Here is the synopsis of our sample research paper on Issues in e-Commerce
. Have the paper e-mailed to you 24/7/365.
Essay / Research Paper Abstract
This 10 page paper discusses five issues that are of importance in e-commerce: security; identity theft; legal issues such as copyrights; cross-border problems; and market valuation. Bibliography lists 12 sources.
Page Count:
10 pages (~225 words per page)
File: D0_HVecmiss.rtf
Buy This Term Paper »
 
Unformatted sample text from the term paper:
importance: security, identity theft, legal issues; multi-state and multi-national issues; and valuation (intellectual property vs. brick and mortar assets). Each one, if not addressed, can cause significant problems for the
e-commerce business. Security in this area includes such components and viruses, hacking, sitejacking and so on. It also must include such things as consumer uneasiness about providing personal information over
the Internet. Concerns about the loss of personal information may not be as serious as feared, because e-commerce sites provide secure measures on order forms, etc. However, other security threats
exist to the industry itself. Technically, "every possible type of cyber-attack has some possible bearing on a customer-facing e-commerce sites operations: A saturation-bombing denial-of-service attack might degrade system performance, shifting
business to other service providers" (Coffee, 2003, p. 59). A rival might conduct a "passive snoop" of the site, gathering information on the "origins, times and amounts of transactions" processed
there (Coffee, 2003, p. 59). This would tell it which of the sites promotional campaigns have been the most successful (Coffee, 2003). There is always the possibility that hackers could
get into the site and access consumers records, creating "severe privacy implications as well as creating opportunities for fraud" (Coffee, 2003, p. 59). IT security professionals must take a "comprehensive
view of threats both inside and outside the direct control of the enterprise" (Coffee, 2003, p. 59). Coffee suggests developing the relationships and partnerships necessary "to achieve security end to
end rather than merely edge to edge" (Coffee, 2003, p. 59). He also reminds readers that when an attacker cant succeed using technology, he will try to trick his victims
instead: "For example, any number of scams display great success in getting people to disclose credit card numbers and other key data to persons who pretend to be legitimate customer
...