E-commerce: Security and Privacy As the evolution of the internet and purchasing online becomes popular, so do the security factors that contribute to the ways of eliminating fraud, theft, and acquiring personal information. E-commerce has created many new ways for customers to make payments including e-cash, e-cheques, and e-wallets. In the 21st century, many organizations worked hard at securing communications and payments made through e-commerce transactions. In doing so, customers would be able to feel a sense of trust, confidence and assurance that their information is safe. Many technological developments are being tested and today even implemented through that very system, of e-payments.
Because of this, companies have begun monitoring not only emails that employees send, but the websites they visit. Is this ethical? Some would say yes. A company has to protect its name and assets. The business arena is just for that…business.
It is at this stage of sampling that ethical skills and sensitivity are required. The potential participants should be informed the aim of the study, what their participation entails, the nature of being volunteers, and the protection of their anonymity to help them give an informed consent to participate in the study. Researchers who obtain data from people are expected to maintain high ethical standards both during their research and data sharing. If researchers pay attention, even confidential research data can be shared safely. The important aspects of ethical data sharing can be achieved by gaining informed consent, by anonymizing data, by controlling data access, and by applying for an appropriate license.
Because the relationship is more extensive, every time there is an exchange of information or data, it must be meticulously tracked and labeled as general business or confidential as appropriate (Dada, 2004). B2B merchants must prevent unauthorized access to customer information on their Web sites, and protect the privacy of... ... middle of paper ... ...relationships can grow. This is especially important to companies that conduct part or all their business on the internet no matter which of those two types of clients they serve. It is especially important that building this environment of trust online include a thorough knowledge of the laws, regulations and ethical factors that affect a particular company's ability to serve the needs of its customers. .
Internet cookies are extremely valuable to consumers and website operators alike, despite concerns that they threaten web users’ personal privacy. Without cookies, the Internet would be slower, the electronic marketplace, a difficult place to navigate and the entire online experience frustrating. The Internet Alliance urges lawmakers not to regulate cookies but to work with industry to address the underlying issues: privacy and security. Together we must alert consumers on how to use technology and common sense to protect their own personal privacy online. First, it is important to understand what cookies are and how they benefit the web browser.
E-Commerce facilitates buying, selling or exchanging products, services and information through internet. E-Commerce has also significantly changed the marketing strategies of several companies, especially in the context of exports. According to Gregory et al. (2007), internal e-commerce drivers including product online transferability and external e-commerce drivers including e-commerce infrastructure and demand for e-commerce, have shaped the export marketing strategy of several companies. Product transferability indicates the extent to which a product can be digitized for transfer over the internet (Gregory et al., 2007).
This quote sums up the importance of verifying a candidate’s risk level prior to hiring. An organization’s information assets are critical to the organization’s operation and security. In addition to validating a candidate’s legitimacy, the interviewers and hiring managers must be careful to not divulge too much information during the hiring process that may put the organization’s syst... ... middle of paper ... ...cess, information security must be continuously communicated to employees through standard communication channels as well as ongoing training. By using these tools, an organization can prevent the hire of potential threats to its information and physical assets. Human Resources Security (ISO 8) - Information Security Guide - Internet2 Wiki.
The actions provided in the article went against both the ACM and IEEE codes of ethics. Also the issues of privacy and intellectual property were clearly a damage for many businesses. New technologies should be developed to help prevent cyber-hacking. A better cyber-security should be set in businesses worldwide. This will benefit both the users and the owners.
While the objective is to stop current complications and thwart off future impediments, transparency will aid in maintaining the integrity of the business and help preserve consumer loyalty. Accomplishing such a surmountable commission is achieved through the use of effective communication, methods, and channels. Upon recognition of the crisis, the fundamental mechanisms of the effective communication, go into production. With the crisis recognized there are soundings from the alarm too, “notify senior administrators of the situation” (Hicks & Nicols, 2012, p. 127). As a result of an alarm sounding, the business must construct a team of principal participants that will be responsible for handling the crisis.