Information Security Management Essay Example
Information Security Management Essay Example

Information Security Management Essay Example

Available Only on StudyHippo
  • Pages: 3 (688 words)
  • Published: September 28, 2018
  • Type: Case Study
View Entire Sample
Text preview

Information technology has greatly contributed to the advancement of the business industry, specifically in e-commerce.

eBay, a major e-retailer, faces numerous ethical and legal challenges related to human behavior. Multiple hacking incidents have surprised the online community and the e-commerce industry. This report investigates eBay's management of information security to achieve business success and customer satisfaction while exploring associated ethical and legal concerns. The investigation reveals several predicaments that eBay confronts in its approach to managing information security.

eBay successfully addressed significant concerns, including safeguarding against online fraud and hackers, as well as implementing a program to protect intellectual property rights. The advent of information technology greatly impacted the business industry, bringing about the rise of e-commerce in the past decade.

The internet retailing industry has new notable figures rising

...

to leadership positions, with eBay being a major player in web-based sales of goods and services from both individuals and small businesses. The platform facilitates auction and fixed-price transactions, with millions of items being traded. Additionally, eBay has developed localized sites to better connect with its global customer base.

Although there are laws prohibiting illegal actions in internet commerce, the growth of IT has resulted in the emergence of new types of online crimes. Hackers try to infiltrate company databases so they can steal passwords, access other accounts, create fraudulent auctions, destroy data, sell stolen data and even steal identities. Maintaining information security is challenging in this environment as evidenced by frequent attacks on eBay - a major business center. Identity theft is one of the most common crimes committed by hackers.

The goal of eBay is to effectively combat cybercrime and achieve success in their business operations. This report

View entire sample
Join StudyHippo to see entire essay

aims to establish the definition of information security, pinpoint ethical and legal quandaries involved in managing it on eBay, and examine how they have prevented third-party attacks to safeguard consumer privacy and business growth. In e-commerce, upholding the confidentiality of personal data is crucial.

Consumers generate personal information in their daily routine, whether consciously or unconsciously. This data is recorded in databases through actions such as opening email accounts, making credit and debit card transactions, and browsing and purchasing on the internet. Companies like eBay rely on these databases for e-commerce, which involves the automated recording and verification of customer-provided data during transactions.

When it comes to accessing a customer's personal records and profile in e-commerce, their personal data is the main factor. If this information is neglected, entry into their account becomes impossible. To prevent third-party interference, maintaining confidentiality of private data is crucial. The ultimate objective of information security is to safeguard data from unauthorized access, alteration, utilization, disclosure or disruption. Information security practices are guided by three fundamental principles: confidentiality, integrity and availability. Any unlawful acquisition of information constitutes a violation.

The prevalence of inadvertent or deliberate incidents on the internet, including message interception, data theft, information sabotage, spoofing, and denial of service can be attributed to hackers. One example of a business operating in this online environment is eBay's e-Commerce platform. (i.).

The internet has enabled various business activities, such as distribution, retailing, buying and selling, collectively known as electronic commerce. Users need to fill out an electronic form that records their personal data in the company's database to participate in these transactions. Although eBay allows users to browse for products without registration, purchasing requires

customers to provide their personal information.

Once the registration process is complete, eBay users have access to a range of services. These services encompass the ability to browse detailed information on listed items, purchase products, and create auctions for selling personal goods. For buying, eBay offers two options: auction-style bidding where individuals place bids on an item until the highest bidder secures ownership.

The Buy it Now option on eBay allows buyers to purchase items immediately using either credit card or cash. While most sellers prefer credit cards for faster fund transfers, eBay cautions against fraudulent auctions set up by some sellers who may not actually have the item available. To help ensure customer information is secure, eBay relies on customers to cooperate in their efforts.

Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New