The purpose of this paper is to discuss internet security and privacy, as it relates to e-business. The topics that will be covered are the following; the benefits and consequences of using an open environment and an overly secure environment. What is meant by this two terms as well as why they are important to e-business? The last topics that will be discussed are the legal and ethical issues surrounding the handling of personal information.
An open environment as it relates to e-business is an environment that exists where commerce can be conducted without obstruction where anyone can have access. The internet is one such open environment for e-commerce (e-commerce is the business of buying and selling done electronically instead of physical exchanges). The advantages or benefits of using open environment (meaning site that uses minimal or no security measures) are; the site is easier to use, anyone can browse the site, and it cost less to operate. An open environment allows the user access without having to register or take the time to login. Anyone can see the site and pay for items much faster; than sites that require the user to login. This may make it easier to navigate. The site is less expensive to operate, because the owner is not paying for extra security measures that include encryption programs for personal and payment information, and third party fees to companies such as PayPal for handling the payment process (Brenner, n.d)
The problems or consequences that can occur when using an open environment can include hackers that can get into the system and steal information, such as social security numbers, and banking information examples are credit and debit card numbers leading to identity theft. There are other problems that could arise causing damage to the system, like cyber-attacks an example would be malware, this is malicious software that includes spyware, and computer viruses gets into a computer or network without the...
References: Antonopoulos, A. (2011, May 11). Can we have too much security? Information retrieved online December 11, 2012. http://www.networkworld.com/columnists/2011/053111-andreas.html
Better Business Bureau, (n.d). Data security guide. Information retrieved online. December 11, 2012. http://www.bbb.org/data-security/intro-to-small-businesses/
Brenner, L, (n.d). Advantages and disadvantages of doing e-commerce on an insecure environment. Online article retrieved December 11, 2012. http://smallbusiness.chron.com/advantages-disadvantages-doing-ecommerce-business-insecure-environment-10209.html
GPO. (n.d). Electronic code or federal regulations. Information retrieved online. December 11, 2012. http://www.ecfr.gov/cgi-bin/text-idx?c=ecfr&SID=636cbcb63dd25d85afab80ce0f5817ed&rgn=div5&view=text&node=16:188.8.131.52.80&idno=16#16:184.108.40.206.220.127.116.11.
Swain, B (2009). What are malware, viruses, spyware, and cookies, and what differentiates them? Online article retrieved December 11, 2012. http://www.symantec.com/connect/articles/what-are-malware-viruses-spyware-and-cookies-and-what-differentiates-them
Technical Knowledge- Security. (n.d). Information retrieved online. December 11, 2012. http://www.ecommerceprogram.com/ecommerce/Ebusiness-Tech-Security.asp
Westfall, J. (n.d). Privacy: electronic information and the individual. Online article retrieved December 11, 2012. http://www.scu.edu/ethics/publications/submitted/westfall/privacy.html
Please join StudyMode to read the full document