02.06.2013 Views

E-commerce - Cape Peninsula University of Technology

E-commerce - Cape Peninsula University of Technology

E-commerce - Cape Peninsula University of Technology

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 2: Literature review Page 39<br />

client. However, technological impediments exist in the security<br />

technologies that prevent hackers from attacking the client and server<br />

sites themselves (McCrohan, 2003).<br />

Transaction security concerns typically involve issues <strong>of</strong> either<br />

privacy or guarantees <strong>of</strong> knowing to whom one is sending or from<br />

whom one is receiving data. Much <strong>of</strong> the anxiety over Internet<br />

security is unfounded and not a result <strong>of</strong> actual technological flaws.<br />

Primarily, weaknesses in Internet security are the failure to utilize<br />

existing security features <strong>of</strong> the Internet such as authentication and<br />

encryption (De Borchgrave, Cilluffo, Cardash & Ledgerwood, 2000).<br />

Just as a phone line can be tapped, an Internet message can be<br />

overheard by various sources. Fear <strong>of</strong> privacy breaches over the<br />

Internet is a product <strong>of</strong> its design. One core problem is that the Internet<br />

is a very public and accessible communications network. Data<br />

transmitted can be intercepted fairly easily. If not scrambled or made<br />

uninterpretable during transmission, messages can likewise be easily<br />

read at any forwarding node on the Internet (Gordon, Loeb, Lucyshyn<br />

& Richardson, 2005).<br />

Internet technology is no better or worse than telephone technology in<br />

guaranteeing that the person on the other end <strong>of</strong> the line is who they<br />

claim to be. Short <strong>of</strong> having a guarantor analogous to a thumb print or<br />

a signature, one cannot be sure with whom one is dealing. To secure<br />

Internet computing, technology was created to conceal messages and<br />

guarantee the identity <strong>of</strong> people on each end <strong>of</strong> the transmission.<br />

Digital signatures, Secure Electronic Transaction (SET), and similar<br />

technologies can act as guarantors for the transaction, assuring<br />

interested parties that the signatories involved currently exist and are<br />

who they claim to be (Gordon, Loeb, Lucyshyn & Richardson, 2005).

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!