logo

Cyber Security Challenge on Online Shopping

   

Added on  2020-03-04

8 Pages2150 Words108 Views
Running head: CYBER SECURITY CHALLENGE ON ONLINE SHOPPINGCyber Security Challenge on Online ShoppingName of the StudentName of the UniversityAuthor Note

1CYBER SECURITY CHALLENGE ON ONLINE SHOPPINGIntroductionThe aim of this report is to enhance awareness on the cyber security while doingonline shopping and making transactions or paying for any product. One of the popularshopping portals of UK has been chosen in this project to compare its cyber security systemand comparison has been done by ten peer-reviewed journals based on the cyber securityawareness on online shopping. Internet has become an integral part of the lives of citizens ofUK, online shopping is attracting various internet users because of their easy and fast activityand responses on the product an individual want to buy. This has increase the probability ofmore cyber crime cases related to the finance and money transaction. This report emphaseson the techniques or ways by which an individual come over such cyber crime issues with thereference of many experienced writer and their peer-reviewed journals.ASOSWithin its slogan ‘discover fashion online’ ASOS is one of the leading and favouriteonline portals for the citizens of United Kingdom (UK). ASOS sells cutting-edge fashion andoffer varieties of products related to fashion which is making ASOS.com a hub of thrivingfashion community. ASOS sell more than 80,000 branded products including its own-brandproducts to mobile and web users. It has expanded market in UK, US, China, Europe andmany other countries in the world(ASOS.com, 2017). The mission of ASOS is ‘to becomethe world’s number-one online shopping destination for fashion-loving 20-something’. It hasmore than 21 million followers in the social media platforms who engaging with theorganization every day.

2CYBER SECURITY CHALLENGE ON ONLINE SHOPPINGLiterature ReviewIt is the responsibility of the development team of an organization doing onlinebusiness to be reactive and proactive towards the concern of security threats in onlineshopping and e-commerce where as shoppers should be vigilant while buying any onlineproduct (Damodaran & Helminen, 2016). According to Clarke, Thompson and Birkin (2015)E-commerce is growing in a very rapid manner due to the options of choosing wide varietiesof products and many technologies which are new and innovative are being involved in theproliferation of e-commerce. An individual of UK should read and implement the guidelinesabout securing networks and systems available for securing online transaction duringshopping online for any product (Clarke, Thompson & Birkin, 2015). They have proposedlatest evidence of consumption patterns in the UK population by various relative graphs andpictured how fast online shopping is spreading in the UK economy.Iqbal and Hunjra (2012) defined e-commerce which is completely same process asonline shopping and stated that online shopping is a part of e-commerce. They have analyzedand compared market status and analysis of different developing countries including UKbased on factual data. It was concluded in the paper that there is the need to increase expertisefor the improvement of IT security among the organization and make databases more secured(Iqbal & Hujra, 2012). Reviewing the annual report of ASOS, various ups can be seen as theyhave strengthened their dedication through discreet IT security team (ASOS, 2017). Thisemphases on mitigating both internal and external data and IT security threats by increasingcapability of team by involving expert and experienced IT members. Relating this context a paper was written by Amer et al., (2013) which focus on theincrement of online shopping practice by internet users and relative cyber security threatsraised due to practicing online shopping for buying any product. This paper involved e-commerce, online shopper to make the topic much clear. Paper has reviewed habits of online

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
ASOS: An Analysis of Digital Business Strategies and Cyber Security Measures
|11
|634
|293

Internet and E Business Assignment (Solved)
|17
|5323
|405

Digital Business: Key Trends, Models, Collaborative Relationships, and Crypto Currency Impacts
|12
|3643
|220

Internet and E Business - Sample Assignment
|22
|4740
|341

Advantages and Key Trends of Digital Technology in Digital Business
|13
|3994
|381

Key Trends and Benefits of Digital Technology in Online Business of Amazon
|9
|3337
|267