Sunday, March 31, 2019
Discussing The Problems Of Online Shopping Information Technology Essay
Discussing The Problems Of Online Shopping Information Technology EssayThe aim of this literary productions review is to hypercritically analyze the various problems/solutions of online shop brass, and benefits of online obtain arranging in Nigeria.IntroductionIn Nigeria, different business and market proceedings be being place face to face ie buy and selling of different dear(p)s and service argon been d whiz in the market. Implementations of online obtain practices has been difficult and touch ond with a lot of problems such as user silence , in shelter and hope has made it not visible for such to be implemented.The meshing as a global network which allows plenty to communicate, fulfill business transactions, send, store and receive knowledge.The internet has become an improtant process to everyday life and different people from different countries use the internet in order to carryout their effective skills in their different professions and for income reserva tion.Looking at online shopping as the case study, today online shopping is becoming popular to people/client and consumer as another channel and fast means of making business transactions and client satisfaction. According to (bbc) statistics, showed in december 2008 defecate reviewed the statistis of 50% rise in 2008 christmas online shopping, however (www.nma.co.uk) in febuary 2010 recorded the sales of 4.1billion pounds for online retailers and a rise of 13% in febuary 2010.problems of online shoppingBelanger, F (2002) identify solitude, security and trustworthiness as a major factor that disallow people from shopping online. it is important to understand this factors that king prevent client or users from shopping online and some of this factors include solitude seclusion which is a most important problem that stops people from shopping online or using the internet above the problem of cost and convienence giving. It is the impart of the node to share entropy online for purchase, that it is clear that clients concern with covert of selective information is having effect on shopping online and therefore to re clear this problem, screen potentials take in to be further addressed (Belanger. F, p 4).In 2000, pew internet and American life reported that 66% of users proposed that online tracking should be forbid and 81% supported for rules to be implemented in online information systems and in 2002 National Consumers League survey, respondents ranked individualized privacy above wellness care, education, crime and taxes as concerns to users (Paul, 2001) as cited by Belanger. F (2002) .Privacy final payments on the Internet include spam, usage tracking and data collection, choice, and the sharing of information with third parties. These areas of fear are found in the taxonomy draw by Huaiqing, W (1998), are reflected in the Federal Trade Commissions standard for privacy on the Internet. The FTC identifies notice, choice, access and security as elements of a pleasing privacy policy. Customers guarantee that the information shared give be subjected to personally adumbrate limits is the essence of privacy on the Internet. Therefore, for this research the translation of privacy that is follow is the faculty to manage information about oneself.SecuritySecurity holy terror has been defined as condition, state, or event which is possible to cause economical adversities to data or network resources in the form of destruction, exposure, change of data, demurrer of service, fraud, waste, and abuse (Kalakota and Whinston, 1996). Security, then, is the justification against these threats. Under this definition, threats can be made every through network and data transaction attacks, or through unofficial access by means of false or defective authentications. This definition must be tailored in order to be applicable to customer transactions to acknowledge that customers information has value. For customers, it must be r ecognize that economic hardship include damages to privacy that is loss of information as well as theft, for example, credit information and authentication sequels for customers go out be reversed. This definition explains the security threats from a customers point of view. Security in online shopping is reflected in the technologies used to protect and secure customer data. However Security concerns of customers may be addressed by many of the same(p) engineering science protections as those of businesses, such as encryption and authentication. Our description of privacy and security is similar to the distinction that Hoffman .L (1999) use in identifying environmental look as separate from control over secondary use of information, described above. Environmental control refers to customers concerns with sharing information online due to expectations of threats to online security, including fear of hackers and individuation theft.TrustworthinessFor People to solve important buying and selling decisions is establish on their level of trust in the product, salesperson, and the company (Hosmer, 1995). Similarly, online shopping decisions rent trust not simply between the shop merchant and the customer but withal between the customer and the computer system through which transactions are executed (Lee and Turban, 2001). Although many studies confuse identified the critical role of customers trust in online shopping, two critical issues have hampered semiempirical investigations of the impact of customers trust on on-line shopping activities. The first issue is focused on the lack of agreement about the definition of online customer trust (Lee and Turban, 2001). Although most of these definitions capture the notion of risk taking, many are merely operationally taken from the traditional shopping literature and utilize to the online context. More importantly, few of these definitions specify the on-line trust equivalent for example, Moorman (1993, p. 82 ) . Defines customer trust as a testamentingness to rely on an exchange associate in whom one has confidence. This definition suggests that trust reflects a continuum of keenness that is readiness to engage in a relationship with the other ships company, such as a salesperson (Crosby, 1990) . Rather than focusing on trust in individuals, this study focuses on the electronic organization as well as its site as the exchange party. The second issue hinder richer examinations of online customer trust as the lack of experimental notice given to one critical precursor of customer. (Lee and Turban, 2001) Several researchers have identified three briny elements of trustworthiness ability, unselfishness, and integrity (Mayer, 1995 Lee and Turban, 2001). According to (Mayer,1995 Lee and Turban, 2001), the ability of a merchant is reflected in its ability to handle sales dealings and the expertness to generally conduct business online. In contrast, perceived integrity is depict of the mar keters honesty and sincerity. Finally, kindness was defined as the extent to which the trusting party believes that the trusted party wants to do good things rather than just maximize profit. In contrast to the other two transaction focused magnitude, kindness reflects perceptions of the marketers willingness to engage in flexible or humanitarian commitment to its customers. A similar dimensional distinction can be found in the corporate social responsibility literature (Carroll, 1979 Smith., 2001) cited by Belanger. F (2002) . supernumerary insights from this literature also indicate that a firms economic responsibilities that is to make a profit and its flexible responsibilities are often negatively correlated (Ibrahim, 1997) cited by Belanger. F (2002). These findings suggest that customers expect marketers to be have high ability primarily focus on maximizing profits often at the cost of being kind.SolutionsTechnology solutionsWinnie, C and John,P (2002, P 7) suggested that the advance of technology could be used as a solution for privacy protection and described two examples of this technologies. Firstly one established standard is called course of study for Privacy Preference. The privacy preference system works through meshwork browsers to automatically alert users to what information is being collected online. The aim of privacy preference system is to have a common privacy wording and standard on the internet that provides a rich language for services to express their information practices and for users to express their privacy preferences. Users will be warned and have an alternative to leave if the site is gathering information for shopping purposes also they can choose to give their private information simply to sites that will not use it for shopping. Thus, privacy preference system technology helps users make informed decisions about when to drop off their data.Secondly is the anonymizer which ensures users surfing the web anonymously, will hide their surfing history when users are browsing the web. It will not stop cookies, but it will allow users to surf the Internet eon withholding their IP addresses and other information about them. This ensures that the identity of the users will not be identified. Recently, a new privacy enhancing cookie charge feature has been released for Internet Explorer with this version, users will be asked and prompted in situation before letting a cookie enter into the system. A description of all cookies and their purpose will be given plus a clear distinction between first and third party ones. A default setting will alert the user when a unrelenting third party cookie is being served or read on the users system. It is argued that technical solutions cannot solve the privacy concerns permanently. Although the advance of technology is able to solve the privacy concerns at the moment, it will not work in the closelipped future. Web sites can also utilise advances of technology to obt ain personal information as the technology evolves. Thus, just using technological solutions is not reliable in terms of privacy concerns.Combination solutionsWinnie, C and John,P (2002, P 7) also believed that using a combination solution is possible to come through privacy protection in a globally consistent manner. The combination of legislation, self regulation and technical solutions may provide synergy that is more(prenominal) effective than a single solution. Users must be assured that when they release their data, services will use it only as they have promised. canon and self-regulatory regime can help in providing such assurances. While self-regulation and privacy enhancing technologies are welcome developments in order to enhance privacy protection, they might not be sufficient by themselves and they could be accompanied by legislation.Security solutionIBM (2005) stated that there are three important concept of security confidentiality, integrity, and availability. C onfidentiality which only permit authorized parties to read protect information and also talked about three types of security categories1. Authentication fix who you are. It requires that you are the only one authorized to logon to the shopping system.2. Authorization This allows only the user to manipulate his resourcesIn Specific ways.3. Encryption Deals with information concealment which prevent unauthorisedUser from accessing customer information.conclusionsThe egression of online shopping system is non-stoppable. Yet, online users spending only accounts for about 1.7% of overall revenues. The privacy, security and trust concerns are posing a barrier to the Development of online shopping in Nigeria. It is an issue that online Shopping system cannot afford to ignore because privacy, security and trust concerns are blocking online sales. And the key is that Companies doing online sales need to manage and meet their customers expectations where privacy, security and trust is co ncerned. A web site with a privacy, security and trust statement tells customers that their privacy right is being considered. It would not be good for the shopping system if a client finds that something unannounced has happened to their information, perhaps an unexpected access from unauthorised users. Shopping business open about their practice and abiding by their privacy and security statements will win both(prenominal) customers confidence and custom to shop online. For online shopping to succeed in Nigeria, online shopping must build trust with millions of consumers. Respecting consumers privacy and security is necessary in order to boost the growth of electronic commerce. Therefore it is believed that global symmetry on Internet privacy and protection is important to boost the growth of shopping online.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.