Thursday, October 17, 2019
A proposal for an e-business venture Assignment Example | Topics and Well Written Essays - 750 words
A proposal for an e-business venture - Assignment Example Different types of operational issues like growth of phishing activities by hackers and also in the number of fraudulent transactions carried out on the e-commerce platform happen to generate greater risks to the conducting of the e-commerce business. Failure in enhancing data integrity and security in information sharing activities along the e-commerce platform generates effective risk to the e-commerce company (Nastase and Nastase, 2007). The functions of e-commerce companies also run effective technical risk owing to the growth of intrusion of malicious software like Trojan horses; virus attacks and also being affected by worms and activities of hackers that tend to affect both the software and hardware components. Similarly the growth of fraudulent activities and errors also relate to technical risks of the e-commerce site (Sukumar & Edgar, 2009). The management of the above risks entail the use of surveys to identify and evaluate the different types of risks related to e-commerce along with their potential of affecting the present state of activities. It also requires potential communication among interested parties and stakeholders relating to the identification of the different risks. This contributes in generating needed awareness about the risks and thereby in planning effective strategies related to designing of security and authentication tools to help in mitigating the same (Jaffe, 2000). E-commerce business operates based on the gathering of confidential information related to consumers. The e-commerce companies are thus required to act as effective custodians of the personal information generated by the customers through working on the dimensions of internal controls. Ethical and privacy concerns related to e-commerce pertain to the sharing and publication of confidential information of the consumers without the prior consent. Confidential information of consumers shared with third party may also amount to the fraudulent use of such in
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.