E-Security Issues

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2012, Vol 3, Issue 2

Abstract

With the rapid growth of e-commerce, governmental and corporate agencies are taking extra precautions when it comes to protecting information. The development of e-security as a discipline has enabled organisations to discover a wider array of similarities between attacks occurring across their security environment and develop appropriate countermeasures. To further improve the security of information, there is a need for conceptualising the interrelationships between e-security and the major elements involved in changing a company's infrastructure. Organisations should act in an ethical manner, especially when it comes to e-security and e-privacy policies, procedures, and practices. The consequential theory of utilitarianism is used and applied to a conceptual model to help explain how organisations may develop better secured information in an information-sharing and globally networked environment. E-security is a critical concern for both consumers and business. Establishing trust between all parties in an online transaction is vital for the success of e-commerce. The public wants  full assurance that the information they supply is going to the company they think it is going to, will not be misused by that company, and that credit card information or other payment mechanisms are confidential and secure. On the other hand, companies also want that their systems must remain protected from intruders and they cannot tamper with the data. Some degree of risk is always associated with E-transactions, if security controls are not applied while engaging into such transactions. Users must be sure before engaging into transactions that they are safe and the information provided by them is not going to unauthorized people. Cyber crimes can involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation and mischief, all of which are subject to the Indian Penal Code. The abuse of computers has also given birth to a gamut of new age crimes that are addressed by the Information Technology Act, 2000. In this paper, I have covered the e-security issues such as elements of e-security, security threats or cyber crimes, tools for e-security, precautions for secure e-commerce and various studies regarding e-security issues.

Authors and Affiliations

Mani Arora

Keywords

Related Articles

Development of Networks Model in The Serious Game of Agribusiness Management for Decision Making

This research developed a decision-making process in the agribusiness management system and analyzed the behavior of fixed point for identifying the position of agribusiness interaction. Agribusiness is represented as no...

Performance Analysis of IEEE 802.15.4 Based Wireless Sensor Networks using LAR protocol for CBR and ZIGBEE Traffic Applications

IEEE 802.15.4 standard based wireless sensor networks (WSNs) emerges as the next generation wireless standard for low-rate wireless personal area networks. IEEE 802.15.4 standard offers low power, low data rate and short...

A New Approach of Location Based Routing in MANETs

The highly dynamic nature of MANETs results in frequent and unpredictable changes in the network topology, which add to the difficulty and complexity to routing among the mobile nodes within the network. Thus, establishi...

DSS FOR IMPLEMENTING SYSTEMIC APPROACH TO FORECASTING

A computer based decision support system is proposed the basic tasks of which are modeling and forecasting of financial processes and credit risk estimation. The system is developed on the basis of system analysis princi...

Web-Based Knowledge Acquisition Approach for Building Diseases Symptoms Ontology

Today medical ontologies have an important role in medicine field to represent medical knowledge. They are much stronger than biomedical vocabularies. In diseases diagnosis process, each disease has number of symptoms as...

Download PDF file
  • EP ID EP649925
  • DOI 10.24297/ijct.v3i2c.2889
  • Views 101
  • Downloads 0

How To Cite

Mani Arora (2012). E-Security Issues. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 3(2), 301-308. https://europub.co.uk./articles/-A-649925