The paper "Virtual Business" is an outstanding example of a business essay. The virtual business has enjoyed a considerable share of the boundary-less-ness that has promised significant advantage for online shoppers. Nevertheless, the increased usage of virtual business has impacted – to a certain degree – consumer rights, the confidentiality of data and consumer privacy. Existing anxieties have resulted in the digital divide that has appreciably affected policy creation regarding pertinent privacy issues. The increased internet usage, notably Information Communication Technologies, has shaped a number of attributes in e-business. Although its introduction has been met by an amalgamation of pessimism and optimism, it is anticipated that a proffered approach to legislation consolidates these relevant issues.
The increased use poses a significant threat to the users that are dependent on it (Andoh-Baidoo, 2010). In this regard, this paper seeks critically to evaluate the legislative implications affected by security and market attributes of internet usage. The paper draws upon divergent views and empirical findings that pertain to consumer privacy and affiliated issues. Whether e-commerce has brought considerable advantages, or augmented business penetration, divergent issues have affected its viability.
Arguably, its implication in making a proffered decision that pertains to legislative concerns is questioned. Introducing a new approach to e-business has in most cases questioned concerns of privacy and commercial laws. Virtual spaces have offered autonomous shopping, where shoppers can conveniently shop. However such improvements have raised security concerns. The privacy laws are relevant in addressing key issues that pertain to the less noisy environment – where the regulations are not limited to managerial implications. Consumer rights and confidentiality of data have been considerably impacted in varying degrees.
Evidently, e-commerce has presented the need to submit personalized data that increases their susceptibility to fraudulent activities. Arguably, commercial laws have questionable attributes that fail to addresses the need for consumer protection. These laws need to be designed to address such imperative issues.
Drori, S., 2010. Globalization and Technology Divides: Bifurcation of Policy between the
‘‘Digital Divide’’ and the ‘‘Innovation Divide.Sociological Inquiry, Vol. 80, No. 1, 63-91.
Goldsmith, J., & Hathaway, M., 2010. The cyber security changes we need. The Washington Post.Accessed at
Federal Trade Commission, 2011. Consumer Sentinel network data book for January–December
2010. Accessed at:
Heinonen, J., Holt, T., & Wilson, J., 2012. Product Counterfeits in the Online Environment: An
Empirical Assessment of Victimization and Reporting Characteristics.International Criminal Justice Review 22: 353
Stein, J., 2012. CIA’s secret fear: high-tech border checks will blow spies’ cover. 12 April.
Perkins, R., and Neumayer, E., 2011. Is the Internet Really New After All? The Determinants of
Telecommunications Diffusion in Historical Perspective.The Professional Geographer, 63(1), 55–72.
Quigley, K., Roy, J., 2011. Cyber-Security and Risk Management in an Interoperable World: An
Examination of Government Action In North America. Social Science Computer Review, 30: 83.
Whitley, E., &Hosein, G., 2010. Global Challenges for Identity Policies. Basingstoke: Palgrave