e-commerce site with three users with different privileges.... In the situation analysis, we look at the target market of the eCommerce website and how the website is going to help them automate their transactions....
8 Pages (2000 words) Speech or Presentation

E-Commerce in the Life of Qatari Women

The negative factors on the other hand appeared in the form of security threats.... e-commerce in the life of Qatari Women Introduction With the arrival of the 21st century, the global business scenario has experienced a drastic shift in terms of the market dynamics.... One of the dimensions of IT is e-commerce and it acts as a tool that facilitates online business.... Before getting further deeper into the study, a brief overview of e-commerce is presented below....
8 Pages (2000 words) Research Paper

The Strategic Implication of E Commerce for the Design and Construction Industry Article Analysis

The article "The Strategic Implication of Ecommerce for the Design and Construction Industry" is analyzed in this report to evaluate different aspects of the research approach as well as concepts and principles related to the application of e-commerce in the AEC industry… The construction industry could perform generic benchmarking into the Indian e-commerce model to find solution applied earlier in this fast-track innovation nation to then apply the knowledge to perform continuous improvement in its e-commerce platforms for both businesses to customer and business to business e-commerce transactions The main research question which is being asked by the authors of the article by Johnson and his colleagues is if the AEC industry can benefit itself and integrate e-commerce platforms into the business plans and strategic objectives of the enterprise....
4 Pages (1000 words) Essay

Security Issues in E-commerce

This knowledge may help one know whether they could be targeted and therefore take precautions to ensure their site is safe from potential threats.... This papper ''Security Issues in e-commerce'' tells that Since the birth of the internet two decades ago, new possibilities have been created for entrepreneurs to make money online.... Benefits that e-commerce can bring to Small Companies Small firms seek to venture into eCommerce with the main aim of increasing revenue through reaching new markets and winning more clients....
5 Pages (1250 words) Essay

The Term Knowledge Worker in The Context of Todays Business World

The aim of the essay "The Term Knowledge Worker in The Context of Today's Business World" defines the nature of the knowledge worker in the business.... Furthermore, the essay would provide an investigation of the contributions of average knowledge worker effectively for the company.... hellip; A Knowledge Worker is a person who contributes to the work environment through his or knowledge as a multi-subject matter specialist....
12 Pages (3000 words) Essay

Information Technology Security Management and Its Impact on Business Success

Literature review: This will describe in detail about secure network infrastructure for e-commerce and information security management.... Justification: This will describe the reason why it is important for an organization to have a secure network infrastructure for e-commerce strategies....
12 Pages (3000 words) Thesis
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us