Accessing the Global

Submitted by: Submitted by

Views: 38

Words: 4386

Pages: 18

Category: Business and Industry

Date Submitted: 04/20/2015 05:29 PM

Report This Essay

Security considerations of doing business via the Internet: cautions to be considered

Alicia Aldridge Michele White and Karen Forcht

Introduction

Security is one of the most challenging topics faced by companies which wish to go online. When a user attaches to the Internet, anyone from anywhere around the world has access to the information being sent. When a Web server is opened, a window to the local network is provided. The risk of data theft, theft of service, and corruption of data and viruses becomes a reality. The possibility of fraud also increases significantly with the Internet because of the difficulty of accounting for use of the service. Companies need to focus more on security; however, 59 percent say they lack human resources, and 55 percent state they do not have a budget to support Internet security (Internet Security Survey Results, 1996). “The risks of working and doing business in cyberspace are present because there is also a tremendous potential for reward. As long as we keep our eyes open, assess the risks realistically, and take intelligent precautions, we can navigate cyberspace knowing that our own networks are safe from unwanted intrusion” (Russell, 1995).

The authors Alicia Aldridge is an Associate Professor in the Department of Marketing, Walker College of Business, Appalachian State University, Boone, NC, USA. Michele White is a Researcher and Karen Forcht is a Professor, Department of Information and Decision Sciences, both at the College of Business, James Madison University, Harrisonburg, VA, USA. Abstract Looks at the growth and potential of the Internet in relation to security issues. Presently, lack of security is perceived as a major roadblock to doing business online. Risks of system corruption, fraud, theft and viruses point companies to the need for enhanced security. Investigates the importance of securing a company’s systems, its individual users and its commercial transactions, and provides a checklist along with a...