Elucidating the ethical sales behavior in electronic commerce Strip cam free no sign up
Abstract LIST OF TABLES LIST OF FIGURES Chapter 1.0 Introduction 1.1 Background of the Study 1.2 Research Background 1.3 Organisational Background 1.3.1 Amazon 1.3.2 Ebay 1.4 Rational for chosen Topic 1.5 Research Questions 1.6 Research Objectives 1.7 Significance of study 1.8 Structure of the dissertation CHAPTER 2.0 LITERATURE REVIEW 2.1 Introduction 2.2 E-Business and E-Risk 2.3 E-commerce and using The Internet 2.4 What Constitute Cybercrime 2.5 Types and Costs of Cyber crime 2.6 Cases on Cyber crime 2.7 Cyber attack and Company Performance 2.8 Curbing Cybercrime and Digital Forensic 2.9 Supplementary Threats to Computer Security 2.10 Ensuring Ethics in Digital Forensic Investigation CHAPTER 3.0 Research Methodology 3.1 Philosophy of Research 3.1.1 Positivism 3.1.2 Interpretivist 3.1.3 Rational for chosen Approach 3.2 Research Design 3.2.1 Explorative Research 3.2.2 Descriptive research 3.2.3 Hypothesis Testing 3.3 Research Approaches 3.4 Research Methods 3.4.1 Primary methods of collecting Data 3.4.2 Interview: 3.4.3 Observation 3.4.4 Questionnaire 3.5 Sampling Method Chosen 3.6 Data Collection with Questionnaire 3.7 Mean 3.8 Limitation of Study 3.9 Data Analysis 3.10 Ethical Issues CHAPTER 4.0 Findings and Data Analysis CHAPTER 5.0 Conclusion 5.1 Growing Security Threat 5.2 Recommendations 5.2.1 User security policy 5.2.2 Internet port Security References APPENDIX 1 (Questionnaire) APPENDIX 2 Types of Cyber Crime APPENDIX 3 Websites promoting Security for E-commerce companies Table 4. Rajendra Kumar thanks you for been my supervisor, your periodic input has made this works a success thank you and all the entire Lecturers of the LSC/SBL. Finally want to say a big thank you to my immediate family for their support and sacrifices in every way, my wife Joan K. The growth of the e-commerce industry has facilitated the progress and relative growth of many businesses, it has cut down cost associated with big offices and the like, it has also brought convenience to both customers and business owners, thus a customer can buy verity of products at the comfort of His/her home by a click of the button or even the use of the mobile phone. Figure 4.6 How often respondents visit e-commerce sites to transact business illustration not visible in this excerpt I would give Praise and thanks to the Almighty God for the enablement and provisions He gave me throughout this programme, and the God is Able Ministry International (UK) for their support.a) ERD (Entity Relationship Diagrams) b) STD (State Transition Diagrams) c) Context Diagrams.d) DFDs (Data Flow Diagrams) e) Data Dictionary (DD) ( revised 04/08/200)Basic Information Systems 9.1 Financial Information System model 9.2 Production/Operations System model Integration of subsystems through the Information flow in production/operations system 9.3 Marketing Management Information System model The history of information systems (IS) only span five decades.The advent of cyber crime which seeks to perpetrate all form of crime on online related transaction, such as hacking into systems illegally and stealing individual customer financial particulars, their confidential information and identity theft has become rampant.There is therefore the need to whip- up competent computer skills such as the use of digital forensics to combat these security problems that confront e-commerce.
Today the backbone of IS is know as the World Wide Web, Internet, or with a business a Local Area Network, along with lists of acronym buzz word; EDI, EIS, ERP, SCM and host of others to describe new ways in which IS can be employed to grow business. Educational background of respondents Table 4.4 Employment Status of respondents Table 4.5 how respondents paid for items online Table 4.6 How respondents rate their knowledge in computing Table 4.7 Banks giving customers education, guidance and counselling on online transaction Table 4.8 E-commerce sites frequently visited by respondents Figure 4.1 the E-commerce sites respondents have confidence in Figure 4.2 Responses on respondents encounter of any form of fraud, delays in online transaction Figure 4.3 Respondents visiting the wrong sites unknowingly Figure 4.4 how respondent’s online transaction challenges were addressed Figure 4.5 what respondents will do differently when visiting a new site for transaction?