E-Security Issues

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2012, Vol 3, Issue 2

Abstract

With the rapid growth of e-commerce, governmental and corporate agencies are taking extra precautions when it comes to protecting information. The development of e-security as a discipline has enabled organisations to discover a wider array of similarities between attacks occurring across their security environment and develop appropriate countermeasures. To further improve the security of information, there is a need for conceptualising the interrelationships between e-security and the major elements involved in changing a company's infrastructure. Organisations should act in an ethical manner, especially when it comes to e-security and e-privacy policies, procedures, and practices. The consequential theory of utilitarianism is used and applied to a conceptual model to help explain how organisations may develop better secured information in an information-sharing and globally networked environment. E-security is a critical concern for both consumers and business. Establishing trust between all parties in an online transaction is vital for the success of e-commerce. The public wants  full assurance that the information they supply is going to the company they think it is going to, will not be misused by that company, and that credit card information or other payment mechanisms are confidential and secure. On the other hand, companies also want that their systems must remain protected from intruders and they cannot tamper with the data. Some degree of risk is always associated with E-transactions, if security controls are not applied while engaging into such transactions. Users must be sure before engaging into transactions that they are safe and the information provided by them is not going to unauthorized people. Cyber crimes can involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation and mischief, all of which are subject to the Indian Penal Code. The abuse of computers has also given birth to a gamut of new age crimes that are addressed by the Information Technology Act, 2000. In this paper, I have covered the e-security issues such as elements of e-security, security threats or cyber crimes, tools for e-security, precautions for secure e-commerce and various studies regarding e-security issues.

Authors and Affiliations

Mani Arora

Keywords

Related Articles

ENHANCED SECURITY MECHANISM IN CLOUD COMPUTING USING HYBRID ENCRYPTION ALGORITHM AND FRAGMENTATION: A REVIEW

Cloud is a term used as a metaphor for the wide area networks (like internet) or any such large networked environment. It came partly from the cloud-like symbol used to represent the complexities of the networks in the s...

Enhanced Cloud Security using Hybrid Mechanism of RSA, AES and Blowfish Data Encryption with Secure OTP

Cloud Computing has become one of the most talked about technologies in recent times and has got lots of attention from media as well as analysts because it is offering lots of opportunities. Enterprises have been determ...

Choosing Automated or Manual Testing in Extreme Programming with the Analytical Hierarchy Process

Extreme Programming (XP) has been called one of the most successful methods in software development. XP comprises a set of practices designed to work together to provide value to the customer. During the XP lifecycle, de...

Performance Evaluation of Distributed Database Systems

Distributed database management systems manage a huge amount of data as well as large and increasingly growing number of users through different types of queries. Therefore, efficient methods for accessing these data vol...

Performance Analysis of Advanced Hybrid Speech Coding Techniques in Time domain, Spectral domain and Perceptual domain

Speech coding is the art of creating a minimally redundant representation of the speech signal that can be efficiently transmitted or stored in digital media and decoding the signal with the best possible perceptual Qua...

Download PDF file
  • EP ID EP649925
  • DOI 10.24297/ijct.v3i2c.2889
  • Views 106
  • Downloads 0

How To Cite

Mani Arora (2012). E-Security Issues. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 3(2), 301-308. https://europub.co.uk/articles/-A-649925