Monday, March 25, 2019
Research Methods Essay -- Research Analysis
explore Methods 3IntroductionE-business is an issue that has been extremely popular for the past pas de deux of years after introduction of the profits, many corporations were undecided on whether to part the opportunity. However, this concept has slowly been accepted and many companies are using the opportunity to expand the popularity of their brands. However, E-business has a couple of challenges that need to be tackled in regularize to make internet business safe and reliable. The following research suggestion will look into the possible methods of investigating into the vulnerability of consumers of online products. Background informationMany corporations have gone online to market and sell their products and consumers are progressively engaging in E-business. Business has shifted from the traditional over-the-shelf method to the contemporary internet based businesses, with consumers and companies communicating and carrying out transactions online. This has however create d an opportunity for hackers and opposite online criminals who create replicas of genuine websites by altering a single chassis for hosting to be possible these fraudsters have managed to rip off unsuspecting consumers of their funds pretending to be the genuine companies. Hacking of credit card details online and pickings massive cash from the consumers illegally using rogue technology, creates a uncertainty of how vulnerable the consumers are and the amount of personal information the consumers should provide to keep off this vice from taking place. Research Questions and ObjectivesThe following research is meant to develop an intellectual on the take aim of vulnerability of online consumers. In addition, the research is meant to rate the level of preparedness of onlin... ...easing or decreasing and statistical tools used to eliminate errors in the findings. Works CitedArora, K. (2011). How to protect online content from theft. Retrieved from http//www.quickonlinetips.com /archives/2011/05/protect-online-content-theft/BBC. (2010). E-crime police arrest 19 over UK online bank theft. Retrieved from http//www.bbc.co.uk/news/uk-11431989Identity Theft Technology Council. (2005). Online personal identity theft Phishing technology, chokepoints and countermeasures. Las Vegas, NV Identity Theft Technology Council.Mccurry, M. (2011). Congress must encounter online theft. Retrieved from http//www.politico.com/news/stories/0611/56984.htmlOnguardonline. (2011). Identity theft. http//www.onguardonline.gov/topics/identity-theft.aspxOrganization for Economic Co-operation and Development. (2009). Online identity theft. Washington, DC OECD.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment