E-Security Issues

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2012, Vol 3, Issue 2

Abstract

With the rapid growth of e-commerce, governmental and corporate agencies are taking extra precautions when it comes to protecting information. The development of e-security as a discipline has enabled organisations to discover a wider array of similarities between attacks occurring across their security environment and develop appropriate countermeasures. To further improve the security of information, there is a need for conceptualising the interrelationships between e-security and the major elements involved in changing a company's infrastructure. Organisations should act in an ethical manner, especially when it comes to e-security and e-privacy policies, procedures, and practices. The consequential theory of utilitarianism is used and applied to a conceptual model to help explain how organisations may develop better secured information in an information-sharing and globally networked environment. E-security is a critical concern for both consumers and business. Establishing trust between all parties in an online transaction is vital for the success of e-commerce. The public wants  full assurance that the information they supply is going to the company they think it is going to, will not be misused by that company, and that credit card information or other payment mechanisms are confidential and secure. On the other hand, companies also want that their systems must remain protected from intruders and they cannot tamper with the data. Some degree of risk is always associated with E-transactions, if security controls are not applied while engaging into such transactions. Users must be sure before engaging into transactions that they are safe and the information provided by them is not going to unauthorized people. Cyber crimes can involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation and mischief, all of which are subject to the Indian Penal Code. The abuse of computers has also given birth to a gamut of new age crimes that are addressed by the Information Technology Act, 2000. In this paper, I have covered the e-security issues such as elements of e-security, security threats or cyber crimes, tools for e-security, precautions for secure e-commerce and various studies regarding e-security issues.

Authors and Affiliations

Mani Arora

Keywords

Related Articles

The Impact of UTAUT Model and ICT Theoretical Framework on University Academic Staff: Focus on Adamawa State University, Nigeria.

This paper examined the impact of UTAUT model and ICT theoretical framework on university academicians. The UTAUT model theory was verified using multiple regressions of the four constructs on behavioral intention to acc...

A Novel Technique for Trust Delivery in the Cloud

For many organizations, keeping data private and secure has also become a compliance requirement. Cloud providers offering Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) offer a “shared responsibil...

IMPLEMENTATION OF MOBILE VIRTUAL LABORATORY: CONTRIBUTORY FACTORS IN A DEVELOPING COUNTRY

The growing availability of mobile devices across developing countries and coupled with increase awareness of mobile learning as well as the use of mobile devices for laboratory practical warrant the exploration of its w...

Exploitnig DNS Server Vulnerabilites Using Linux Operating System

Today, the world is using many modern Information Technology (IT) systems to gather, store, and manipulateimportant information. On the other hand, hackers are trying to gain access to any computer or system for viewing,...

Mitigating the Distributed Denial of Service (DDoS) Attacks in Campus Local Area Network(CLAN)

The Campus Local Area Network (CLAN) of academic institutions interconnect computers ranging from one hundred to about twenty five hundred and these computers are located in academic building(s), hostel building(s), facu...

Download PDF file
  • EP ID EP649925
  • DOI 10.24297/ijct.v3i2c.2889
  • Views 114
  • Downloads 0

How To Cite

Mani Arora (2012). E-Security Issues. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 3(2), 301-308. https://europub.co.uk./articles/-A-649925