Technology Centric Information say-so Assessment for Costumers and ProfessionalsThe federal agency Issues The relationship amongst commerce and conscience seems to be a top-of-mind issue these days . But the connection between incorrupt thought and consumer behavior was drawn with a starticularly cabalistic black line (Coupe , February 2006 ,. 36 ) The idea of convenience , approachability multiple selections and options , and the abundance of info and sources argon some of the reasons why more and more consumers argon login on and accessing Web sites to ledgeman for basic consumers needs , big ticket items conduct second-stringer or attend school . The innovations of technology induce provided us with a myriad of options , opportunities and resources which makes us more apt to buy-into and go into in e-commerce mark eting venues . The abundance of Web sites , e-commerce business which let the cat out of the bag to the needs of the consumer regardless of take aim or type of renovation and or products desired , makes this the intimately sought after and employ opportunity for the economyThere are , nonetheless , a few issues which befuddle never been considered addressed or investigated throughout these on- line expeditions and that are the dominance in and evasive cover of consumer privacy . Applegate McFarlan McKenney (1991 , pp . 410-412 ) said of e-commerce privacy and warranter issues one and only(a) of the emotional s related to IT operations is how frequently security is necessary for fostering the site and how much actually exists . An detonative issue that cuts across the IT applications world . change magnitude boldness into privacy . This issue transcends all aspects of the field of IT . Unless proactive stairs are taken , firms will find themselves rassling with t hese anxieties Although we bring been bomb! arded with images of identity theft computer hackers and spammers , we have non made an childbed to consider the consequences or the impact of employ technology to lease products and services electronically .

We as consumers and exploiter of IT-enabled business processes have not considered all the risks involved in the conducting or detection with these businesses via Web sites and portalsThe Policies and /or Information Assurance TechnologiesInternet organizations impress on us the opportunities , privacy and honesty of employ their products and services to live up to our needs , they do not however , explain in whole or in part how they purport to protect or shield us from ch eat , access , insert , secure and retrieve our customer data and pro (s ) or any other level of security measures . According to Applegate , et al (1999 ) . individuals and organizations may be inappropriately harmed by certain applications and activities the tier of the impact is uneven . Some practices drive out be deeply damaging to people , sequence umteen others brood in the category of merely inconvenient (p . 413 ) It is know that in the post office , department store , or till consumers actively participate in transactions with confidence and evidence that these establishments have policies and procedures in place to protect them while they are on the premises or at the truly to the lowest degree their interests - money , valuables , merchandise , etc This is not a security measures when we practice IA...If you want to get a full essay, station it on our website:
OrderEssay.netIf you want to get a full inf ormation about our service, visit our page:
write my essay
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.