Technology Centric Information say-so Assessment for Costumers and ProfessionalsThe federal agency Issues The relationship in the midst of commerce and conscience seems to be a top-of-mind issue these days . But the connection between incorrupt thought and consumer behavior was drawn with a starticularly inscrutable black line (Coupe , February 2006 ,. 36 ) The idea of convenience , approachability multiple selections and options , and the abundance of info and sources argon some of the reasons why more and more consumers argon login on and accessing Web sites to graze for basic consumers needs , big ticket items conduct reinforcement or attend school . The innovations of technology induce provided us with a myriad of options , opportunities and resources which makes us more apt to buy-into and go into in e-commerce marketing venues . The abundance of Web sites , e-commerce business which allow the cat out of the bag to the needs of the consumer regardless of aim or type of renovation and or products desired , makes this the or so sought after and employ opportunity for the economyThere are , barely , a few issues which wee-wee never been considered addressed or investigated throughout these on- line expeditions and that are the dominance in and contraceptive cover of consumer privacy . Applegate McFarlan McKenney (1991 , pp . 410-412 ) said of e-commerce privacy and credentials issues ane of the emotional s related to IT operations is how frequently security is necessary for cheering the site and how much actually exists . An explosive issue that cuts across the IT applications world . change magnitude presumption into privacy . This issue transcends all aspects of the field of IT . Unless proactive go are taken , firms will find themselves rassling with these anxieties Although we consume been bombarded with im! ages of identity theft computer hackers and spammers , we have non made an swither to consider the consequences or the impact of employ technology to train products and services electronically .
We as consumers and exploiter of IT-enabled business processes have not considered all the risks involved in the conducting or contract with these businesses via Web sites and portalsThe Policies and /or Information Assurance TechnologiesInternet organizations impress on us the opportunities , privacy and honesty of employ their products and services to encounter our needs , they do not however , explain in whole or in part how they purpor t to protect or shield us from cheat , access , investment firm , secure and retrieve our customer data and pro (s ) or any other level of security measures . According to Applegate , et al (1999 ) . individuals and organizations may be inappropriately harmed by certain applications and activities the compass point of the impact is uneven . Some practices drive out be deeply damaging to people , sequence umteen others catch ones breath in the category of merely inconvenient (p . 413 ) It is know that in the post office , department store , or beach consumers actively participate in transactions with confidence and conclusion that these establishments have policies and procedures in place to protect them while they are on the premises or at the truly least(prenominal) their interests - money , valuables , merchandise , etc This is not a security measures when we practice session IA...If you want to get a full essay, station it on our website: BestEssayCheap.com
If you! want to get a full essay, visit our page: write my paper
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.