E-commerce - Cape Peninsula University of Technology
E-commerce - Cape Peninsula University of Technology
E-commerce - Cape Peninsula University of Technology
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Chapter 2: Literature review Page 39<br />
client. However, technological impediments exist in the security<br />
technologies that prevent hackers from attacking the client and server<br />
sites themselves (McCrohan, 2003).<br />
Transaction security concerns typically involve issues <strong>of</strong> either<br />
privacy or guarantees <strong>of</strong> knowing to whom one is sending or from<br />
whom one is receiving data. Much <strong>of</strong> the anxiety over Internet<br />
security is unfounded and not a result <strong>of</strong> actual technological flaws.<br />
Primarily, weaknesses in Internet security are the failure to utilize<br />
existing security features <strong>of</strong> the Internet such as authentication and<br />
encryption (De Borchgrave, Cilluffo, Cardash & Ledgerwood, 2000).<br />
Just as a phone line can be tapped, an Internet message can be<br />
overheard by various sources. Fear <strong>of</strong> privacy breaches over the<br />
Internet is a product <strong>of</strong> its design. One core problem is that the Internet<br />
is a very public and accessible communications network. Data<br />
transmitted can be intercepted fairly easily. If not scrambled or made<br />
uninterpretable during transmission, messages can likewise be easily<br />
read at any forwarding node on the Internet (Gordon, Loeb, Lucyshyn<br />
& Richardson, 2005).<br />
Internet technology is no better or worse than telephone technology in<br />
guaranteeing that the person on the other end <strong>of</strong> the line is who they<br />
claim to be. Short <strong>of</strong> having a guarantor analogous to a thumb print or<br />
a signature, one cannot be sure with whom one is dealing. To secure<br />
Internet computing, technology was created to conceal messages and<br />
guarantee the identity <strong>of</strong> people on each end <strong>of</strong> the transmission.<br />
Digital signatures, Secure Electronic Transaction (SET), and similar<br />
technologies can act as guarantors for the transaction, assuring<br />
interested parties that the signatories involved currently exist and are<br />
who they claim to be (Gordon, Loeb, Lucyshyn & Richardson, 2005).