Drivers and Impediments of Computer Security and e-Business Success

Authors

  • Seiyaboh Zideigha  Department of Mathematics/Computer Science, Niger Delta University, Bayelsa State, Nigeria
  • Wari Denyefa C.  Department of Computer Science, School of Applied Sciences/ Federal Polytechnic Ekowe, Bayelsa State, Nigeria
  • Adoubara Kakandar  Department of Computer Science, School of Applied Sciences/ Federal Polytechnic Ekowe, Bayelsa State, Nigeria

Keywords:

Computer Security; E-Business; Internet; Transaction; Access Control

Abstract

In today’s economy, information is one of the most important assets of an organization, probably second only to human resources. Information has become important both as input and output. Hence computer security is of great concern to companies and businesses that want to implement e-business. The internet, which is the primary medium for conducting e-business, is by design an open non-secure medium. Since the original purpose of the internet was not for commercial purpose, it was designed to handle secure transactions and one of the most important issues in e-business is security. This paper explores factors that influence customer’s perceptions of security which influence the success of e-business in Nigeria and also outlines and analyses computer security with regard to online businesses. This is followed by an evaluation of the current tools and practices for ensuring computer security in e-business. The demerits of the present practice are also presented.

References

  1. Alan, D.S. and William, T. R., (2002). “E-Lending: Foundations of Financial and Customer Marketing in an Informative Intensive Society”, Journal of e-Business and Information Technology, Vol. 3, No. 1, pp. 5-19
  2. A. Liska, The Practice of Network Security – Deployment Strategy for Production Environment. Prentice Hall PTR, Pearson Edcuation Inc., 2003
  3. A. Strauss and J. Corbin, Basics of qualitative research: grounded theory procedures and techniques. SAGE Publication, London, 1990
  4. A. Andreu, Professional Pen Testing for Web Applications, Wiley Publishing Inc., 2006
  5. A. Dent and C. Mitchell, User’s guide to cryptography and standards, Artech House, 2005
  6. BA, S., Whinston, A.B. and Zhang, H. (1999), Building trust in the electronic market through an electronic incentive mechanism, Proceedings of the 20th International Conference on Information Systems, North Carolina, United States.
  7. Beal, V. (2017) “Security: Computer Security” Retrieved from http//www.webopedia.com/TERM/S/security.html (April 14, 2017)
  8. Bellovin, W.A., Fitchen, W.L. Mchugh, J. (2000). Windows of vulnerability: A case study analysis of computer, (December) 52 – 58.
  9. Breidenbach, S. (ND), “How secure are you?”, Available from: http://www.informationweek.com/800/prsecurity.htm, (April 19, 2007)
  10. Carnegie Mellon University (Cert) (1999). “Deploying firewalls”, Available from: https://www.cert.org/security-improvement/module/m08.html, (April 19, 2001)
  11. Darshand, K. (2005). E-Commerce Security: Attacks and Preventive Strategies.
  12. Eben, O. (2003). A systematic approach to e-Business security, University of New Brunswick, Fredericton, Canada.

Downloads

Published

2017-10-31

Issue

Section

Research Articles

How to Cite

[1]
Seiyaboh Zideigha, Wari Denyefa C., Adoubara Kakandar, " Drivers and Impediments of Computer Security and e-Business Success, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 5, pp.302-308, September-October-2017.