Distribtuted Business Application Coursework

Masters
Essay
Technology
Pages 6 (1506 words)
Download 0
In the modern era, information systems and technology has taken over the business and personal communication. These not only provide bulk of knowledge to users but also contribute towards development of new and value added information systems that have reduced human involvement in business operations to a large extent while ensuring reliability, efficiency and accuracy of data…

Introduction

Whether one is signing up for internet service with Internet Service Provider (ISP), sending emails, browsing internet sites, or using a search engine to locate required information, the identity of the machine is being shared, and it can be misused by someone masquerading as someone else (Webliminal.com, 2007) 2. In addition, many businesses gather and store personal information of the potential new and existing customers in their systems which give rise to privacy and information security issues. When anyone attempts to make a payment online using credit cards and other instruments, the security and confidentiality of the transaction is perhaps, the biggest concern.
Owing to above, users are reluctant to utilise the full potential of internet and web based application systems. Grimm and Rossnagel (2000)3 have introduced a new standard "The 'Platform for Privacy Preferences Project' (P3P) is a standardisation approach of the World Wide Web Consortium for the privacy protection of the web". It guarantees that a user selects and accepts only those services that satisfy his/ her privacy criteria. This is helpful in reducing incidents of compromise of private information.
There are many ways of implementing security over th ...
Download paper
Not exactly what you need?

Related papers

Polygraph Introduction & Application
Polygraph was often used to request for resignation to the dishonest job applicants in those days (Barland, 1978). Later, an important addition in law in 1988 in the US disapproved the firing of employees based on polygraph results. However, several US government agencies practice the applicability of polygraph in the detection of lie (American Polygraph Association, 1983a; 1983b; American…
Bluetooth Application Development
However, when it comes to synchronizing the PDA with the laptop or the phonebook in the cellular phone with PDA/Laptop or just exchanging information with a friend via laptop/PDA one would still need to either use cables to connect the two devices or remove them or have them specifically aligned (as in using Infrared). In either case, the process is quite cumbersome and does not happen without…
General computing coursework
Y is called an inverter because the output is always the inverse of the input.…
E- business
Drucker (1993) predicted that the impact of information technology in the global economy will be as widespread as that during the Industrial revolution. The technical process of information technology (IT) management has become more simplistic with the introduction of conventional approaches. It all revolves around the concept of replacing traditional methods with computers and other gadgets. The…
Open Source Systems Application in the Navy
al, 2006, p.1). As the popularity of open source software increases in the public sector, government are taking necessary actions to gather more information and justification to include open source in high security environments like the military. Selecting the navy as the military branch for open source application, the paper will going to identify the key stakeholders and present the issues…
Video Games Coursework
A sense of more realistic and lifelike games has emerged as the trend starting to and will continue to take part into the future.…
Distribtuted Business Application Coursework
Whether one is signing up for internet service with Internet Service Provider (ISP), sending emails, browsing internet sites, or using a search engine to locate required information, the identity of the machine is being shared, and it can be misused by someone masquerading as someone else (Webliminal.com, 2007) 2. In addition, many businesses gather and store personal information of the potential…