Verified Document

E-Commerce Security Measures The Internet Has Positively Essay

E-Commerce Security Measures The Internet has positively created new life in business commerce, through website development. It has also opened up a new way for criminals to steal secret data of businesses and information regarding clients' banks details and contacts. This has made customers to becoming rapidly more aware of the websites they visit and where they input their personal information to avoid fraud cases (Corr S. Pondent, 2009).

However, e-commerce security measures deal with issues such as protecting the integrity of the business network and its internal systems. Besides, it ensures that the customer's information is shielded from everybody else, and must not be open to alteration or tampering, whilst going through the process of authentication and receipt. This ensures that there are secure business transaction between the customer and the business (Randy C. Marchany, 2002).

E-commerce business has put in place several different security measures to protect customers and the business from fraud issues. Such measures are the installation of "Digital Signature" at the virtual storefront. This guarantees that there is digital information which tells clients about the type of security being used by the company. It's like hanging a certificate behind the counter in a physical store (Randy C. Marchany, 2002).

Digital signatures are a way for authenticating the sender and the receiver of information....

When making a transaction a client can ask for a password as a digital signature, to protect the identity and personal data. For example when buying certain product from Amazon.com or Newegg, there are certain boxes with jumbled letters and numbers which you are asked to copy in the box. That is used to verify who you are and to ensure that it's not an imposer who is trying to log in. You put a digital signature on your storefront. This helps customers to be confident that you are who you claim to be. This is a line of defense against being "conned" by would-be impostors, who just want access to your money (Avi Rushinek, Sara Rushinek, 2002).
A cryptographic securities protocol is another security measures being applied by the e-commerce. This operates at different layers of the computer system's communications protocol stack to provide another level of security for e-commerce systems. At the network access layer, a Point-to-Point-Tunneling Protocol (PPTP) could provide security, and at the transport layer, a Secure Sockets Layer (SSL) could help with communication security. There also are other protocols that operate at or above the application layer such as IPSec security protocol and TLS which protect data above the application layer (Randy C. Marchany, 2002).

The secure socket layer (SSL) is visible when the web page is closed or open lock. A client can click on the lock to view certificates and find out if the website…

Sources used in this document:
References

1. Corr S. Pondent, (2009). Security Techniques Used to Protect an E-Commerce System

2. Randy C. Marchany (2002) E-Commerce Security Issues

Proceedings of the 35th Hawaii International Conference on System Sciences

3. Avi Rushinek, Sara Rushinek (2002). E-commerce security measures are they worth it
Cite this Document:
Copy Bibliography Citation

Related Documents

Security Issues of Online Communities
Words: 15576 Length: 60 Document Type: Term Paper

This researcher rejects the existence of online communities because computer mediated group discussions cannot possibly meet this definition. Weinreich's view is that anyone with even a basic knowledge of sociology understands that information exchange in no way constitutes a community. For a cyber-place with an associated computer mediated group to be labeled as a virtual settlement it is necessary for it to meet a minimum set of conditions. These are:

Internet Changes Lives How the
Words: 4025 Length: 13 Document Type: Research Paper

Whereas adult obesity rates have always been present, they have never been so high. What is more worrisome is that youth is becoming increasingly obese. The American Heart & Stroke Association conducted a study, for instance, in which it found the following data to be true: "Among children ages 2 -- 19, about 1 in 3 are overweight and obese (BMI-for-age at or above the 85th percentile of the 2000

Security - Agip Kazakhstan North
Words: 14948 Length: 35 Document Type: Term Paper

They need to know what their responsibilities are not only as individuals but also as team members and corporate employees. David cites an excerpt from a corporate security document that illustrates his point: "A security policy serves many functions. It is a central document that describes in detail acceptable network activity and penalties for misuse. A security policy also provides a forum for identifying and clarifying security goals and

Mobile Services, Safety, Security, Usage
Words: 5950 Length: 22 Document Type: Research Proposal

Many researchers have conducted studies on many aspects of m-commerce and the use of mobile technology by consumers. deRuyter, Kleijnen, & Wetzels (2006) stated, "M-commerce has been heralded repeatedly as the new service frontier of the millennium. Present market reality, however, seems to be less optimistic, therefore, the current study explores the factors contributing to the adoption of mobile services in a context of wireless finance" (p. 206). Organization of

Customer Loyalty in E-Commerce Outlets
Words: 9393 Length: 34 Document Type: Term Paper

Much marketing research has been done on analysing customer behaviour and retention. As a consequence, it is crucial for online companies to create a loyal customer base, as well as to monitor the profitability of each segment (Reinartz and Kumar, 2002) Definition of customer e-loyalty Customer loyalty has been defined as "a deeply held commitment to re-buy or re-patronize a preferred product/service consistently in the future, thereby causing repetitive same-brand or

Business Continuity Planning
Words: 2508 Length: 7 Document Type: Term Paper

As a result the revenue generated from the business is mainly in the form of commission for them. In case of the web sites operated by United Airlines themselves, the services are owned by them and therefore, the revenue is direct. (Abdollahi & Leimstoll, 2011) Another model used is the advertising business model. According to this model, the UAL provides advertisement to the companies. These companies then broadcast the advertisements

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now