Research Methods 3
E-business is an issue that has been extremely popular for the past couple of years; after introduction of the internet, many corporations were undecided on whether to use the opportunity. However, this concept has slowly been accepted and many companies are using the opportunity to expand the popularity of their brands. However, E-business has a couple of challenges that need to be tackled in order to make internet business safe and reliable. The following research proposal will look into the possible methods of investigating into the vulnerability of consumers of online products.
Many corporations have gone online to market and sell their products and consumers are increasingly engaging in E-business. Business has shifted from the traditional over-the-shelf method to the contemporary internet based businesses, with consumers and companies communicating and carrying out transactions online. This has however created an opportunity for hackers and other online criminals who create replicas of genuine websites by altering a single digit for hosting to be possible; these fraudsters have managed to rip off unsuspecting consumers of their money pretending to be the genuine companies. Hacking of credit card details online and taking massive cash from the consumers illegally using rogue technology, creates a question of how vulnerable the consumers are and the amount of personal information the consumers should provide to avoid this vice from taking place.
Research Questions and Objectives
The following research is meant to develop an understanding on the level of vulnerability of online consumers. In addition, the research is meant to rate the level of preparedness of online consumers and the information they already have concerning the trend. The research will therefore evaluate the intensity of online theft and ascertain whether the consumers are keen enough when making online transactions.
The literature that will be used is online articles and sites that have been developed by individuals who have either fallen victim of online theft, or who have witnessed the vice being perpetrated. Over the past few years, individuals have lost millions of cash through online criminals, most of who pose as the real organizations. One of the major difference that makes the consumers confused is the dot org (.org), dot com (.com), dot net (.net), and others belonging to states and institutions. Since most companies use the dot com and the dot org, the online thieves create a replica of a web site and they advertise all kinds of products similar to the original company (Identity Theft Technology Council, 2005).
When the customer makes a request to purchase a certain product, the fake companies mostly ask for payments to be made immediately and provide certain conditions. Hackers may even ask the customer to provide his or her bank details upon which all the money is transferred to...