Thursday, February 14, 2019
Research Methods Essay -- Research Analysis
research Methods 3IntroductionE- calling is an fill step to the fore that has been extremely popular for the past duette of years after insane asylum of the internet, many corporations were undecided on whether to use the opportunity. However, this concept has slowly been accept and many companies are using the opportunity to expand the popularity of their brands. However, E-business has a couple of challenges that need to be tackled in order to make internet business safe and reliable. The following research proposal will look into the practical methods of investigating into the exposure of consumers of online products. Background informationMany corporations save deceased online to market and sell their products and consumers are increasingly engaging in E-business. melody has shifted from the traditional over-the-shelf method to the contemporary internet based businesses, with consumers and companies communicating and carrying out transactions online. This has however c reated an opportunity for hackers and other online criminals who create replicas of trustworthy websites by altering a single digit for hosting to be possible these fraudsters have managed to rip off unsuspecting consumers of their money pretending to be the genuine companies. Hacking of credit card details online and taking massive cash from the consumers illegitimately using rogue technology, creates a question of how vulnerable the consumers are and the get of personal information the consumers should provide to avoid this vice from taking place. Research Questions and ObjectivesThe following research is meant to develop an understanding on the level of vulnerability of online consumers. In addition, the research is meant to rate the level of preparedness of onlin... ...easing or fall and statistical tools used to eliminate errors in the findings. Works CitedArora, K. (2011). How to protect online contentedness from theft. Retrieved from http//www.quickonlinetips.com/archi ves/2011/05/protect-online-content-theft/BBC. (2010). E-crime police arrest 19 over UK online bank theft. Retrieved from http//www.bbc.co.uk/ intelligence activity/uk-11431989Identity larceny Technology Council. (2005). Online identity theft Phishing technology, chokepoints and countermeasures. Las Vegas, NV Identity Theft Technology Council.Mccurry, M. (2011). Congress must combat online theft. Retrieved from http//www.politico.com/news/stories/0611/56984.htmlOnguardonline. (2011). Identity theft. http//www.onguardonline.gov/topics/identity-theft.aspx memorial tablet for Economic Co-operation and Development. (2009). Online identity theft. Washington, DC OECD.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment