TITLE

ADDRESSING E-Commerce EXPOSURES

AUTHOR(S)
Morris, Barbara A.
PUB. DATE
November 2001
SOURCE
Financial Executive;Nov2001, Vol. 17 Issue 8, p40
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
The article discusses the risks faced by firms that engage in online commerce. Doing business over the Internet presents several potential sources of liability, ranging from computer viruses and hackers that compromise the safety of data, to employees who download inappropriate materials onto their computers. To properly insure against Internet-related risks firms need to first assess their vulnerability. Facilitating credit card transactions, storing customer data, and publishing content on the Internet, among other activities, all introduce elements of risk. INSET: Tips for Limiting E-Business Exposure..
ACCESSION #
11863092

 

Related Articles

  • Identity protection and patching top IT concerns. Goodwin, Bill // Computer Weekly;1/13/2004, p4 

    The article predicts about various security problems faced by IT organisations in the year 2004. Many users will be left grappling with increasingly complex issues of security architecture, patch management, authentication and legislation, as well as the perennial problem of hacking and viruses....

  • Government hacks should spur IT security sweep. Rapoza, Jim // PC Week;06/07/99, Vol. 16 Issue 23, p1 

    Asserts that the incidence of hacker attacks on government Web sites should motivate information technology (IT) managers to check the integrity of corporate sites. The view that many attacks succeed because site developers and administrators do not take sufficient time to ensure that their...

  • The Defense Never Rests.  // CIO Insight;May2007, Issue 81, p93 

    The article offers four trends to improve information technology (IT) security in the U.S. Firstly, it has been observed that the small companies are losing their confidence in providing adequate protection against viruses and hackers. Secondly, IT executives believe that the Windows device...

  • E-mail Viruses Can Create Havoc For Insurers. Stucker, Hal // National Underwriter / Property & Casualty Risk & Benefits Manag;06/05/2000, Vol. 104 Issue 23, p3 

    Focuses on the problems facing corporate information technology departments on software program viruses. Details on the I Love You bug; Role of social engineering in the creation of viruses; Things that the bug was programmed to do.

  • Electronic commerce under serious attack. Pieterse, Gerry // Finance Week;07/14/2000, p29 

    Focuses on the various threats to the electronic commerce industry. Threat from computer hackers; Threat posed by the advent of undetectable viruses; Inadequacy of the industry's defense against certain forms of intrusion; Best way to safeguard information; Reason for the proliferation of...

  • Risk management – visual IDS countermeasures. H. Read; A. Blyth // BT Technology Journal;Jan2007, Vol. 25 Issue 1, p201 

    Abstract  As most major organisations increase their reliance on the Internet, they find the facilities and services made available to them in the area of eCommerce also bring a number of associated risks. The organisations may be exposed to tangible loss of revenue and also to intangible...

  • Turning the Corner: Mislabelling of Online Shops. Ay-Hwa Andy Liou; Maw-Nian Wang // Information Technology Journal;Jul2011, Vol. 10 Issue 7, p1442 

    The booming development of E-Commerce saw the trading volumes grow each year. One of the risks for retailers engaging in electronic commerce is the dreaded pricing error. However, there have been instances of mislabelling on websites. As soon as hackers spot any deviation of online price tags...

  • IT security under the gun. Fonseca, Brian // InfoWorld;03/12/2001, Vol. 23 Issue 11, p12 

    Reports on the challenges for information technology security managers in the United States as of March 2001. Problems with hackers and worm computer viruses; Report from the National Infrastructure Protection Center; Benefits from early detection of security threats.

  • Security. Skratt, Alison // IEEE Internet Computing;Jul/Aug2005, Vol. 9 Issue 4, p15 

    This article discusses topics on computer security featured in various periodicals as of August 2005. An international nonprofit security organization, the Honeypot Project, recent launched a study to determine why no one is hacking Linux anymore. An unintended result, the organization found...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics