Facebook Pixel Code
x
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

E-commerce Essay Example

This is a preview of the 12-page document
Read full text

Thus with the traditional security issues related to the fraud and theft the use of e-commerce is observed nowadays to become a platform wherein consumer security and privacy is largely compromised. Data integrity is observed to be at stake owing to the rise of insecurity related to conducting of transactions in the e-commerce sites. Intrusion of Viruses and Trojan horse attacks creates potential disruption in the activities conducted along the e-commerce plane. The above featured problems along the e-commerce plane thereby affect the efficacy of the system and make it vulnerable to external attacks and growth of malicious activities (Marchany & Tront, 2002).Khusial and McKegney (2005) reflect on the different security issues affecting the e-commerce activities on a global plane. One of the most common security attacks countered by the users of the e-commerce sites is referred to as social engineering. Through the use of the social engineering techniques hackers’ endeavor on retrieving the personal information of the users relating to passwords and also of other data related to registration and authentication information of the users to different sites. Illegitimate sites are created by the hackers to help retrieve the personal information of the users which are then used for manipulation purposes. Further different tools like SATAN are used by hackers to generate entry into the personal computers of the users which in turn contributes in gaining confidential information like passwords to different potential sites. Similarly other types of security problems occur related to sniffing activities such that the credit card number of the users or customers is hacked through the monitoring of data related to transactions carried out between the user’s computer and that of the shopper’s server. Existence of unencrypted information relating to the transactions carried out in a wireless hub is prone to such attacks. Other types of attacks carried out by the hacker relate to making the server computer attack prone through the mode of exhausting its capacity to conduct a number of mundane and useless tasks (Khusial & McKegney, 2005).Niranjanamurthy and Chahar (2013) identify virus and Trojan horse attacks as the most vulnerable security threats that tend to affect the activities conducted along the e-commerce plane. The intrusion of Trojan horse

This is a preview of the 12-page document
Open full text

References

Ackerman, M. S., & Davis, D. T. (n.d.). Privacy and Security Issues in E-Commerce. Retrieved July 26, 2014, from University of California: http://econ.ucsb.edu/~doug/245a/Papers/ECommerce%20Privacy.pdf

Ackerman and Davis (n.d.) point out the different types of technological remedies that are generated to render effective security to the users in the e-commerce plane.

Campbell, J. B. (2002). Introduction to Remote Sensing. United States : CRC Press.

Campbell (2002) reflects on the concept and uses of random and stratified random sampling.

Collins, H. (2010). Creative Research: The Theory and Practice of Research for the Creative Industries. United States : AVA Publishing.

Collins (2010) reflects on the different types of research methods like secondary and primary research activity and their potential advantages.

Goertz, G., & Mahoney, J. (2012). A Tale of Two Cultures: Qualitative and Quantitative Research in the Social Sciences. United States : Princeton University Press.

Goertz and Mahoney (2012) discriminate relating to the use of qualitative and quantitative research methodology and the advantages gained pertaining to such.

Khosrowpour, M. (2004). E-commerce Security: Advice from Experts. United States : Idea Group Inc (IGI).

Khosrowpour (2004) reflects on the impacts of security problems on e-commerce activity and the remedies that are generated to counter such.

Khusial, D., & McKegney, R. (2005, April 13). e-Commerce security: Attacks and preventive strategies. Retrieved July 26, 2014, from IBM: http://www.ibm.com/developerworks/library/co-0504_mckegney/

Khusial and McKegney (2005) also reflect on the different types of security problems in e-commerce and the preventive strategies that can be generated to help in countering such.

Marchany, R. C., & Tront, J. G. (2002). E-Commerce Security Issues. Proceedings of the 35th Hawaii International Conference on System Sciences, (pp. 1-9). Hawaii.

Marchany and Tront (2002) reflect on the different types of e-commerce security issues that were discussed in the 35th Hawaii International Conference on System Sciences and tend to impact the activities conducted in the e-comerce environemnt.

Meng, X. (2009). Study on Protection Measures of People’s Information Privacy right in E-commerce. Proceedings of the Second Symposium International Computer Science and Computational Technology, (pp. 483-487). Guangzhou.

Meng (2009) reflects on a set of best practices that need to be carried out by the staffs operating in the e-commerce environment to generate needed security.

Niranjanamurthy, M., & Chahar, D. (2013). The study of E-Commerce Security Issues and Solutions. International Journal of Advanced Research in Computer and Communication Engineering , 2885-2895.

Niranjanamurthy and Chahar (2013) reflect on the different types of security issues that emerge relating to the e-commerce paradigm and the solutions that can be genearted regarding such.

Qin, Z. (2010). Introduction to E-commerce. Germany: Springer Science & Business Media.

Qin (2010) reflects on the different types of regulatory and legislative policies that are taken to enhance the security of the people conducting activities in the e-commerce paradigm.

Smith, G. E. (2004). Control and Security of E-Commerce. United Kingdom: John Wiley and Sons.

Smith (2004) reflects on the issue of digital signatures and biometrics like thumbprint and scanning of retina as effective security control elements relating to security problems in e-commerce.

Woodside, A. G. (2010). Case Study Research: Theory, Methods, Practice. United States : Emerald Group Publishing.

Woodside (2010) reflects on the advantages and significance of case study based research.

Close ✕
Tracy Smith Editor&Proofreader
Expert in: Business, Macro & Microeconomics, Management
Hire an Editor
Matt Hamilton Writer
Expert in: Business, Marketing, E-Commerce
Hire a Writer
preview essay on E-commerce
WE CAN HELP TO FIND AN ESSAYDidn't find an essay?

Please type your essay title, choose your document type, enter your email and we send you essay samples

Contact Us