Free Essay

Role of Etrust

In:

Submitted By chlorinecrazy
Words 920
Pages 4
ETrust

Trust is defined as the psychological status of willingness to depend on another person or organization. It is the single most important factor for confidence in secure information for the consumer; without trust, a business cannot profit from the consumer, and the consumer will be dissatisfied. ETrust defines what ordinary citizens both fear and desire: privacy and security. ETrust understands information needs of both consumers and businesses in key areas where consumers perceive the most risk in online transactions, which is the safety of their information. This makes the concept a valid and important one when it comes to the safety and security of all in every technological situation in which people share information. Computers have become very useful tools for communications, banking, shopping, entertainment, staying in touch with friends and family, and learning about any number of interesting topics. However, the internet has a dark side, and most people are completely unaware of the pitfalls which come with this relatively new and fascinating online world. Among the malicious intentions of those who would compromise a computer are those to gain access to personal data for identity theft, to use the computer to send spam or be used to attack other computers on the network, to use the computer to “hack” other computers as the act of juvenile mischief to wreak havoc. To help solve this security and privacy problem, online businesses have started to use information assurance as the ground stone for their online market. Information assurance is the protection of information systems against unauthorized access to or modification of information whether in storage, processing, or transit, and against the denial of service to authorized users, including those measures necessary to detect, document, and counter such threats. I think the best example of this concept is Bank of America. I use this bank to handle all of my finances, and have never felt a lack of privacy or security ever since they secured the website a few years ago. For example, the greeting on the webpage is one that assures confidentiality and company integrity. There are also are several forms of authentication that must be validated in order to proceed to the banking. These forms include a username, a “security key” that is unique to the user, and the password. These security measures improved and strengthened my eLoyalty and faith to Bank of America, and kept me a happy and confident customer in their business. But, eTrust can both strengthen and weaken bonds between businesses. For example, a company with a more secure website has an advantage over an inadequate secured one. There is always a front-runner, and there will always be competition to have the most appealing system of security and privacy. This is an advantage for the front-runner, and a disadvantage for the sub-par site, unless they innovate and create an advantage over the front-runner. I think it is easy to manipulate eTrust to a certain degree. For example, certain malware and scareware can trick users into thinking that they need the product to clean up their computer and protect it from viruses, when it is the virus in itself. On the other hand, believable eTrust, in my opinion, is hard to manipulate. For example, I would never sign onto a website handing personal information that did not have a secure login. The typical user needs some type of assurance, and it is fairly easy to spot the “bad eggs.” Cartoon-y colors, flashing lights, and “Click Here!!!” buttons are a dead giveaway. ETrust can be reasonably measured by direct feedback from the customers; both their opinions and numeric statistics of sales for the company are indicators of positive or negative growth. Of course this method is not completely accurate, but the best way to know the businesses strengths and weaknesses come from the customers’ opinions. Companies can gain advantage in the digital world by being a “First Mover,” which is a form of competitive advantage that a company earns by being the first to enter a specific market or industry. Being the first allows a company to acquire superior brand recognition and eLoyalty. The company also has more time to perfect its product or service. EBay is the best “First Mover” example I can think of. EBay was the first of its kind; the first company to take the auction process online, kicking off operations in 1995. First movers are often followed by competitors that try to capitalize on the original company's success. By this time, however, the first mover has usually accumulated enough market share, expertise and customer loyalty to remain on top. EBay has dominated the auction trading market, while its main draw is the low cost of the items sold. Anyone can sell or buy an item on eBay, and earning great deals or even having your own business on the site is very appealing. Competitors like Amazon and Overstock compete, but I do not think they have the same superior and longstanding image as eBay. In conclusion, eTrust has revolutionized the e-marketplace. If businesses can gain the loyalty and trust from their customers with personal information, they can have the competitive advantage, leading to higher profits and more satisfied customers. If a company loses eTrust, it is hard to regain, so great attention and precautions should be taken to ensure privacy and security is the utmost priority. These steps will ensure the safety of all involved, and will strengthen the e-marketplace every day.

Similar Documents

Free Essay

Mobile Computing

...Security Issues in Mobile Computing Srikanth Pullela Department of Computer Science University of Texas at Arlington E-mail: pvssrikath@hotmail.com Abstract In the present mobile communication environment, lot of research is going on, to improve the performance of issues like handoffs, routing etc. Security is another key issue that needs to be considered, which comes into picture once the communication channel is setup. Many security protocols are being proposed for different applications like Wireless Application Protocol, 802.11 etc. most of them are based on the public and private key cryptography. This paper provides an insight on these cryptographic protocols and also looks into the current research project going on at Sun Microsystems Lab on wireless security. 1.Introduction With the rapid growth in the wireless mobile communication technology, small devices like PDAs, laptops are able to communicate with the fixed wired network while in motion. Because of its flexibility and provision of providing ubiquitous infrastructure, the need to provide security increases to a great degree. As wireless communication takes place mainly through the radio signals rather than wires, it is easier to intercept or eavesdrop on the communication channels. Therefore, it is important to provide security from all these threats. There are different kinds of issues within security like confidentiality, integrity, availability, legitimacy, and accountability that needs...

Words: 4692 - Pages: 19

Premium Essay

Vulnerability-Assessment

...285_NSS_01.qxd 8/10/04 10:40 AM Page 1 Chapter 1 Vulnerability Assessment Solutions in this Chapter: I What Is a Vulnerability Assessment? I Automated Assessments I Two Approaches I Realistic Expectations Summary Solutions Fast Track Frequently Asked Questions 1 285_NSS_01.qxd 2 8/10/04 10:40 AM Page 2 Chapter 1 • Vulnerability Assessment Introduction In the war zone that is the modern Internet, manually reviewing each networked system for security flaws is no longer feasible. Operating systems, applications, and network protocols have grown so complex over the last decade that it takes a dedicated security administrator to keep even a relatively small network shielded from attack. Each technical advance brings wave after wave of security holes. A new protocol might result in dozens of actual implementations, each of which could contain exploitable programming errors. Logic errors, vendor-installed backdoors, and default configurations plague everything from modern operating systems to the simplest print server.Yesterday’s viruses seem positively tame compared to the highly optimized Internet worms that continuously assault every system attached to the global Internet. To combat these attacks, a network administrator needs the appropriate tools and knowledge to identify vulnerable systems and resolve their security problems before they can be exploited. One of the most powerful tools available today...

Words: 9203 - Pages: 37

Free Essay

Notes

...1 – Introduction to Computer Concepts History of Computer * Often referred to the different generations of computing devices. * The circuitry is smaller and more advanced than previous generation. * First Generation - 1940-1956: Vacuum Tubes * Often enormous, very expensive, use a great deal of electricity and generate a lot of heat. * E.g., UNIVAC, ENIAC * Second Generation - 1956-1963: Transistors * Computers are smaller, faster, cheaper, more energy-efficient and more reliable. * Third Generation - 1964-1971: Integrated Circuits * Miniaturized Transistors were placed on silicon chips called semiconductors. * Increased speed and efficiency. * Fourth Generation - 1971-Present: Microprocessors * Thousands of Integrated Circuits (IC) were onto a silicon chip. * Computers are more powerful and linked to networks. * Fifth Generation - Present and Beyond: Artificial Intelligence * Uses parallel processing, quantum computation and nano-technology. * Respond to natural language input and capable of learning and self-organization. Computer Literacy * Knowledge and understanding of computers and their uses. Computer * An electronic device that transform input into output. Information Processing Cycle * Is a series of Input, Process, Output and Storage. Components of a Computer * Input, Process, Output, Storage and Communication Computer Systems * It has data inputs, processes that transform data...

Words: 10287 - Pages: 42

Premium Essay

Information and Communication Technologies in Tourism 2014

...in a way that gives the research process unheard-of possibilities. The current level of technological development allows for the construction of objects that are smaller, more intelligent and embedded in the environment and even wearable. These objects, which record and learn our habits are connected to the Internet and they have computing capabilities. They can also be interconnected and generate large quantities of information to benefit the environment in which they are located as well as the travellers that possess them. This gives rise to a new world of interconnected personal machines. This new world involves a convergence among what is physical, what is social and what is digital. Within this context, research assumes the principal role to guide evolution, transferring knowledge to the industry. Relevant academic research is more necessary than ever before in order to explore how ICT in tourism can...

Words: 49996 - Pages: 200

Free Essay

Cisco Ccnp Security Training

...Table of Contents Chapter 1 Evaluating the Cisco ASA VPN Subsystem .......................................3 Chapter 2 Deploying Cisco ASA IPsec VPN Solutions ............................. 42 Chapter 3 Deploying Cisco ASA AnyConnect Remote-Access SSL VPN Solutions..............................109 Chapter 4 Deploying Clientless RemoteAccess SSL VPN Solutions ................148 Chapter 5 Deploying Advanced Cisco ASA VPN Solutions .............................184 CCNP Security VPN 642-648 Quick Reference Cristian Matei ciscopress.com [2] CCNP Security VPN 642-648 Quick Reference About the Author Cristian Matei, CCIE No. 23684, is a senior security consultant for Datanet Systems, Cisco Gold Partner in Romania. He has designed, implemented, and maintained multiple large enterprise networks, covering the Cisco security, routing, switching, service provider, and wireless portfolios of products. Cristian started this journey back in 2005 with Microsoft technology and finished the MCSE Security and MCSE Messaging tracks. He then joined Datanet Systems, where he quickly obtained his Security and Routing & Switching CCIE, among other certifications and specializations, such as CCNP, CCSP, and CCDP. Cristian has been a Cisco Certified Systems Instructor (CCSI) since 2007, teaching CCNA, CCNP, and CCSP curriculum courses. In 2009, he received a Cisco Trusted Technical Advisor (TTA) award and became certified as a Cisco IronPort Certified Security Professional (CICSP) on E-mail...

Words: 52748 - Pages: 211