Friday, April 19, 2019
Identity Theft Privacy Matrix Research Paper Example | Topics and Well Written Essays - 1000 words
Identity Theft Privacy Matrix - Research Paper ExampleIn addition, e-commerce housers also face the risk of losing reading they acquire from customer to threats that may breach their information systems. With umteen companies have fewer strategies to combat individualism thievery, against a backdrop of continued hive awayion of in person identifying information, at that place is wish to develop effective weapons to combat identity theft. Laws, regulations, and policies are the most effective weapons. The issue of identity theft presents ethical challenges that continue to challenge the success of e-commerce industry. While the industry has transformed commerce through and through practices that do not require face-to-face interactions, the danger of consumers losing their personally identifying information has far reaching consequences that could gall gains in privacy protection. Notably, the existing challenge of identity theft has created many concerns slightly the loss of personally identifying data and its impact on stakeholders involved in the e-commerce industry (Camp, 2007). From the privacy matrix in this paper, it would be vital to note that identify theft has created varying influence on various elements that define the e-commerce industry. ... The e-commerce surroundings has brought together various organizations and entities that co-exist and have various forms of interaction. With many players working interacting in the electronic environment, there are concerted efforts to develop strategies that help reduce the challenge of identity theft. More specifically, there is a need to strike a balance between choosing strategies that enhance protection of personal identity while creating slight burden on e-commerce systems. With the e-commerce built on a system that relies on personally identifying information, enhancing safety of personally identifying information has never been this important. The privacy matrix in the paper outlines sever al channels where identify theft kindle occur within the e-commerce industry. E-threats can compromise personally identifying information when consumers visit the e-commerce websites of their choice. During such visits, the consumers can provide website with information such as phone numbers, passwords, credit card numbers, and in some cases their companionable security numbers. This information is critical for various e-commerce processes, but e-threats can capture them. At the front door, organizations that collect this information could be at risk of front door e-threats. These e-threats may include spyware, phishing and active or passive collection of personally identifying information. With regard to these threats, the use of laws and policies are essential in combating the loss of information at this point (Roberson, 2008). With consumers being at risk of losing information when these e-threats strike, laws could be effective in mandating the companies provide information ab out the security of user data to enable consumers take appropriate action about their
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.