Technology Centric Information say-so Assessment for Costumers and ProfessionalsThe federal agency Issues The relationship between commerce and conscience seems to be a top-of-mind issue these days . But the connection between incorrupt thought and consumer behavior was drawn with a starticularly inscrutable black line (Coupe , February 2006 ,. 36 ) The idea of convenience , availability multiple selections and options , and the abundance of info and sources argon some of the reasons why more and more consumers are login on and accessing Web sites to surf for basic consumers needs , big ticket items conduct backup or attend school . The innovations of technology induce provided us with a myriad of options , opportunities and resources which makes us more apt to buy-into and go into in e-commerce marketing venues . The abundance of Web sites , e-commerce business which let the cat out of the bag to the needs of the consumer regardless of level or type of renovation and or products desired , makes this the most sought after and employ opportunity for the economyThere are , however , a few issues which have never been considered addressed or investigated throughout these on- line expeditions and that are the dominance in and protective cover of consumer privacy . Applegate McFarlan McKenney (1991 , pp . 410-412 ) said of e-commerce privacy and security issues One of the emotional s related to IT operations is how frequently security is necessary for protecting the site and how much actually exists . An explosive issue that cuts across the IT applications world . change magnitude intrusiveness into privacy . This issue transcends all aspects of the field of IT . Unless proactive steps are taken , firms will find themselves rassling with these anxieties Although we have been bombarded with images of identity theft computer hackers and spammers , we have non made an effort to consider the consequences or the impact of employ technology to acquire products and services electronically .
We as consumers and exploiter of IT-enabled business processes have not considered all the risks involved in the conducting or contracting with these businesses via Web sites and portalsThe Policies and /or Information Assurance TechnologiesInternet organizations impress on us the opportunities , privacy and honesty of employ their products and services to satisfy our needs , they do not however , explain in whole or in part how they purport to protect or shield us from cheat , access , store , secure and retrieve our customer data and pro (s ) or any other level of security measures . According to Applegate , et al (1999 ) . individuals and organizations may be inappropriately harmed by certain applications and activities the degree of the impact is uneven . Some practices drive out be deeply damaging to people , sequence umteen others lie in the category of merely inconvenient (p . 413 ) It is know that in the post office , department store , or bank consumers actively participate in transactions with confidence and certainty that these establishments have policies and procedures in place to protect them while they are on the premises or at the truly least their interests - money , valuables , merchandise , etc This is not a security measures when we use IA...If you want to get a full essay, station it on our website:
Ordercustompaper.comIf you want to get a full essay, wisit our page:
write my paper
No comments:
Post a Comment