Sign In
Not register? Register Now!
Pages:
10 pages/≈2750 words
Sources:
31 Sources
Style:
Harvard
Subject:
Technology
Type:
Essay
Language:
English (U.K.)
Document:
MS Word
Date:
Total cost:
$ 60.75
Topic:

Major Security Issues in E-commerce

Essay Instructions:
Dear Sir/Madam Please follow these instruction when you making the the assay. The dead line for on the first of May 2016 Best Regards What to submit Research question and Methodology. -Hand in maximum of three A4 pages Management report -Hand in maximum of 2500 word report (in the case of a practical realisation, such as a system design, the expectation word count will be significantly less than this) Detailed specification of work 1.An original question about e-business that would be worth further research -This section is concerned only with defining the problem/.question. -Include a short paragraph that explains why it is interesting and a page of plan / research method that shows how your question could be answered. -Your idea can be interesting for its own sake – pure research. Or it might be useful to a specified organisation – applied research. 2.A report to a senior manager of a real organisation on one of the following (80% of total). Or propose a topic of your own – but get my approval for it before you start work. Clearly identify which option you are answering. Research Method. Lab or Field Studies, Case Studies, Surveys, Grounded Research. Outline Marking Scheme To help you pick a topic suitable for the coursework, first, choose a scenario type from the options below: a. Analysis and critical evaluation of current e-business strategy and activities. (There must already be some significant e-business activity.) - You decide how to carry out the appraisal, using your own selection or those techniques taught on the module. b. Proposal and justification for a systems architecture to support e-business. (The organisation must have little or no significant e-business activity now). - Summarise the applications that are needed. - Outline their interfaces with each other, and any necessary standards. - Explain how the applications differ from current systems. - Identify the benefits and how they will be measured. c. Migration plan to develop e-business capability from scratch. (The organisation must have little or no significant e-business activity now.) - Identify impacts on the organisation and changes to infrastructure. - Identify major benefits, with suggestions for how to measure them. - Identify major risks, with strategies to avoid or minimise them. d. High level design for a completely new e-business application. (Must be relevant to the needs of the organisation and not closely based on any existing system.) - Explain the need and justify the design decisions in a brief report. - Design to include systems architecture, functional requirements, technical interface requirements, data storage requirements and sample user interfaces. - May consist mainly of diagrams and models. e. Proposal and justification for an e-business strategy. (The organisation must have little or no significant e-business activity now.) - Outline the strategy and summarise the main changes expected in the organisation. - Implementation plan should show how the changes will be achieved. - Identify the benefits and explain how they can be measured. Once you have made your choice of topic type, progress to the report, which will contain the following two sections, addressing the specified components in the marking scheme. 1. Research questions will be marked mainly for:- - Originality and interest of the question. - Feasibility of the outline plan / research methodology. 2. The management report will be marked for its:- - Factual basis. - Overall coherence. - Analytical depth, logical argument, critical questioning of others (including published sources). - Originality of thought, synthesis, new ideas and insights Edit Order Submit Choose Files Additional files DateFile name Preferred writer for your order
Essay Sample Content Preview:
Major Security Issues in E-Commerce Name Course Instructor Date Explanation and method and research plan There is concern that the e-commerce platforms are susceptible to fraud and abuse in various ways. Organization increasingly relies on the e-commerce option to improve sales, but fraud increases the risk of financial loss, while the vendor’s perceived honesty and trustworthiness affects relations with customers (Connolly & Bannister, 2007, p. 109). At other times, theft of private and confidential, information has the potential to destroy organizations. This may include the organization’s trade secrets, marketing information and worryingly customer information. Disclosing the confidential information to third parties places the organization at a disadvantage, and in many cases, it is not possible to undo all the damages after a breach of e-commerce security system. Major retailers have adapted to changes in the market by leveraging the use of e-commerce platforms to improve sales as online shopping is convenient and there is timely delivery (Canadean Company Reports, 2014, p. 23). Tesco has adapted to the public needs, focusing on the bank, super market, manufacturers and entertainment segments besides the retailer section. Despite being successful with e-commerce where shoppers have the option to purchase 24/7, there are security concerns on using e-commerce. For people who do not have the time to walk through the stores, the e-commerce platform provides an opportunity to shop and compare prices. The ability of sellers to connect with the shoppers is vital to creating awareness and reaching out to the potential buyers. Tesco relies on low prices compared to other retailers, with the multi-channel approach being vital to success in the past, but there is increased competition from other retailers (Lwason, 2014). Leveraging e-commerce has the potential to improve the retailer’s outcomes, but online sales are increasingly cannibalising store sales (Askew, 2014). Even as people increasingly use the internet to shop fewer of the potential buyers prefer to purchase online. There is realization that cyber security threats are greater more than ever before, and require coordinated response from governments and the private sector (Sproule, 2016, p. 73). One of the major reasons for this is that there are security concerns, while even the internet users do not necessarily trust the website information (Zhao, Truell, Alexander, & Woosley, 2011, p. 43). In many cases, stealing information and breach of privacy is undetectable. In any case, electronic eavesdropping increases poses a risk to internet users and organizations using e-commerce as they are not sure about the identity of users. Management report Privacy protection Privacy protection is the primary concern for organizations as they seek to meet customer needs and securing their identity. The risk of identity theft affects the company’s ability to build mutual trust with customers (Chen, & Chang, 2013, p. 356). Security breaches have negatively affected the customers’ perceptions about the retailer, and while legislations have been vital to prosecuting and improving security, it is up to the IT staff to address the concerns (Berendt, Günther, & Spiekermann, 2...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

👀 Other Visitors are Viewing These Harvard Essay Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!