College life has grown due to the changes in age of the of their attendees. With the environment changes it has also brought creation …show more content…
Information related concerns would be whether the information accuracy of college goers transaction comes safe ,not limited to but also including intellectual and access to your personal information given to processed by website online. Another concern of ethical collection of data and law is held in format for accuracy, confidentiality an aspect of legal concerns. GPS the application program does not have a division of ethical segmental policy for those who truly operate the software program. Privacy can be of get concerns while shopping online for college goers living the campus life. There may be threats to shoppers brought on by the use of information systems and the databases which hold the supported files. The option offers all college goers to user the application, does exist by matter of case, as well as cause to operate the software available. Privacy can vary from one college goers to the next. The privacy indictor can be preventing mechanism for unwanted case and /or cases creation with intrusion intent. Privacy over the personal information used the college goer intends to secure made purchases on and/or over the online website …show more content…
The use of application password protect set up can be created by the college goers to make orders by use of online purchasing. The merchant option should allow for ease of use format by e business source for input account pay security future, to guard against thief,it’s embedded upon the buyers formatted selection totals. The following secured formatted should as well be embedded within the applications characteristic of special future character password implementation, as a single application security or by way of multiple sign in format in several format areas. Attacks to college goers can be exposed in the form of espionage granted from unauthorized attempts, extortion, sabotage also cyber terrorism and cyber warfare targeting the computer entire system. The challenges may concentrated as deliberate attacks from one or more the known cause of information brought on vulnerability uses gained from information resources provision.
Application program can by constructed to compliance bases format with one or more or the devices mentioned. The data can be driven to a Flowchart to collect all necessary requirements. The server should support all entry input as well as storage of processed information and communication technological gathered of the gathering of data. This collection of information should be kept to minimize