Saturday, June 1, 2019

Research Methods Essay -- Research Analysis

Research Methods 3IntroductionE-business is an issue that has been extremely general for the past couple of years after introduction of the internet, many corporations were undecided on whether to use the opportunity. However, this concept has slowly been accepted and many companies are use the opportunity to expand the popularity of their brands. However, E-business has a couple of challenges that need to be tackled in order to make internet business safe and reliable. The following search suggestion will look into the possible methods of investigating into the vulnerability of consumers of online products. Background informationMany corporations have gone online to market and sell their products and consumers are increasingly pursue in E-business. Business has shifted from the traditional over-the-shelf method to the contemporary internet based businesses, with consumers and companies communicating and carrying out transactions online. This has however created an opportunity f or hackers and other online criminals who create replicas of current websites by altering a single digit for hosting to be possible these fraudsters have managed to rip off unsuspecting consumers of their money pretending to be the honest companies. Hacking of credit card details online and taking massive cash from the consumers illegally using rogue technology, creates a question of how vulnerable the consumers are and the amount of personalised information the consumers should provide to avoid this vice from taking place. Research Questions and ObjectivesThe following research is meant to develop an understanding on the level of vulnerability of online consumers. In addition, the research is meant to rate the level of preparedness of onlin... ...easing or decreasing and statistical tools used to eliminate errors in the findings. Works CitedArora, K. (2011). How to protect online content from theft. Retrieved from http//www.quickonlinetips.com/archives/2011/05/protect-online-c ontent-theft/BBC. (2010). E-crime police have 19 over UK online bank theft. Retrieved from http//www.bbc.co.uk/news/uk-11431989Identity Theft Technology Council. (2005). Online identity theft Phishing technology, chokepoints and countermeasures. Las Vegas, NV Identity Theft Technology Council.Mccurry, M. (2011). Congress must rubbish online theft. Retrieved from http//www.politico.com/news/stories/0611/56984.htmlOnguardonline. (2011). Identity theft. http//www.onguardonline.gov/topics/identity-theft.aspxOrganization for Economic Co-operation and Development. (2009). Online identity theft. Washington, DC OECD.

No comments:

Post a Comment