Sample Essay on:
Issues in e-Commerce

Here is the synopsis of our sample research paper on Issues in e-Commerce . Have the paper e-mailed to you 24/7/365.

Essay / Research Paper Abstract

This 10 page paper discusses five issues that are of importance in e-commerce: security; identity theft; legal issues such as copyrights; cross-border problems; and market valuation. Bibliography lists 12 sources.

Page Count:

10 pages (~225 words per page)

File: D0_HVecmiss.rtf

Buy This Term Paper »

 

Unformatted sample text from the term paper:

importance: security, identity theft, legal issues; multi-state and multi-national issues; and valuation (intellectual property vs. brick and mortar assets). Each one, if not addressed, can cause significant problems for the e-commerce business. Security in this area includes such components and viruses, hacking, sitejacking and so on. It also must include such things as consumer uneasiness about providing personal information over the Internet. Concerns about the loss of personal information may not be as serious as feared, because e-commerce sites provide secure measures on order forms, etc. However, other security threats exist to the industry itself. Technically, "every possible type of cyber-attack has some possible bearing on a customer-facing e-commerce sites operations: A saturation-bombing denial-of-service attack might degrade system performance, shifting business to other service providers" (Coffee, 2003, p. 59). A rival might conduct a "passive snoop" of the site, gathering information on the "origins, times and amounts of transactions" processed there (Coffee, 2003, p. 59). This would tell it which of the sites promotional campaigns have been the most successful (Coffee, 2003). There is always the possibility that hackers could get into the site and access consumers records, creating "severe privacy implications as well as creating opportunities for fraud" (Coffee, 2003, p. 59). IT security professionals must take a "comprehensive view of threats both inside and outside the direct control of the enterprise" (Coffee, 2003, p. 59). Coffee suggests developing the relationships and partnerships necessary "to achieve security end to end rather than merely edge to edge" (Coffee, 2003, p. 59). He also reminds readers that when an attacker cant succeed using technology, he will try to trick his victims instead: "For example, any number of scams display great success in getting people to disclose credit card numbers and other key data to persons who pretend to be legitimate customer ...

Search and Find Your Term Paper On-Line

Can't locate a sample research paper?
Try searching again:

Can't find the perfect research paper? Order a Custom Written Term Paper Now