Preview

E-Commerce Security Issues

Satisfactory Essays
Open Document
Open Document
435 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
E-Commerce Security Issues
Introduction:
As we all know, the Internet has changed drastically and has affected the entire world in numerous ways. Using the Internet as part of our everyday lives has become habitual and even a necessity. Sometimes we do not even think about what information we reveal about oneself on the Internet. Since the Internet is not regulated, it produces a large range of consequences and threats to the systems operating on it. Many of us use it to buy and sell goods and services over the World Wide Web. We order a piece of clothing or even buy and sell stocks. This is known as e-commerce and typically requires a payment processing system. Many applications of e-commerce are influencing trends and expectations for business over the Internet, including tailing, banking, online retailing, and online publishing. It has definitely exploded in the last ten years. It does have its advantages in that it presents open and simple communications on a universal basis. Making use of networks for on-line purchases and various transactions forms just a fraction of the development in global electronic commerce (e-commerce), which is truly an extensive use of information technologies by government and business. However, the public does remain cautious about security, privacy, and access costs. Therefore, the topics on this paper consist of business and consumer security issues.

Consumer credence:
Consumers have accepted the e-commerce business model less readily than its proponents originally expected. Even in product categories suitable for e-commerce, electronic shopping has developed only slowly. Several reasons might account for the slow uptake, including:
· Concerns about security. Many people will not use credit cards over the Internet due to concerns about theft and credit card fraud.
· Lack of instant gratification with most e-purchases (non-digital purchases). Much of a consumer's reward for purchasing a product lies in the instant gratification of using

You May Also Find These Documents Helpful

  • Better Essays

    E-commerce networks are prone to external attacks. They present large targets with valuable internal data, such as customer information, credit card numbers and bank accounts, supply chain information, pricing, and so on. They must allow legitimate, worldwide users to connect and interact with the network. Speed is a priority to end users, where long transaction times or slow site navigation will motivate them to move to a different vendor. Security is another priority. Customers must be assured that their privacy and confidential information will remain intact and guarded.…

    • 890 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    With the rapid growth of the internet commerce in recent years, established small businesses have been presented with a serious dilemma. On the one hand, they can stick with the business model that has worked for them in the past; or they can make the change to e-business.…

    • 474 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Schneider, G. (2015). Electronic Commerce (11th ed.). (A. Brodkin, Ed.) Stamford, CT, USA: Cengage Learning. Retrieved May 28, 2015, from www.cengage.com…

    • 1877 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    In this document I am going to explain the security issues that every e-commerce possible faces and how to overcome them.…

    • 646 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    There are many different business trends shaping e-commerce today. For one, ecommerce remains the fastest growing form of commerce when compared to physical retain store, services, and entertainment. Another trend is that the online demographics of shoppers broaden to match those of ordinary shoppers. Also, small businesses and entrepreneurs continue to flood through the e-commerce marketplace, often riding on the infrastructures created by industry giants and increasingly taking advantage of cloud-based computing resources. Lastly, pure e-commerce business models are refined further to achieve higher levels of profitability, whereas traditional retail brands use e-commerce to retain their dominant retail positions.…

    • 1925 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Secom Case Study

    • 996 Words
    • 4 Pages

    Recent years, the issue of personal information leaks over the internet is becoming fiercer. Incursions by outsiders, criminal acts of insiders, along with careless actions hurt both the information holders and the companies, since the latter might loss business accordingly. That’s why security issue, for both software and hard ware, is important for any online business.…

    • 996 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Schneider, G. (2004). Electronic commerce: the second wave. University of Phoenix Custom Edition e-text. Retrieved May 5, 2007, from University of Phoenix rEsource https://emapus,phoenix.edu/secure/resource/resource.asp…

    • 1309 Words
    • 6 Pages
    Good Essays
  • Better Essays

    Turban, E., King, D., & McKay, J., Marshall P., Lee, J., Vieland, D. (2008). Electronic Commerce: A Managerial Perspective (5th ed.). Upper Sadddle, NJ: Pearson Prentice…

    • 1415 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Security of transactions is critical in building the confidence of customers in a specified e-commerce site. This security depends heavily on an organization 's ability to ensure authenticity, availability, privacy, integrity and disruption of unwanted intrusions. Malicious program known as sniffer programs often disrupt the privacy transactions especially when one uses unauthorized networks. They are found at network connection end points. When transactions are carried out, confidentiality is necessary thus it requires removing of any data showing transaction paths. This has become a common problem in the e-commerce sites.…

    • 1233 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Sample Persuasive Message

    • 1317 Words
    • 6 Pages

    Turban, E., King, D., McKay, J., Marshall, P., Lee, J., & Viehland, D. (2008). Electronic Commerce 2008: A managerial perspective (5th Ed.) Upper Saddle River, NJ: Pearson Prentice Hall…

    • 1317 Words
    • 6 Pages
    Better Essays
  • Good Essays

    E-Commerce Security Risks

    • 429 Words
    • 2 Pages

    Some e-commerce merchants are hesitant to ship internationally because credit card companies cannot verify the addresses of international buyers. The risk for online merchants of shipping internationally is that they will be liable for everything they ship. If an international customer places an order and later disputes it, online merchants have no way to verify that the package was delivered and that the credit card holder is actually the person who placed the order.…

    • 429 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    There are many legal and regulatory issues that affect banking websites, trademark infringement, name changing and name stealing, protecting intellectual property, and advertising regulations as well as online crime and online warfare and terrorism. There are various legal, ethical, and regulatory issues that will be addressed in this paper and we will focus on the most important aspect and that is that e-business must comply with all of the same laws that other businesses.…

    • 1487 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    The internet has become a significant factor in the business world as all aspects of doing business have migrated to the internet. Where did the internet come from and who created it? The internet was first introduced to the world circa August 1991; the World Wide Web was made available to the general public by Tim Berners-Lee. Use of the internet grew exponentially from there giving everyone access to information across the globe. Access to the internet opened up many lucrative business ventures across the world. Unfortunately the web was not a perfect creation and soon there were people who realized that they could secretly access other users’ information and cause substantial damage to the system or the individual. This paper will examine some of the threats that are encountered by the Raldally Corporation during their business transactions on the internet and examine possible security solutions for the company. We will look at the viewpoints from the user…

    • 6123 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    As the evolution of the internet and purchasing online becomes popular, so do the security factors that contribute to the ways of eliminating fraud, theft, and acquiring personal information. E-commerce has created many new ways for customers to make payments including e-cash, e-cheques, and e-wallets. In the 21st century, many organizations worked hard at securing communications and payments made through e-commerce transactions. In doing so, customers would be able to feel a sense of trust, confidence and assurance that their information is safe. Many technological developments are being tested and today even implemented through that very system, of e-payments. Already being used today are smart-cards and e-wallets, which in fact work well at creating a safeguard for customers information. Customers now have the convenience of quick and more efficient ways of making transactions and saving data effortlessly with the click of a button. Authentication programs such as VeriSign Secure Site Program, allows one to learn more about web sites users visited before they submit any confidential information, in addition to permitting one to submit sensitive information like one's own credit card number. Such programs are being used on sites such as Ryerson's website, where students can make payments through the system where credit card information is used. Public key infrastructure and digital certificates help companies battle the wave of illegal activity and enhance the business models. Today many businesses are using firewalls as a way to add security to a network. Virtual Private Network allows users to gain secure access to its organizations network. Companies that have used these technologies are paving the way for future security methods. Encryption and decryption are always used whenever secure sites are accessed so that users that enter information can not be accessed by unauthorized people. 56 bit used before and the 128-bit encryption is becoming the…

    • 2213 Words
    • 9 Pages
    Good Essays
  • Powerful Essays

    Secure Electronic Transactions (SET) is an open protocol which has the potential to emerge as a dominant force in the securing of electronic transactions. Jointly developed by Visa and MasterCard, in conjunction with leading computer vendors such as IBM, SET is an open standard for protecting the privacy, and ensuring the authenticity, of electronic transactions. This is critical to the success of electronic commerce over the Internet; without privacy, consumer protection cannot be guaranteed, and without authentication, neither the merchant nor the consumer can be sure that valid transactions are being made.…

    • 1719 Words
    • 7 Pages
    Powerful Essays