What Can Be Done to Improve E-Commerce SecurityAcademic Skills and EmployabilityAllan Augustin[Choose Date]Content PageIntroduction 3.1Discussion 3.2Ways to Improve E-Commerce Security e-commerce on the Internet 4.1Secure socket Layer (SSL) 5.1Access control security measures 5.2Firewall 6.1Encryption 6.2Conclusion 7References 8Introduction 3.1The purpose of this document is to present the illustration of different techniques or methods that can be used to secure the e-commerce security. E-commerce refers to the exchange of services and goods on the Internet. In the current era, a large number of companies and organizations are transforming their business operations from traditional business environment to e-commerce environment (Ngai & Gunasekaran, 2007, p. 45). It is due to the fact that e-commerce business allows organizations and businesses to increase their revenues by reducing operational costs. In addition to all these benefits, e-commerce also comes with several problems. Security is considered one of the major concerns associated with e-commerce. The process document incorporates a brief but in-depth analysis of methods that can help organizations improve the security of electronic commerce on the Internet. Discussion 3.2 E-commerceE-commerce or electronic commerce is nothing more than the exchange or retail sale of services or products which is usually conducted through computer networks, usually the Internet (Turban, 2009, p. 90). Although e-commerce depends on various technologies such as telephones, social media, mobile devices, email, etc., but mainly e-commerce operations are based on the World Wide Web (Zhang, 2012, p. 232). Therefore, e-commerce may face various… middle of paper… MH, Okeke, R., & Ahmed, R. (2013). Privacy and Trust Issues in E-Commerce: Exploring the Customer Perspective, TextRoad, p. 99, retrieved from http://www.textroad.com/pdf/JBASR/J.%20Basic.%20Appl.%20Sci.%20Res.,%203%283%29571-577,%202013.pdfSmith, H.J., Dinev , T., & Xu, H. (2011). Information privacy research: An interdisciplinary review. Quarterly MIS, page 88, retrieved from http://dl.acm.org/citation.cfm?id=2208950Turban, E., Lee, J.K., King, D., Liang, T.P., & Turban, D. (2009). Electronic Commerce 2010. Prentice Hall Press, p. 90, retrieved from http://dl.acm.org/citation.cfm?id=1816466Zhang, Y., Deng, X., Wei, D., & Deng, Y. (2012). Evaluating e-commerce security using AHP and evidentiary reasoning. Expert systems with applications,p. 232, retrieved from: http://www.sciencedirect.com/science/article/pii/S0957417411013601
tags