e-commerce, the sale of goods over the internet, has boosted online sales, especially products like books, CDs and computer products; it has also raised important new ethical challenges. These challenges revolve around four main issues: security, privacy, identity and transaction non-refutability. There is no doubt that a new ethical dilemma has arisen and these authors propose two universal principles that must be upheld by internet commerce. The first ethical challenge of internet commerce is security
Words: 730 - Pages: 3
The advances made in information technologies are causing an increasing number of ethical problems. The power used to processing computers doubles about every two years. Organizations are more dependent than ever before on their information systems. The Ethical problems arising from the appropriate use of customer information, personal privacy, and the protection of intellectual property have lead to increased laws to regulate the way data is collected. There are also privacy issues involved collecting
Words: 633 - Pages: 3
1. What are the six focuses of information security today? The six main focuses of information security today are data, networks, procedures, people, hardware, and software. This is what anyone in the field of information security needs to know to be able to adequately protect the system and its information. 2. What are the differences between “viruses”, “worms”, and “Trojan horses” as examples of malicious software? A virus is malicious code which will lower or stop
Words: 715 - Pages: 3
online presence have provided hackers with increased opportunities to exploit security vulnerabilities in ecommerce applications for personal profit, at the expense of legitimate businesses and users. A successful attack can result in downtime, the theft of user financial and personal information, loss of revenue, and loss of customers. This paper will offer an overview of some common types of security vulnerabilities and attacks on ecommerce platforms as well as some common tactics to prevent such
Words: 2158 - Pages: 9
technology could big retailers use to prevent identity thieves from purchasing merchandise? They could use the Authentication and authorization technologies that can help the big retailers to identify if the user that logged in is the real user. The new technology such as biometrics would not allow a person to have access once it recognizes the user’s either voice or face or iris or handwriting. This piece of technology is much more accurate to identify theft since the simple logins or passwords could
Words: 434 - Pages: 2
iPad’s Security Breach Samantha Phillips Dr. Prakash G. Menon BUS 508: The Business Enterprise May 29, 2011 Justifying Hacking into a Web site In 2010, McDonald’s said that customer information was exposed after a security breach involving an email marketing managing firm. McDonald’s released a statement explaining that information was obtained by an “unauthorized third party”, but added that financial information and social security numbers were not part of the data accidentally exposed
Words: 3288 - Pages: 14
access to the information (Rite Aid, Privacy, 2011). Rite Aid strives informed patient how the information could impact their privacy. If patient medical and personal information was breached it could cause harm to the patient; such as identity theft. Identity theft is a
Words: 293 - Pages: 2
Task 1(A) Global Marketplace Activity (A1) Being the largest hospital corporation in the world, with over 160 hospitals, 100 surgical clinics, and a never ending amount of specialty facilities, supplies are an essential component to the successful day to day operations. In the event that those supplies were not able to be delivered on time, the possibility of not being able to provide properly for our patients would be immense. And with the company receiving certain supplies from all over the
Words: 2981 - Pages: 12
Abstract Have you ever bought anything on the Internet with your credit or debit card? Do you think other people wouldn't like to buy things with your cards, too? Have you ever given out personal information to register for a contest or special event on the Web? If so, beware. In this paper, I will attempt to explore various privacy and security concerns facing both businesses and consumers when they take part in electronic commerce. Although the Internet offers a wonderful social, personal, and
Words: 941 - Pages: 4
associated with a person. These information should be accessed only on a strict need-to-know basis and handled and stored with great care. Personally identifiable information is information that can be used to distinguish or trace an individual's identity, such as their name, social security number, biometric records, etc., alone, or when combined with secondary personal or secondary identifying information that is linked or linkable to a specific individual, such as date and place of birth, mother's
Words: 942 - Pages: 4