StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Privacy and Security in E-Commerce - Assignment Example

Cite this document
Summary
This essay discusses that security of credit card information and personal information of customers has become a great concern to participants of e-commerce business. Increased number of customers begins to fear for the threat of losing money when making purchases and payments online…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.6% of users find it useful
Privacy and Security in E-Commerce
Read Text Preview

Extract of sample "Privacy and Security in E-Commerce"

 Privacy and Security in e-Commerce Security of credit card information and personal information of customers has become a great concern to participants of e-commerce business. Increased number of customers begins to fear for the threat of losing money when making purchases and payments online. E-commerce operations take place in an environment that is faced by both ethical and legal threats. Hackers and crackers have become a hindrance in executing transactions safely online (Becker, 2008). Open environment is one that allows customers to transact business with the organizations without having login or password that enhances the security of the information passed between the customer and the business (McCarthy, Campbell & Brownstein, 2001). An overly secure environment looks into the security of the transaction by creating passwords and logins in order to ensure privacy and confidentiality of the details of the transactions. In cases where e-commerce involves financila transactions, the risk of loss of money becomes high hence making security issues key in e-commerce. However, both an open and overly secure environments have both advantages and disadvantages. There are various advantages of conducting business in open environments. First, users will not require login and passwords in order to navigate on the websites. Paying for items or making orders will not require one to give login for identification purposes. This makes the process easy and faster compared to a secure environment where login is required. The graphical user interface of open environments are simpler and easy to use hence cause customer satisfaction and convenience (Becker, 2008). Cost advantage also arises in an open environment. There is no cost involved in developing a secure environment thereby reducing the need to engage experts in developing the site. The costs of hosting such a website is also lower compared to that of an overly security environment which requires shrewd experts to develop. However, cost may arise where customers sue the business for protection purposes. On the other hand, browsing in an insecure open environment is characterized by various drawbacks. To begin with, the computers can be hacked thus infringing on private information. This may make the future transactions insecure and further cause loss of resources. Moreover, it would be easier to get computer virus attacks, which could stall operations and further cause loss of data that may be expensive to acquire. In addition, a company can be faced by innumerable cases from customers for violation of privacy. Because of the multiple suits, the company risks spending colossal amounts in compensating the customers. In instances that the transactions involve payment of money or transfers of money, open environments are inappropriate because unauthorized third parties might access the customers’ private information. There are cases in which customers have been defrauded money hence causing panic and financial losses to the parties. If this happens, the customers’ confidence and trust is lost hence making open environments riskier and disadvantageous. Similar to open environment, an overly secure environment also has several advantages and drawbacks. On the side of the advantages, overly secure environment makes customers feel secure therefore promoting online sales. The high number of sales increases the revenues and reduces transaction cost associated with physical transactions. The businesses in ensuring security further achieves their fiduciary obligations of making their customers secure and hence get shielded from legal cases that may arise. A feeling of security encourages repeat purchases. Secondly, overly secure environment ensures that the business information is protected from hackers and crackers. When online purchases are made in an open environment, the business equipments and information will remain confidential from being stolen. Businesses that work in open environment normally lose information from crackers and in extreme cases lose resources through cyber crime. Whereas, an overlay environment is advantages, it also has several disadvantages. First, the cost of developing a secure website and maintaining such an environment require enormous resources. Money will be required in employing servers and internet experts to continuously monitor the security of the system. This will reduce the profit margin of the business and increase maintenance costs. In addition, transacting in a secure environment needs time and may sometimes be complex for some customers. Overly security environment requires customers to recall their personal login information, employs the use of firewalls and data encryption. Many customers are not well conversant with these concepts. This would make them frustrated in doing transactions hence reducing their loyalty to the business. The time required in loading customer information and in navigating through the site will be increased. In conducting business online, businesses are faced with various legal and ethical issues with regard to the private information of customers. Customers have the constitutional right of having their personal information remaining private and confidential (Salehnia, 2002). In executing their transactions online, the businesses have the mandate of ensuring that customers’ personal information e.g. the account balances, and other private information is not exposed to the business. Businesses should therefore prevent the customers from having their information accessed by hackers and crackers who can utilize the information for malicious intent. Additionally, the businesses have the ethical obligation of making their customers information remaining confidential. There are personal information that should only remain known by only the business and the customers (Tavani, 2004). protection of the websites when navigating must therefore be guaranteed by the business that expects to survive in the online retailing. Legal issues further remain a factor that influences e-business operations. Governments have the obligations of ensuring that their customers are protected from illegal malpractices of businesses (Salehnia, 2002). In doing so, the governments formulate rules and regulations that will ensure that the fundamental rights of consumers are protected. Some of the rights that must be addresses by the governments include the right to accessing right information, confidentiality of customers, protection of customers from fraud and protecting businesses from protection of copyrights and patents. In pursuing this mandate, businesses operations may be affected negatively or positively. Assessing the impacts of legislations on e-business operations therefore remain a key factor in ensuring success (Salehnia, 2002). E-businesses have the obligation of protecting the customers from fraud and potential losses of resources. They also have the challenge of keeping their operational costs low to make profits. However, the cost of maintaining customers through ensuring the security of their information override that of keeping low the costs of maintenance and operation. It is therefore crucial that businesses in doing their day-to-day operation. Maintains a tradeoff of cost reduction and security enhancement of their customers. Customers who feel secure in conducting their businesses online will guarantee the long-term survival and profitability of the business. E-businesses must further remain committed to ensuring adherence to legal and ethical standards that are set to regulate their operations. References Becker, S. A. (2008). Electronic Commerce Concepts, Methodologies, Tools and Applications. Hershey, Pa.: IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA). McCarthy, M. P., Campbell, S., & Brownstein, R. (2001). Security Transformation: Digital Defense Strategies to Protect your Company's Reputation and Market Share. New York: McGraw-Hill. Salehnia, A. (2002). Ethical Issues of Information Systems. Hershey, PA: IRM Press. Tavani, H. T. (2004). Ethics and Technology: Ethical Issues in an Age of Information and Communication Technology. Hoboken, NJ: Wiley. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Privacy and Security in E-Commerce Assignment Example | Topics and Well Written Essays - 1000 words”, n.d.)
Retrieved de https://studentshare.org/e-commerce/1449949-one-of-the-most-important-issues-concerning-e
(Privacy and Security in E-Commerce Assignment Example | Topics and Well Written Essays - 1000 Words)
https://studentshare.org/e-commerce/1449949-one-of-the-most-important-issues-concerning-e.
“Privacy and Security in E-Commerce Assignment Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/e-commerce/1449949-one-of-the-most-important-issues-concerning-e.
  • Cited: 0 times

CHECK THESE SAMPLES OF Privacy and Security in E-Commerce

E-commerce Transactions Scare Customers

Hence, it is imperative to understand the effect of correctional methods that are needed to counter the challenges of Privacy and Security in E-Commerce.... Research Question As businesses, around the world, are still trying hard to find a perfect solution to the above-stated problem, the proposed research question for this paper would be: “What steps companies should take, in e-commerce, to ally the fears of customers regarding reuse of their personal information?...
5 Pages (1250 words) Research Proposal

Information Technology and Electronic Commerce

The review-highlighted aspects of consumer privacy, security aspects of people who use online services and conduct online transactions along with some steps that are required to make the negative impacts of e-commerce eliminated.... Background researches and studies have tried to enhance security but it is still the biggest challenge for security professionals and business.... Passports with Hidden security Chip …….... Background researches and studies have tried to enhance security but it is still the biggest challenge for security professionals and business....
26 Pages (6500 words) Essay

E-commerce security and fraud protection

The increased use of mobile devices has even further complicated security provision in e-commerce.... The increase in cyber crime has also seen an increase in security threats in e-commerce.... According to Mohapatra (2013), amounts reported globally, largely from frauds and hacking in e-commerce, stand at over $ 388 billion per year.... This has however been noted to be the least secure technique in e-commerce because of the threat of guessing, eavesdropping, external disclosure, host compromise and replay attacks (Schneider, 2011)....
7 Pages (1750 words) Term Paper

Privacy in Electronic Commerce

In the process, the competitive advantage available at the disposal of firms and individuals has widened drastically, completely transforming the conventional business practices giving rise to various issues related to data protection and security.... hellip; There has been a steady rise in the scope and use of e-commerce over the years, leading to significant changes in various spheres of our day to day lives.... The present research paper "privacy in Electronic Commerce" is focused on the technological revolution that spearheaded by the invention of the internet, and the subsequent development of electronic commerce has posed a significant threat to the conventional methods of business....
16 Pages (4000 words) Research Paper

Security of Credit Card Information and Personal Information

In cases where e-commerce involves financila transactions, the risk of loss of money becomes high hence making security issues key in e-commerce.... An overly secure environment looks into the security of the transaction by creating passwords and logins in order to ensure privacy and confidentiality of the details of the transactions.... e-commerce… Hackers and crackers have become a hindrance in executing transactions safely online (Becker, 2008)....
4 Pages (1000 words) Assignment

E-Commerce: Security and Privacy Issues

However, the most important area of vulnerability in e-commerce business is web-based payment.... This paper presents a detailed analysis of the security and privacy issues in the case of an e-commerce scenario.... In addition, the research presents a comprehensive overview of some of the main security and privacy-related issues those could make the e-commerce less secure business platform.... nbsp; … This section covers the analysis of some of the main vulnerabilities regarding e-commerce security....
11 Pages (2750 words) Research Paper

Security and Trust in E-business

From the paper "Security and Trust in E-business" it is clear that the online users become victims as they are not aware of the authenticity of e-commerce based websites.... security seals add credibility to a website so that the users can see how the company is managing user information.... The home office in the UK has redesigned passports with features including a hidden security chip and the section containing personal information incorporates holograms....
29 Pages (7250 words) Research Paper

The Role of E-Commerce in Information Technology

"The Role of e-commerce in Information Technology" paper defines fundamental aspects related to advantages, security concerns, firewall usage, and social and ethical variations in some business environments.... A lot of e-commerce applications have a short life thus success depends on numerous factors.... e-commerce is the most attractive trend of information technology which is adopted by a lot of organizations in order to run their businesses effectively....
17 Pages (4250 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us