Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

Security Measures For E-Commerce Business

tag 4 Downloads9 Pages 2,225 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT

Question:

Discuss the following points..
 
• Evaluate security strategies of protecting consumers and businesses and identify the security measures to increase trust.

• Evaluate the extent to which the Internet aids modern working practices.

• Demonstrate a critical awareness of the scope of e-commerce and its security in business and its practical and commercial limitations?
 
 

Answer:

Introduction

Total earnings from e-commerce business had reached up to US $2.3 billion in the year 2002. The growth rate is expected to double up over the period of years.  Earnings through e-commerce didn’t slow down even during recession period, which was unlikely with the other industries. Quick information, secured product delivery system, discounted price for the products, and reliability of the online companies are some of the factors that has contributed towards the increase in the business. Security of the business and client information is still one of the major concerns that affect the business performance either directly or indirectly. E-commerce business house now concentrate on adopting better strategies for securing the business and client information from being hacked or used in an unauthorised manner (Bacharach et al., 2001).

Security measures

Online business is carried out through B2B and B2C methods. The security measures are an important factor through which the better strategies can be introduced by the companies to improve the security measures. The companies trading through online method, works towards developing trust with the clients willing to trade with the company. Security measures are associated with the steps followed for securing the data of the users who chose to share information with the company. Customers trading through the online method need to be protected and the corrective measures can be implemented. Security measures include analysing different factors like the system used, software, and policies.

The privacy policies include the below mentioned factors-

  1. Introduce an effective anti-virus system, through which the spams can be minimised.

  2. Ensure that the website is secured

  3. Promote the website and encourage the members to use the password protection system.

  4. Personal details of the clients are secured.
 

Trust is one of the important factors that contribute towards the successful business conduct and organising transactions. However the challenge exists with the process that is followed for authentication of the consumer identity, especially for the online transactions.

Security measures like protecting the confidential information of the clients like the credit and debit card details and other details of the buyers has to be evaluated and implemented in an effective method. Rules have been amended through the legislation and company policy process. Security measures are undertaken with the sole purpose of implementing the security safeguard methods for different information that is held by the company on behalf of the clients (Ben-Ner, and Putterman, 2002).

As per Bacharach and Gambetta (2001), it is essential for the management to evaluate the type of information that is being held by the company. Important and relevant details have to be evaluated as this will help the e-commerce business to retain the important information for the business. The value of the data regardless of the size and the nature has to be developed. Data can be classified into two different factors like the company information and client details. Company information includes details like financial information, strategic plan details, and employee information. Client details include the information like debit and credit card details, email address of the clients, and others. It also includes SSN numbers, telephone numbers, and addresses. The company cannot use the information for any other reason, otherwise permitted by the users.

As per Camp 2000, trust is an important factor for trading through the online method. There are different types of trusts like –

  1. Commercial

  2. Problem solving

  3. Informational

  4. Identify

  5. Knowledge

Trust is required for building business relationship with the clients and business associates. Security measures adopted by the companies have to be evaluated as this will minimise the occurrence of the cyber threat, which is one of the major concerns for online trading. However the challenge exists with the process that is adopted by the companies to implement the security measures for benefitting the companies and the clients. The trust and the security factor can be established which is one of the important tasks for the companies.  Different types of security measures include identifying the establishment process, third party certification method, and legal frameworks. The process includes providing assurance to the clients and other parties about the secured measures that would be followed for improving the security measures for protecting the information. This basically includes introducing security measures for protecting the details and other information through the online method. Importance has been given to the authentication method, through which the details of the customers, suppliers, and others can be identified and effective measures can be introduced (EC, 2010).

Security requirements

The security system is used for improving the security measure through Facebook and others needs to be improvised. Major issues are with the selection of the method that is considered to be efficient for improving the security on the online method. Different measures for the security method can be introduced like the Netscape and others. Such factor reduces uncertainty related to the security issues. Authentication method is a part of the policy process that has been drafted by the companies. It is necessary to test the method, as this will minimise the losses that is related to the security measures.

The verifier introduced by the company or the e-commerce business house enables the users to verify the requests for the verification code and other factors. This reduces the possibilities of dispute, which impacts the goodwill and the reputation of the company (Guerra, 2001).

 

Different methods for securing the information

As per a research it has been started that more than 70 per cent of the US online buyers fear about losing the data and other information to the unauthorised hackers. The process adopted by the companies to protect the information differs and it depends upon the type of information that is being shared between the company and the clients. For instance, Citibank has issued ‘virtual account numbers’ to the clients. Such a number is quite similar to the credit card details or numbers that is being provided to the clients for carrying out the individual transactions. Through this process, the information and the details of the clients is hidden from the seller.

Security measures for customers using the social media platform

Customers trading through online business houses are expected to share personal information like the email address, SSN number, debit or credit card details, and others. Such details are crucial for the users and it is the responsibility of the company to secure the details. In this process, it is essential to secure the information. Policy for securing the data of the consumers has to be introduced by the company. In this process, the strategies include authenticating the system used for securing the data and installing a better method for protecting the information. Customers need to have an option to share the details, unless the payment is done. Details of the customers cannot be shared by the company with any third party. Client’s permission is required for sharing the details with any third party. Identify of the clients has to be protected as unauthorised access can risk the business goodwill and security system. Emails and other information can be communicated with the clients after getting permission from the users.

 

Theory about data protection

As per the data protection theory, it is necessary to analyse the data and introduce the better methods to secure the content from unauthorised third party. This includes the format used for storing the information. Public or standard format like the HRML is used as one of the options. In the other option, the private proprietary format is used. Data located in one of the computer system can be used or accessed by the concerned authorities. The usage of the data can be restricted. However, the data accessibility is at a higher risk, when the accessibility is open due to many reasons. Thus, the distribution method for the standard format has to be adopted as this will secure the information. The users range from the clients and others who are associated with the company.

Data protection has been made mandatory as per the rules that have been framed by the authorities. The strategies adopted by the companies differ, but it is necessary to ensure that the right process and steps are followed for introducing the changes within the company. In this process, the challenges faced by the company and the process that is expected to be followed by the company for improving the performance has to be analysed.

The companies can install drivers on the path the data is taken into the hard disk drive to the browser. The driver has the ability to directly analyse the hard disk and analyse the encrypted data. Through this method, it is possible to analogues the challenges that are associated with the process data protection which is considered to be an important factor.  In order to improve the protection it is necessary to install data protection method, which will secure the data and introduce better security measures. The steps intended to be followed by the companies varies and there are lots of factors that can affect the performance (Latcovich and Smith, 2001)

 

Current problem

The other method is with the certification method that has been done through the third party or agent. In this method, the certification is being done through the rating system. Through such a process, other users would be able to judge the reliability of the website for carrying out the transactions or dealings with the company. Quality seals and trust marks for the website plays an important role in the business development and implementing effective strategies through which the changes can be introduced for improving the protection of the data from unauthorised hacking (Latcovich and Smith, 2001)

Some of the commonly used seals include VeriSign secure seal and Trustee Privacy mark. The prime objective for setting up of such certification is outlined for introducing the better methods for protecting the information. Such factors are expected to reduce the uncertainty that is basically caused due to the hacking of the information through the third party or someone who can impact the business. The benefits associated with the system lies with the process that is adopted for introducing the better methods through which the information about the clients can be shared in public. In other words, the amount of details can be controlled and evaluated as this can be shared with the third party. The test process can be introduced, as this will assure the company about the reliability of the data and other information that is considered to be essential for the successful business conduct. Consensus is required for carrying out the privacy issues, especially when the involuntary sampling method results unfavourably (Wallace, 2001).

Conclusion

The demand for e-commerce business has been on rise. This is one of the reasons; the companies intend to introduce better security measures through which the changes within the business performance and securing the information about the clients can be introduced. Through the process the challenges involved with the business execution and other factors can be analysed. In this process, the method that is intended to be followed by the company for improving the performance of the company and introducing better methods for securing the data has to be planned and introduce effectively by the company. The cost and the steps involved with the process have to be analysed and corrective steps needs to be introduced.

 

References      

Bacharach, M. O. L. and Gambetta, D. (2001), “Trust in Signs”, in Cook, K. (ed.), Trust and Social Structure, Russell Sage Foundation, NY, pp. 148-184

Bacharach, M. O. L., Guerra, G. A., and Zizzo, D. J. (2001), “Is Trust Self-Fulfilling? An Experimental Study”, University of Oxford, Department of Economics Discussion Paper 76

Ben-Ner, A. and Putterman, L. (2002), “Trust in the New Economy”, HRRI Working Paper 11-02, University of Minnesota, Industrial Relations Centre

Bochet, O., Page, T. and Putterman, L. (2002), “Cheap Talk and Punishment in Voluntary Contribution Experiments”, unpublished paper, Department of Economics, Brown University, Providence, RI

Camp, J. (2000), Trust and Risk in Internet Commerce, MIT Press, Cambridge MA

EC (2001), Communication on “Network and Information Security: Proposal for A European Policy Approach”, COM(2001)298. Available at https://eurlex.europa.eu/LexUriServ/site/en/com/2001/com2001_0298en01.pdf

EC (2010), “Proposal for a regulation concerning the European Network and Information Security Agency (ENISA)”. Available at https://eurlex.europa.eu/LexUriServ/LexUriServ.do?uri=COM:2010:0245:FI N:EN:PDF.

Guerra, G. A. (2001), “Certification Disclosure and Informational Efficiency: A Case for Ordered Ranking of Levels”, University of Oxford, Department of Economics Discussion Paper 6

Guerra, G. A. and Zizzo, D. J. (2003), “Trust Responsiveness and Beliefs”, Journal of Economic Behavior & Organization, forthcoming

Latcovich, S. and Smith, H. (2001), “Pricing, Sunk Costs, and Market Structure Online: Evidence from Book Retailing”, Oxford Review of Economic Policy 17, 217-234

Wallace, P. (2001), The Psychology of the Internet, Cambridge University Press, Cambridge

Zizzo, D. J. (2003), “Empirical Evidence on Interdependent Preferences: Nature or Nurture?”, Cambridge Journal of Economics, forthcoming

Answer
OR

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2016). Security Measures For E-Commerce Business. Retrieved from https://myassignmenthelp.com/free-samples/security-measures-for-e-commerce-business.

"Security Measures For E-Commerce Business." My Assignment Help, 2016, https://myassignmenthelp.com/free-samples/security-measures-for-e-commerce-business.

My Assignment Help (2016) Security Measures For E-Commerce Business [Online]. Available from: https://myassignmenthelp.com/free-samples/security-measures-for-e-commerce-business
[Accessed 10 December 2019].

My Assignment Help. 'Security Measures For E-Commerce Business' (My Assignment Help, 2016) <https://myassignmenthelp.com/free-samples/security-measures-for-e-commerce-business> accessed 10 December 2019.

My Assignment Help. Security Measures For E-Commerce Business [Internet]. My Assignment Help. 2016 [cited 10 December 2019]. Available from: https://myassignmenthelp.com/free-samples/security-measures-for-e-commerce-business.


Getting nightmare regarding pending chemistry assignment? Then it is high time you consider hiring chemistry assignment help service of MyAssigemnthelp.com. We at MyAssignmenthelp.com deliver quality subject specific assistance on more than 100+ subjects. For us, students' need is foremost, and we work round the clock to offer science, humanities and commerce assignment help. Among Commerce wing, our one of the most popular services is capital budgeting assignment help. In science segment, we have gained popularity with biology assignment help.

Latest Management Samples

CME101 Residential Construction For Concrete Floors

Download : 0 | Pages : 5

Answer: In situ reinforced concrete would have been preferred for this particular extension because it is normally known to be of high adaptability, resistance to fire, versatility and also resistant to corrosion. This means that it will have nearly negligible maintenance. Concrete floors Advantages Durability Concrete, generally speaking, is a greatly dependable and tough material. While wooden floors or dividers may spoil or break, concr...

Read More arrow

WEL 303A Human Rights And Social Advocacy

Download : 0 | Pages : 8

Answer: The constitutions of the majority of the countries of the world have provisions for various kinds of rights so as to offer the kind of opportunities to the individuals through which they can maximum their potentials (Cole, 2015). Keck and Sikkink (2014) are of the viewpoint that the human rights are the norms or the principles which describe a certain standard of human behavior and are regulated by the legal as well as the governmental...

Read More arrow

MGMT 231 A Report On Selling Philosophy For Restaurant Chain

Download : 0 | Pages : 4

Answer: Introduction This report intends to introduce a product idea for A & W Restaurant chain, as they want to add value to the target market and further enhance the customer base. In order to approach the newer customer base or add more significance to the product a simultaneous service will be launched too. Further, it will explain how this new product and linked service can be positioned in the market. A set of strategies will be con...

Read More arrow

FB659 International Finance For International Expansion

Download : 0 | Pages : 12

Answer: Introduction The purpose of designing this report is to develop theoretical knowledge about different concepts related to international expansion of a business. The organization that is chosen in this report is Wycombe Wanderers. This is a soccer club or football club of UK. This report will help to develop understanding about different methods that can be used by an organization in order to establish itself in the international marke...

Read More arrow

HI6006 Individual Student Assessment Details

Download : 0 | Pages : 6

Answer: Introduction Strategic management is important for the contemporary business organizations due to the reason that competition is high in the current time and effective strategic management strategies can help the organizations to stay ahead in the competition (Hill, Jones and Schilling 2014). However there are number of strategic management tools available for the business organizations and each of the organizations use different tool...

Read More arrow
Next
watch

Save Time & improve Grades

Just share your requirements and get customized solutions on time.

question
We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits

1,160,757

Orders

4.9/5

Overall Rating

5,050

Experts

Our Amazing Features

delivery

On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.

work

Plagiarism Free Work

Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.

time

24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.

subject

Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.

price

Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

154 Order Completed

97% Response Time

Harold Alderete

PhD in Economics

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

285 Order Completed

99% Response Time

Eugene Baranowski

MBA in Supply Chain

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

1592 Order Completed

96% Response Time

Jane Sima

Ph.D in Psychology with Specialization in Industrial-Organizational Psychology

Singapore, Singapore

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

755 Order Completed

95% Response Time

Douglas Cowley

Masters in Finance with Specialization in Audit

Wellington, New Zealand

Hire Me

FREE Tools

plagiarism

Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.

essay

Essay Typer

Get different kinds of essays typed in minutes with clicks.

edit

GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.

referencing

Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.

calculator

Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability

1

1

1

Your Approx Earning

Live Review

Our Mission Client Satisfaction

Thank you for the professional writing and the time-efficient. I would recommend to my friend for sure

flag

User Id: 349555 - 10 Dec 2019

Australia

student rating student rating student rating student rating student rating

It was very well written and a good assignment with the amount of time that was allotted.

flag

User Id: 235137 - 10 Dec 2019

Australia

student rating student rating student rating student rating student rating

DO NOT USE THIS COMPANY.... Hopeless, poor grammar and unable to meet brief. A week of arguing and finally redid work which was just as hopeless as first attempt.

flag

User Id: 303057 - 10 Dec 2019

Australia

student rating student rating student rating student rating student rating

The report was well written and helped me get the mark which I would have got If I had the time to do it. thank you for helping me pass the unit.

flag

User Id: 318318 - 10 Dec 2019

Australia

student rating student rating student rating student rating student rating
Have any Query?