Research In The Area Of Information Security At Corporate Websites Including The Role Of "Privacy Seals"

3857 words - 15 pages

Research in the area of Information Security at Corporate Websites including the role of "Privacy Seals"The moot question that needs to be answered before one starts the analysis of research in the area of web security is to gauge the importance of electronic commerce. Electronic Commerce has taken the world by storm and is perhaps the fastest growing frontiers in the business arena. The sheer statistics tells a story that is often untold and unseen. The concept of 'the world is a small family" and business and commerce is trans-national is no longer a myth but a stark reality.Here are a few numbers in support of the above statementThe number of internet users in 1998 was 160 million, in the year 2002 this number saw a mammoth increase and the new estimates are placed at 544 million in the year 2002. The Gartner Corporation estimated the size of the e-commerce market at about 7.3 billion dollars for the year 2004 as compared to the motley figure of 145 million dollars for the year 1999.Details referenced from "The impact of customer trust and perception of security control on the acceptance of electronic commerce"- Suh and Han]What role does the company's website play? From an advertiser's perspective, the importance of a website stems from the fact that it is often the last link in the hierarchy leading to the sale.[Source: "What do customer consider important in B2B websites"-]Having said all this we must add that E-commerce is still in the nascent stages primarily because of the consumer's primary concern about security and privacy on the internet. Suh and Han draw their conclusions based on the research they conducted. A web survey of 502 internet banking users was conducted by them Statistical analysis using the SEM model was usedOne of the key issues that were raised as part of this research is that most customers are reluctant to dole out information that contains sensitive details. Conformability level is much higher when it comes to the dissemination of general information. Drawbacks in the e-commerce internet and e-commerce security do exist but it has more to do with customer distrust of such measures. Publicity of much hyped security breaches like password security breach at Microsoft's Hotmail and the denial of the service attack at Amazon's homepage.Jenny C McCune has identified the following issues on privacy in her article "Big Brother is watching you". McCone is one of the prominent researchers in the area of Technology and has contemplated on various issues that relate to the area of e-business and e-commerce.*Spam or unwarranted e-mail that tends to clog the e-mail*Cookies that help the Websites track your computer and what you as a user is interested in*Often firewalls are breached and sensitive banking and other financial information is stolen and misused.*Data archival is perhaps one the greatest issues that haunt users of e-commerce. Often information that was earlier given might be used out of context at a later stage...

Find Another Essay On Research in the area of Information Security at Corporate Websites including the role of "Privacy Seals"

Major Privacy and Security Concerns at Southwest Airlines

803 words - 3 pages Southwest Airlines has to deal with one of the main privacy/security concerns that face the entire airline industry today, protection of customer information. This concern has really become an important issue since the airline industry began using E-Commerce to offer a convenient way to receive advertisement and make travel reservations over the Internet. Two notable incidents that concern privacy/security in the airline industry occurred with

An analysis of strategic role of information systems, specific social, ethical and legal issues, IT infrastructure and emerging technologies, and information systems security within FedEx Corporation

5469 words - 22 pages recommendations. Quantitative analysis has been conducted to do the systematic scientific research for the said purpose. Hence the data collected about FedEx and its management of IT was mainly based on the second sources such as the Internet, FedEx's corporate publications and websites, industry magazines, and newspapers. However, personal contacts was not adopted in this paper as it was unpractical for the author.First, strategic role can be seen

The Role of Trust in Internet Privacy

1112 words - 4 pages percent promised security; and 49 percent provided contact information. There is also the question of how much these privacy promises are enforced. In June 1998, AdAge.com had transferred user information—including log-on names and passwords—to theGlobe.com, an unrelated site. Registered AdAge.com users had no idea that the site had done so until they received an e-mail note that welcomed them to theGlobe.com and contained their AdAge.com passwords

This is a research paper on the history and career in the U.S. Navy SEALs including Bibliography

3467 words - 14 pages United States Navy SEALs: "The Only Easy Day Was Yesterday..."In a foreign embassy there are three American ambassadors that have been taken hostage by foreign rebels. Late in the night, dressed in solid black, a group of six men land on the roof of this same embassy. The roof area is secured, and two snipers are set to secure the perimeters and neutralize threats on surrounding buildings. The remaining four men enter the embassy through a top

THE EASE OF WEBSITES

1515 words - 6 pages . The use of payment options and the fact that all the sites are secure is a major plus knowing your financial information is not at risk. Below one will find the description of each company and the useful tools each website holds.Barnes & Noble, Inc. is one of the world's largest bookseller and a Fortune 500 company, which operates 792 bookstores in 50 states. For the fourth year in a row, the company is the nation's top bookseller brand, as

The Role of Ethics in Corporate Governance

1743 words - 7 pages JOHN WAMBUA NZIOKI UNIVERSITY OF MARYLAND UNIVERSITY COLLEGE FIN 610 SPRING 2014   Introduction This paper discusses the role of ethics in corporate governance. I seek to show the application of moral and ethical principles in corporate governance. Ethics is a topic that has generated a lot of interest in the last decade especially after high profile scandals. The failures of prominent companies such as WorldCom, Enron, Merrill lynch and

The Role of Broca’s Area in Language Processing

1108 words - 5 pages ) and Wernicke (1874), later extended by Lichtheim (1885). It implicated two brain regions involved in language production and comprehension - Broca’s area in the inferior frontal gyrus (IFG) and Wernicke’s area in the posterior superior temporal gyrus (pSTG), respectively. It suggested that Broca’s area stores motor representations of words while Wernicke’s area contains the information about what the words sound like as well as what their

Privacy of Personal Information on the Internet

2437 words - 10 pages February 2002. Peru in 2001 enacted a protection law covering credit-reporting agencies, and passes a new freedom of information law in 2002 [7]. Governments are also taking action to protect the right to privacy at the workplace. Finland and Russia in October 2001 signed a new labor code that includes the security of personal data. The UK also drafted a four part code on data protection at the workplace. How privacy laws collide with anti

Privacy of Personal Information on the Internet

2042 words - 8 pages operators, including internet access providers and almost any public or private institute, organization or company. The law also authorizes the search without warrant of any information system, provided that its data is accessible through a network from a computer being searched with a warrant. Workplace prohibited to access employee e-mail The French Supreme Court established that an employee has the right to privacy even at the workplace

The Role of Security Policy

1089 words - 4 pages security policies would state how the information must be protected. As the information in the systems change, the policies for the systems would also need to be updated to the information. Role of Employees Employees have a great role when it comes to working at companies and organizations to help protect information. The companies and organizations have employees in different sections completing different tasks. One section could work on the

Privacy in the Information Age

1007 words - 4 pages Notes: Watch for spelling and grammar errors. Privacy is something that is being lost today because of modern technological advancements. Too many individuals have access to other individuals' information. In today's technologically advancing world of information, employers are having a never-ending battle with their employees on how much privacy employees have and how much of that privacy the employers should have access to

Similar Essays

The Role Of Information Security Policy

941 words - 4 pages Implementation of policies and standards within an organization are important to maintain information systems security. Employees within an organization play a huge role in the effort to create, execute, and enforce a security policy. Every business requires a different strategy and approach to it's security policy, depending on their size and nature of business. Security Policies An organization's security policy describes the company's

The Role Of "White Hat" Hackers In Information Security

2076 words - 9 pages individuals doing this work are hired by consulting firms after learning their skills as unpaid hackers. In some cases, consultants are hired to test or to supplement the work of a firm’s computer security staff. In other cases, consultants are hired because a smaller company cannot afford to keep computer security personnel on their Information Services payroll. The firms providing security consulting services come from various segments of the

The Identification And Analysis Of Information System In The Business Enterprise At Each Management Level, The Suitability Of Information System For The Chosen Firm, The Security Of The Information...

3968 words - 16 pages REPORT INTRODUCTION: In this modern time, it is impossible to run a business without any information system. Whether the business is small or large, information system is very much needed for the survival of the business. This report will deal with the identification and analysis of information system in the business enterprise at each management level, the suitability of information system for the chosen firm, the security of the

Byod In The Enterprise And Health Organizations And  The Affection In Personal And Organizational Privacy Security Information

1413 words - 6 pages implement BYOD, organizations need to establish a chain of infrastructural systems for information and technological software to operate effectively and securely. In the meanwhile, privacy security issues emerge to the surface for both personal and organizational information. The utilization of BYOD increased sharply for all profit and non-for-profit organizations within the past few years. The data collected by Cisco company and The International