technical and security related problems

p>technical and security related problems

Discuss the main technical and security related problems in internet based e-business activities. Critically discuss with examples.
This question asks you to reflect on the nature of the technologies used to support e-business and specifically to discuss the main technical and security threats these technologies can be cause for e-business.

Even if the question is quite simple and straightforward, it needs to be properly addressed. The question in fact poses specific emphases on e-business activities. The question asks you to discuss the technical and security issues which are associated with either B2C or B2B businesses settings. E-business is always associated with a large set of technical and information related interdependencies. These characteristics are often described as network interdependencies which shape the nature of modern network based technologies. ICTs are not standalone systems but integrated and interdependent systems which are shaped and co-shaped by these interdependencies.

When large amounts of data are stored in interconnected electronic networks they are vulnerable to many more kinds of threats than when they are stored in isolated data bases. The potential for unauthorised access, abuse, or fraud is not limited to a single location but can occur at any access point in the network. Network technologies have therefore technical and security risks which have to be monitored and prevented. These risks can only be understood if the network nature of these technological artefacts is understood.

The question specifically requests you to discuss the nature of these technologies and the technical and security risks they are exposed to.

The answer can also be approached by discussing the risks of opportunistic behaviour for the execution of e-business transactions. Similarly, technical aspects can be identified and infrastructure challenges such as lock-in effects can be discussed. You can also address the jurisdictional problems which international e-business trading faces when exchanges are taking place in the digital environment. Information asymmetries and market process re-engineering are other possible analytical angles which you can use to build a solid argument to answer the question.

This question is quite open to different approaches to the answer. You must however focus on the specificity of the e-business context while discussing the technical and security obstacles.

A good answer will discuss the technical and security challenges of e-business at a general level. An excellent answer will discuss the differences between B2B and B2C when security and technical problems are discussed.

TO ORDER FOR THIS QUESTION OR A SIMILAR ONE, CLICK THE ORDER NOW BUTTON AND ON THE ORDER FORM, FILL ALL THE REQUIRED DETAILS THEN TRACE THE DISCOUNT CODE, TYPE IT ON THE DISCOUNT BOX AND CLICK ON ‘USE CODE’ TO EFFECT YOUR DISCOUNT. THANK YOU