StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Implementing Digital Signature Technology - Essay Example

Cite this document
Summary
The essay "Implementing Digital Signature Technology" focuses on the critical analysis of the major issues in the implementation of digital signature technology. Internet technologies have become essential in almost every walk of life and corporations now understand the value of the Internet…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER99% of users find it useful
Implementing Digital Signature Technology
Read Text Preview

Extract of sample "Implementing Digital Signature Technology"

Download file to see previous pages

The business sector is by no means an exemption from internet mania. Since, with time, the online business is turning out to be an exhortation. The online business means that people can purchase and pay from home and even while sitting in their bedroom through an internet-equipped PC or laptop. The global wave of information technologies (ITs) development and implementation has turned out to be a driving force in approximately every part of the human job. In this scenario, the internet that is a main element of this global wave has been transformed into a double-edged weapon providing a lot of opportunities, facilities, tools, and capabilities to individuals and corporations, on the other hand as well bringing with it a considerably increased information security and privacy risks (Salifu, 2008). As electronic methods of business expand rapidly throughout the world, security and integrity concerns turn out to be sensitive. Moreover, at present, customer satisfaction and trust in Internet transactions and the security measures implemented by online businesses are considered to be insignificant and perhaps the main limit in the acceptance of Internet business practices (Dandapani, 2008).

Electronic commerce or e-commerce refers to conducting both internal and external business activities over the Internet, intranets, and extranets. In addition, e-commerce consists of the selling and buying of services, products, and goods, the transfer of funds, and the simplification of everyday business activities through communications. Since e-commerce encompasses so many critical activities, thus customers’ and venders’ trust is a critical factor of successful e-commerce (Lumsden & MacKay, 2006; Whitten et al., 2000, p.23; Laudon & Laudon, 1999, p.25). Convenience and simplicity are the key reasons why more and more people like to adopt and use e-commerce and avoid traditional business practices. Since, the use of the Internet is growing in the USA, rapidly. Thus, organizations also like to present the option of online business for the reason that they can save on service costs. On the other hand, throughout the attractiveness of e-commerce or internet business, almost 2 million U.S. citizens experienced deceptive business activities in 2004. And this figure further rose in the next years. Furthermore, several market researchers outlined that the ratio of frauds is increasing in Internet banking (Spam Laws, 2009). Thus, there was a need to develop some security measures to avoid internet fraud and digital signature is one of the best tools to help provide information privacy.

The vendors and customers equally understand the value, handiness, usefulness, and low expenditure of carrying out business activities over the Internet. Additionally, e-commerce is rapidly improving or substituting other ways of usual business activities in both business-to-consumer and business-to-business transactions and communications. By using the facilities of e-commerce, individuals and corporations can buy office supplies, airline tickets, and sports memorabilia devoid of human communication. In addition, the customer frequently takes delivery of the ordered products within 24 hours. Thus, with the development of technology, the sheer amount of such business dealings as well augments radically. Moreover, up till now, U.S. e-commerce has reached up to $5 trillion this year. Also, corporations and individuals, whether playing the role of the purchaser, vendor, or any other associated role, require protecting their interests (e.g. data and information) in these electronic commerce communications. In this scenario, customary agreement law undoubtedly offered the measures that were essential to designate a written agreement and to implement its conditions. However, the emergence of the technology (e-commerce) has created a lot of lawful challenges about when an electronic signature is fulfilled the customers need to “sign on the dotted line” to stand for the reception of the agreement conditions. President Clinton signed the electronic signatures in the Global and National Commerce Act (E-Sign) on 30 June 2000. Thus, the e-sign offers electronic signatures the equal official rank as signatures and contracts written on paper that an agreement cannot be canceled for the reason that the signatures were sent electronically. Moreover, the e-sign also defends customers in opposition to some of the risks of electronic commerce (Edward H. Freeman, 2004; Downing, 2001).

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Digital signatures Essay Example | Topics and Well Written Essays - 5500 words”, n.d.)
Retrieved from https://studentshare.org/miscellaneous/1565288-digital-signatures
(Digital Signatures Essay Example | Topics and Well Written Essays - 5500 Words)
https://studentshare.org/miscellaneous/1565288-digital-signatures.
“Digital Signatures Essay Example | Topics and Well Written Essays - 5500 Words”, n.d. https://studentshare.org/miscellaneous/1565288-digital-signatures.
  • Cited: 0 times

CHECK THESE SAMPLES OF Implementing Digital Signature Technology

Security of Digital Signatures

ntroduction and HistoryEven today, where every technology interrelated to Information technology involves the '.... Extensive use of computing technology has aid different scale organizations to achieve targets.... The paper "Security of digital Signatures" deals with digital signatures, as they are considered to be addressing integrity, confidentiality, and non-repudiation of data exchanged digitally, the history of cryptography as the first concept that derived digital signatures and encryption algorithms....
14 Pages (3500 words) Literature review

Combining Anomaly and Signature based Intrusion Detection Systems

At the hub, of this rebellion is technology.... technology has moved from the "back office" to the leading edge.... Increasingly, technology is shifting the organization's associations with its customers from a "face-to-face" to a "screen-to-face" communication.... The study demonstrates the functionality of Anomaly and signature-based IDS along with its advantages and disadvantages where applicable.... Bayesian Algorithm with KDD99 was implemented for anomaly-based IDS and integrated multi-layer signature-based intrusion detection system using mobile agents were implemented....
8 Pages (2000 words) Essay

Application of Hashing Algorithms

For instance, these algorithms are extensively used to attain reliability and validity, authenticating users of computer systems, implementing efficient digital signatures, putting into practice pseudo-random number generators, implementing digital time stamping, creating session keys, and some time for building block ciphers as well.... Additionally, the same hash value can be used in the calculation in order to find two different inputs; for that reason, the hashing algorithms are used to determine the reliability and effectiveness of data (comprising digital signatures, authentication, and so on)....
11 Pages (2750 words) Essay

Survey on Security in Electronic Voting Systems

This paper ''Survey on Security in Electronic Voting Systems'' tells that The Article on E-Voting using Double-Blind Identity-Based Encryption explains a model that uses double-blind encryption based on the user identity.... The model is explained as an extension of the blind IBE schemes.... ... ...
8 Pages (2000 words) Essay

Analysis of the Economy as Relevant to the Axon Company

The author states that Axonglobal uses SAP as their strategic enterprise platform and cater to firms in providing business solutions.... Hence, the prospect for the industry is very bright while Axonglobal holds a good market position having global operations.... .... ... ... Thus the environment in which Axonglobal operates is promising on the one hand but is bound by strict regulations on the other....
8 Pages (2000 words) Case Study

Hardware Secutiry Module Optimization

The definition of a centralized signature service was initiated in 2014.... The framework incorporates six service providers who offered to construct signature services.... The approval of these signature services must pass a practical examination process governed by the e-ID board....
30 Pages (7500 words) Essay

Effect of Software Technology and Electronic Transactions

The following paper 'Effect of Software technology and Electronic Transactions' looks at electronic commerce, which is essentially global in character.... E-commerce and online transactions are made possible through the application of software technology.... ... ...
8 Pages (2000 words) Assignment

E-Commerce Law in the United Kingdom

A few of these measures are the digital signature and security devices.... The present essay "E-Commerce Law in the United Kingdom" dwells on the rules of e-market functioning in the UK.... As the author puts it, the buying and selling of goods and services, by means of the internet, is termed as electronic commerce or e-commerce....
8 Pages (2000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us