Drivers and Impediments of Computer Security and e-Business Success

Authors(3) :-Seiyaboh Zideigha, Wari Denyefa C., Adoubara Kakandar

In today’s economy, information is one of the most important assets of an organization, probably second only to human resources. Information has become important both as input and output. Hence computer security is of great concern to companies and businesses that want to implement e-business. The internet, which is the primary medium for conducting e-business, is by design an open non-secure medium. Since the original purpose of the internet was not for commercial purpose, it was designed to handle secure transactions and one of the most important issues in e-business is security. This paper explores factors that influence customer’s perceptions of security which influence the success of e-business in Nigeria and also outlines and analyses computer security with regard to online businesses. This is followed by an evaluation of the current tools and practices for ensuring computer security in e-business. The demerits of the present practice are also presented.

Authors and Affiliations

Seiyaboh Zideigha
Department of Mathematics/Computer Science, Niger Delta University, Bayelsa State, Nigeria
Wari Denyefa C.
Department of Computer Science, School of Applied Sciences/ Federal Polytechnic Ekowe, Bayelsa State, Nigeria
Adoubara Kakandar
Department of Computer Science, School of Applied Sciences/ Federal Polytechnic Ekowe, Bayelsa State, Nigeria

Computer Security; E-Business; Internet; Transaction; Access Control

  1. Alan, D.S. and William, T. R., (2002). “E-Lending: Foundations of Financial and Customer Marketing in an Informative Intensive Society”, Journal of e-Business and Information Technology, Vol. 3, No. 1, pp. 5-19
  2. A. Liska, The Practice of Network Security Deployment Strategy for Production Environment. Prentice Hall PTR, Pearson Edcuation Inc., 2003
  3. A. Strauss and J. Corbin, Basics of qualitative research: grounded theory procedures and techniques. SAGE Publication, London, 1990
  4. A. Andreu, Professional Pen Testing for Web Applications, Wiley Publishing Inc., 2006
  5. A. Dent and C. Mitchell, User’s guide to cryptography and standards, Artech House, 2005
  6. BA, S., Whinston, A.B. and Zhang, H. (1999), Building trust in the electronic market through an electronic incentive mechanism, Proceedings of the 20th International Conference on Information Systems, North Carolina, United States.
  7. Beal, V. (2017) “Security: Computer Security” Retrieved from http// (April 14, 2017)
  8. Bellovin, W.A., Fitchen, W.L. Mchugh, J. (2000). Windows of vulnerability: A case study analysis of computer, (December) 52 58.
  9. Breidenbach, S. (ND), “How secure are you?”, Available from:, (April 19, 2007)
  10. Carnegie Mellon University (Cert) (1999). “Deploying firewalls”, Available from:, (April 19, 2001)
  11. Darshand, K. (2005). E-Commerce Security: Attacks and Preventive Strategies.
  12. Eben, O. (2003). A systematic approach to e-Business security, University of New Brunswick, Fredericton, Canada.

Publication Details

Published in : Volume 2 | Issue 5 | September-October 2017
Date of Publication : 2017-10-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 302-308
Manuscript Number : CSEIT172529
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Seiyaboh Zideigha, Wari Denyefa C., Adoubara Kakandar, "Drivers and Impediments of Computer Security and e-Business Success", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 5, pp.302-308, September-October-2017.
Journal URL :

Article Preview