Thursday, April 25, 2019
A proposal for an e-business venture Assignment Example | Topics and Well Written Essays - 750 words
A proposal for an e-business jeopardise - Assignment ExampleDifferent types of operational issues like growth of phishing activities by hackers and excessively in the bod of fraudulent transactions carried out on the e-commerce platform happen to generate greater jeopardys to the conducting of the e-commerce business. Failure in enhancing data integrity and credentials in culture sharing activities along the e-commerce platform generates effective risk to the e-commerce company (Nastase and Nastase, 2007).The functions of e-commerce companies also run effective technical risk owing to the growth of intrusion of cattish software like Trojan horses virus attacks and also being touched by worms and activities of hackers that tend to affect both the software and hardware components. Similarly the growth of fraudulent activities and errors also relate to technical risks of the e-commerce lay (Sukumar & Edgar, 2009).The management of the above risks entail the use of surveys to id entify and evaluate the different types of risks related to e-commerce along with their emf of affecting the present state of activities. It also requires potential communication among interested parties and stakeholders relating to the identification of the different risks. This contributes in generating needed awareness about the risks and thereby in planning effective strategies related to designing of security and authentication tools to help in mitigating the same (Jaffe, 2000).E-commerce business operates based on the gathering of confidential information related to consumers. The e-commerce companies are thus required to act as effective custodians of the personal information generated by the customers through working on the dimensions of internal controls. Ethical and privacy concerns related to e-commerce pertain to the sharing and emergence of confidential information of the consumers without the prior consent. Confidential information of consumers shared with third part y may also amount to the fraudulent use of such in
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.