Saturday, October 26, 2019
Research Methods Essay -- Research Analysis
Research Methods 3 Introduction E-business is an issue that has been extremely popular for the past couple of years; after introduction of the internet, many corporations were undecided on whether to use the opportunity. However, this concept has slowly been accepted and many companies are using the opportunity to expand the popularity of their brands. However, E-business has a couple of challenges that need to be tackled in order to make internet business safe and reliable. The following research proposal will look into the possible methods of investigating into the vulnerability of consumers of online products. Background information Many corporations have gone online to market and sell their products and consumers are increasingly engaging in E-business. Business has shifted from the traditional over-the-shelf method to the contemporary internet based businesses, with consumers and companies communicating and carrying out transactions online. This has however created an opportunity for hackers and other online criminals who create replicas of genuine websites by altering a single digit for hosting to be possible; these fraudsters have managed to rip off unsuspecting consumers of their money pretending to be the genuine companies. Hacking of credit card details online and taking massive cash from the consumers illegally using rogue technology, creates a question of how vulnerable the consumers are and the amount of personal information the consumers should provide to avoid this vice from taking place. Research Questions and Objectives The following research is meant to develop an understanding on the level of vulnerability of online consumers. In addition, the research is meant to rate the level of preparedness of onlin... ...easing or decreasing and statistical tools used to eliminate errors in the findings. Works Cited Arora, K. (2011). How to protect online content from theft. Retrieved from http://www.quickonlinetips.com/archives/2011/05/protect-online-content-theft/ BBC. (2010). E-crime police arrest 19 over UK online bank theft. Retrieved from http://www.bbc.co.uk/news/uk-11431989 Identity Theft Technology Council. (2005). Online identity theft: Phishing technology, chokepoints and countermeasures. Las Vegas, NV: Identity Theft Technology Council. Mccurry, M. (2011). Congress must combat online theft. Retrieved from http://www.politico.com/news/stories/0611/56984.html Onguardonline. (2011). Identity theft. http://www.onguardonline.gov/topics/identity-theft.aspx Organization for Economic Co-operation and Development. (2009). Online identity theft. Washington, DC: OECD.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.