Tuesday, October 15, 2019
Identity Theft Privacy Matrix Research Paper Example | Topics and Well Written Essays - 1000 words
Identity Theft Privacy Matrix - Research Paper Example In addition, e-commerce providers also face the risk of losing information they acquire from customer to threats that may breach their information systems. With many companies have fewer strategies to combat identity theft, against a backdrop of continued collection of personally identifying information, there is need to develop effective weapons to combat identity theft. Laws, regulations, and policies are the most effective weapons. The issue of identity theft presents ethical challenges that continue to challenge the success of e-commerce industry. While the industry has transformed commerce through practices that do not require face-to-face interactions, the danger of consumers losing their personally identifying information has far reaching consequences that could erode gains in privacy protection. Notably, the existing challenge of identity theft has created many concerns about the loss of personally identifying data and its impact on stakeholders involved in the e-commerce ind ustry (Camp, 2007). From the privacy matrix in this paper, it would be vital to note that identify theft has created varying influence on various elements that define the e-commerce industry. ... The e-commerce environment has brought together various organizations and entities that co-exist and have various forms of interaction. With many players working interacting in the electronic environment, there are concerted efforts to develop strategies that help reduce the challenge of identity theft. More specifically, there is a need to strike a balance between choosing strategies that enhance protection of personal identity while creating less burden on e-commerce systems. With the e-commerce built on a system that relies on personally identifying information, enhancing safety of personally identifying information has never been this important. The privacy matrix in the paper outlines several channels where identify theft can occur within the e-commerce industry. E-threats can compromise personally identifying information when consumers visit the e-commerce websites of their choice. During such visits, the consumers can provide website with information such as phone numbers, pas swords, credit card numbers, and in some cases their social security numbers. This information is critical for various e-commerce processes, but e-threats can capture them. At the front door, organizations that collect this information could be at risk of front door e-threats. These e-threats may include spyware, phishing and active or passive collection of personally identifying information. With regard to these threats, the use of laws and policies are essential in combating the loss of information at this point (Roberson, 2008). With consumers being at risk of losing information when these e-threats strike, laws could be effective in mandating the companies provide information about the security of user data to enable consumers take appropriate action about their
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.