P3 Explain The Potential Risks Of E-Commerce Research Paper

Decent Essays
P3: Explain the potential risks to an organization of committing to an e-commerce system
Risks
1. Hacking
In computer interacting, hacking is any technical effort to operate the normal performance of network links and connected systems. A hacker is any person engaged in hacking. Today, however, hacking and hackers are most commonly associated with malicious programming attacks on the Internet and other networks. Hacking can lead to theft of important information which can be sold to other competitors. References: globalriskinsights.com

2. Viruses
Viruses and worms spread across computers and networks by making copies of themselves, usually without the knowledge of the computer user. Risks can also come from popular social networking sites.
…show more content…
Legislation Key points Purpose

Electronic Transaction Act 2000  Provides reliable and trustworthy services to people
 Provides Internet Intellectual Property Rights protection, consumer protection legislation, and personal data protection. It provides the suitable legal structure to facilitate electronic transactions and communications and it give a new direction to the traditional way of doing e-commerce.

It also provides for the legal gratitude and regulation of electronic records, electronic signatures and their security on an e-commerce websites.

Data Protection Act 2004  Personal data should be processed fairly and lawfully
 Data must be accessible to the individual and able to be corrected or removed where necessary
 Data should be used for limited purposes, that is only data which is needed may be used It provides for the protection of the confidentiality rights of individuals in view of the developments in the techniques used to capture, transmit and manipulate, record or store data in an e-commerce
…show more content…
Some of the implications are as follows:
• Changing customer perspective
This includes how internet shopping has provided additional charge to customers as they can buy products from anywhere in the world and can compare prices in the worldwide marketplace to get the best deals and find the best products.
• Economic and social impact due to speed of changes
Society has been impacted by e-Commerce sites and the speed at which things change online. Many products become available online before they do in high street stores and many people use sites such as Amazon to pre-order the latest and greatest tech gadgets so that they have them as soon as they are released.
• Bricks and clicks (integrating high street and online presence)
The presence of online and high street presence gives shoppers both options and means that some consumers are more confident in the fact that they can go to the shop to return items that they have bought online. Some individuals will be more trusting of a retailer that has a high street and online presence due to the fact that they have the option to visit the physical store and try before they buy with more expensive items and order smaller items

Related Documents

  • Improved Essays

    Eco/372 Week 1

    • 491 Words
    • 2 Pages

    Next is the Card Industry Data Security Standard (PCI DSS) that is a set of requirements for enhancing security of payment customer account data. It was developed by the founders of the PCI Security Standards Council, including American Express, Discover Financial Services, JCB International, MasterCard Worldwide and Visa to help facilitate global adoption of consistent data security measures. PCI DSS includes requirements for security management, policies, procedures, network architecture, software design and other critical protective measures. Further is the Gramm-Leach-Bliley Act (GLB) Act of 1999, that is also known as the Financial Modernization Act of 1999, the GLB Act includes provisions to protect consumers' personal financial information held by financial institutions. There are three principal parts to the privacy requirements: the Financial Privacy Rule, the Safeguards Rule and pretexting provisions.…

    • 491 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    IS3110 Lab Answers

    • 739 Words
    • 3 Pages

    1. What are the danger to the system? There numerous dangers that can put your system at danger, for example, infections, spyware, worms, Trojans and PC programmers. Your systems are additionally helpless excessively critical who perpetrate cybercrimes. 2.…

    • 739 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Target Promo Codes 10% Off February 10 2017 With Deductions Gain having consistent purchase means to determine online and access with rate cut wants to buy. Complete a process of purchasing on web and seek with rate reductions on store where use of coupons is imminent. Earn with a positive minded need and trade accessories to advance through a cut base resources to receive. Gain best results and associate with requirements to purchase on store having reasons to make buys you require.…

    • 468 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Unit 9 P2

    • 1782 Words
    • 8 Pages

    Task 1 – Introducing e-commerce into an organisation E-commerce is the actions of trading electronically through the internet. E-commerce has been implemented into most businesses in the modern day and there are many impacts when doing business over the internet. The benefits of introducing e-commerce into your organisation There are many significant benefits to the business when introducing e-commerce into it. Some entail:  The business can accumulate customer information …

    • 1782 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    According to Gauby and Noone, L.L.C. (1996), legal counsel for Smith System Consulting, states these contracts to be fair and just to the company and their customers. (University of Phoenix). Smith System Consulting has rare copyrights and patents, since most of their business is believed to be work for hire basis. Based upon the nature of Smith Systems Consulting's business and the information provided by the company's legal counsel, some of the legal issues that the company may face are contract law, sexual harassment, and discrimination.…

    • 988 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    PIPEDA

    • 1517 Words
    • 7 Pages

    The Purpose of this extended analysis will be to examine the degree of compliance of Toronto-Dominion Bank’s (TD) privacy policy with that of the Personal Information Protection and Electronic Documents Act (PIPEDA). This paper will discuss course concepts such as the dignity vs property approach when discussing safeguard recommendations. The focus of this paper will be PIPEDA, but other notions such as the privacy vs secrecy debate will be introduced and explained throughout this paper. Certain privacy legislations such as Directive 95/46/EC (European privacy law) will be used to better recommend safeguards and accountability measures for Canadian Privacy Laws. First Impressions.…

    • 1517 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    In all organisations, there are policies and procedures that control access to confidential information. Types of information that is sensitive includes personal information e.g. colleagues age, address, medical history and details of personal relationships. Sensitive data that is also available but must be kept confidential is financial information including how much they earn, also information on customers or contacts that would be highly valuable to other organisations. Businesses receive and produce a lot of information all the time and it is vital that this information is stored safely and can be found quickly. To access this, a suitable system needs to be in place to allow everyone to find the documents they need.…

    • 256 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Acceptable Use Policy

    • 1212 Words
    • 5 Pages

    Acceptable Use Policy This acceptable use policy (AUP) can be found in the User Domain and is what is used to define what users are allowed and not allowed to do with Organization owned IT assets. It is designed to protect Richman, its employees, customers and partners from harm caused by misuse of LAN to WAN, internet and web surfing. Misuse includes anything that is deliberate as well as inadvertent actions (Kim & Solomon, 2014). Everyone that works for Richman is responsible for the security of our system and the data that is on it.…

    • 1212 Words
    • 5 Pages
    Great Essays
  • Great Essays

    The law does not only enable but also constrains e-commerce while recognising e-commerce’s beneficial potential alongside international efforts (Netlitigation, 2015); this is highlighted in the Electronic Transactions Act 1999[12], as the state and federal government have taken legislative steps to remove “legal obstacles” to the endorsement of e-commerce agreements (Sutton, 2015). (The law’s) constraining role was adopted because worldwide governments now realise – in some areas – certain activities must be restricted and property rights must be protected, this is enhanced the Privacy Act 1988 (recent amendments) [13] as well as the Copyright Act 1968 (this Act pre-dates e-commerce) [14], and even in the Consumer Protection Legislation [15]. Queensland law plays a constraining role when endorsing e-commerce law and agreement (property/ownership rights) [16] which underpins the facilitative approach, on the other hand is the notion of freedom of contract, freedom of individuals and groups (i.e. corporations) to form contracts without government restrictions, because individuals entail a general freedom to choose with whom to contract. The Queensland, as well as federal Government is working to make it easier and more reliable to use electronic communications in business and personal transactions. This includes a commitment to provide…

    • 1633 Words
    • 7 Pages
    Great Essays
  • Great Essays

    CHAPTER I INTRODUCTION In today’s business, e-business is very common for utilizing information and communication technology to support all the activities of the business. E-business is a business that runs via online, it is including buying and selling of goods and services through the internet. With e-business, companies are able to link their internal and external data processing system to be more effective and efficient.…

    • 1456 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Safe Harbo Case

    • 1396 Words
    • 6 Pages

    ).INTRODUCTION: 1.1) Formation and need of Safe Harbor Policy. With the exponential increase in data flow across different countries, there was need to protect privacy of an individual and sensitive data . As a result, on 26 October 1995, in pursuant with Directive 95/46/EC on the protection of an individuals privacy with respect to processing of personal data and on free movement of such data (eg-companies that outsource human resources data or advertise overseas ) sets rules for transfer of personal data from EU Member states to other countries outside EU to the extent such transfers fall within the scope of instrument and adequacy decision .…

    • 1396 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Asian E-commerce giants Alibaba and Rakuten: a comprehension of their key operational parameters The e-commerce came into existence in the year 1994 and has ever since grown to the present USD 1800 billion industry globally. The growth came on the back of increasing internet users’ base and increasing consumer preference for purchasing goods online, owing to the ease of shopping. The e-commerce industry in Asia accounts for 52% of the global e-commerce industry and has mirrored the overall growth in the global e-commerce over the same period.…

    • 1123 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    3.6. Industry Driving Force Automotive industry is facing tough challenges in the future. There are some challenges that carmakers need to address to sustain their profitability. Some industry driving forces that will shape the future of the automobile industry are as follow: 1. Shift in consumer demand.…

    • 722 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    The Right to Privacy in the Digital Age Works Cited Laws of Malaysia Act 709 Personal Protection Act 2010 (http://www.pdp.gov.my/images/LAWS_OF_MALAYSIA_PDPA.pdf) “A Guide for Data Users.” Ministry of Communication and Multimedia. Personal Data Protection Commissioner Malaysia. Print 2010.…

    • 1435 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Data security has become one of the most critical issues in security matters. It concerns nearly all institution and goes right to the privacy of many as people have an increasing level of various registration online. Amazon for example needs information such as bank or visa account number to be able to purchase. Such information is important and can be of critical value if it was in unwanted hands. Thence we are going in this paper to discuss about the three main areas of accountability, IT security, Information Security and Enterprise…

    • 773 Words
    • 4 Pages
    Improved Essays