• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15
  16. 16
    16
  17. 17
    17
  18. 18
    18
  19. 19
    19
  20. 20
    20
  21. 21
    21
  22. 22
    22
  23. 23
    23
  24. 24
    24
  25. 25
    25
  26. 26
    26

The Internet and assurance services.

Extracts from this document...

Introduction

1.0 Introduction The Internet is the greatest business tool ever invented. Merchant, trading partners and Online retail shoppers can find greater selection, convenience, and lower prices on the Internet. Online businesses can reach millions of shoppers and business partners, provide 24 hours seven days a week of products and services, and better meet their customers individual needs. For these reasons, E-Commerce over the Internet has been growing. According to ActivMedia, e-commerce activity for 2000 will be $132 billion worldwide, which is twice as much as estimated for 1999. This figure includes revenues from B2C, B2B and Internet services. According to a study by eMarketer in April 2000, almost 34 million US households were actively using the Internet, and of that number 23.5 million or 69% have made a purchase. (http://www.cpawebtrust.org/online.htm) However, despite the Internet's many advantages and opportunities, it also raises some new risks for businesses and has some customers worried. The risks are fraud, poor sales conversion rates, detrimental effects of negative PR due to privacy breaches and security problems. A recent study by the Internet Fraud Complaint Centre (IFCC) showed that online auctions accounted for 48.8% of fraud complaints. Non-delivery of goods ordered online came in second, at 19.2%. Other top fraud complaints to the centre involved: securities and commodities (16.9%), credit cards (4.8%) and identity theft (2.9%). The IFCC, which is jointly run by the FBI and the Justice Department's National White Collar Crime Centre, received an average of 1,000 complaints per week after opening in May 2000. (http://www.cpawebtrust.org/online.htm) In order to reduce risks, many technological solutions have been developed such as Firewalls, encryption, and digital signatures, etc. Despite these available solutions, most of Internet users still lack confidence in the medium. Therefore, third-party assurance service is needed to ensure secure transaction. 2.0 The Third-Party Role of Assurance Service According to AICPA, Assurance Services are defined as independent professional services that improve the quality or context of information for decision-makers. ...read more.

Middle

Due to characteristic of cyberspace, impersonation can be the one risk for the e-tailer. In simple word, Customer and merchant cannot meet by face to face. Therefore, customer can use fake or others ID to purchase product. There are two reasons for fake customer to use other identity. The reasons are theft and malice. The objective behind theft is to buy the goods or service without the need of paying. Also the bill will be forwarded to whom ID is misused or abuse. In other words, the theft will use others details to purchase goods or service. The intention of malice is difference from the theft. Instead of acquiring goods of services without paying, also they have other motives such as intrinsic satisfaction to the hacker, to hurt corporation profits and customer relations of competitor or former employer. * Denial of service attacks Denial service attacks occur in a typical connection. When the user sends a message asking the server to authenticate it, the server returns the authentication approval to the user. The user acknowledges this approval, and is allowed onto the server. In a denial of service attack, the user sends several authentication requests to the server. All requests have false return addresses, so the server cannot find the user when it tries to send the authentication approval. The server waits, sometimes more than a minute, before closing the connection. When it does close the connection, the attacker sends a new batch of forged requests, and the process begins again--tying up the service indefinitely. Furthermore Denial-of-service attacks can essentially disable your computer or your network. Depending on the nature of your enterprise, this can effectively disable your organisation. Also some denial of service attacks can be executed with limited resources against a large, sophisticated site. This type of attack is sometimes called an "asymmetric attack." For example, an attacker with an old PC and a slow modem may be able to disable much faster and more sophisticated machines or networks. ...read more.

Conclusion

* VeriSign Although travel.com.au have utilise some of encryption and authentication system to maintain data integrity. However by employing third party such as VeriSign, data integrity in the transaction process would be maximise. VeriSign, Inc. is the world's leading Internet Certification Authority, the trusted third party that authenticates, issues, and manages digital certificates on the Internet. VeriSign's Digital IDsSM enable trusted electronic commerce by authenticating the individuals, organisations, and content involved in an electronic transaction. (http://www.1888wwsports.com) Finally, it is recommended that the travel.com.au have to concentrate on auditing and monitoring process. As it is mentioned before, it should develop its risk management program as well. There are one new warn us is that Amazon has been hacked since last October. There is no doubt its site has utilised the latest mechanism. However, the latest mechanism is not enough to protect hacker. Therefore, only way to ensure the security is develop its risk management plan and continuously check, monitor and updated its security system. In conclusion, it can be said that the travel.com.au has satisfied every four categories, which is: * Security of data * Privacy of data * Business policy * Transaction processing integrity For the security of data, it has used SSL and 128-bit encryption technology. Also, it provides variety of payment system. These techniques can be applied to data integrity as well. Furthermore, its business policy has been clearly stated and followed. One of important stated policy is privacy policy of customer data. It has concern privacy and security of customer data as its asset. Therefore, it can be said the security level of the company is acceptable. Moreover, by using of Web site seal as a security tool, it can convince the customer and improve security. It is the current trends hiring the third party, which is specialised in assurance service, to enhance firm's security level. Also, it is less costly way to assure the site. Finally, say again, there is no perfectly secured Web site. Therefore, continuous security management is one of the key factors to success in marketspace. 8. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level ICT in Business section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level ICT in Business essays

  1. Marked by a teacher

    business online

    4 star(s)

    They use simple processes so that shopping is better for customers, simpler for staff and cheaper for Tesco. Tesco's core UK business is significant within its group, with over 250,000 employees and 1,779 stores. Nearly 80% of group sales and profits come from the UK business.

  2. Business Aims and Objectives.

    Internal communications Internal communications is when employees contact other people within the business; e.g. the owner of Tesco may contact the financial department on the income and expenditure of the business. Internal communication between staff would be by email, memo or staff newsletters.

  1. The process of electroplating and how it is used to protect products.

    voltage electric current flows through it, causing the metallic coating to be attracted to the object to be plated. HMQ offers a wide-variety of electroplated finishes, including: Chrome plating, Copper plating, Nickel plating, Sliver plating, Zinc plating brass plating, cadmium plating, chromium plating, hard chromium plating, gold plating, tin plating and zinc plating.

  2. Quality Control & Quality Assurance at Marks And Spencer's.

    The Self Checking system assures that the products are in good condition before they are used. This means that the amount of faults at the end of the production line is minimal because good quality parts are being used. This reduces wastage and so cuts costs which means the products can be sold at a lower price.

  1. Assessment of the Viability of Opening an Internet Café.

    The fixed costs are fairly high �47852. It shows that I need 7362 customers to cover all my costs, on average I have around 2100 customers per month, meaning I should break-even in around 3 and half months, which is a fairly reasonable pay back period.

  2. customer service with in Sainsbury

    Customers shopping with a child under five years old, at a store with a Sainsbury's controlled car park, can get a Parent and Infant windscreen badge from the Customer Service desk and keep it on their cars. Several types of trolleys are available for various family combinations of babies and toddlers, even for triplets.

  1. For this unit I will be looking at the marketing of an existing service. ...

    I think this ticket will be aimed at customers that use cheaper transport like coaches. This savers ticket will involve competition based pricing. I suggest virgin trains to look at how cheap competitor's prices are. Then based the price of this savers ticket on that information.

  2. business plan and organise event

    The hazard that occurred was that even though many of the people in the room were OK, others had found it too cold or too hot. The solution that was discovered to solve this problem, was that the people who were playing required ventilation, so the playing room was kept

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work