Title: Security, ethics and electronic commerce systems: cybercrime and the need for information sharing security

Authors: Nazzal M. Kisswani, Anas A. Al-Bakri

Addresses: Department of Business Law, Faculty of Business and Economics, Macquarie University, Sydney, Australia. ' Faculty of Business, School of Information Systems, University of Southern Queensland (USQ), Queensland, Australia

Abstract: Electronic Commerce (EC) provides the gateway for an enterprise|s employees, managers, customers (clients), and all trusted suppliers and Trading Partners (TPs) to access electronic data applications and all the information they need (Akoh, 2001). Information security can be defined as the means of protecting data and information systems from any unauthorised access, use, disclosure, modification or destruction with the eventual goals of protecting the confidentiality, reliability and availability of information. When it is done correctly, tangible business benefits can be realised, including increased performance and efficiency, greater transparency and visibility of business processes, awareness of critical assets, risk reduction, and ultimately a direct improvement in the bottom line. Cyber attacks appear to be increasing in frequency, and few are willing to ignore the possibility that the severity of future attacks could be much greater than what has been observed to date. This paper discusses the relationship between security, ethics and information sharing applications such as EC, Business-to-Business (B2B), and Business-to-Commerce (B2C). It also discusses the effect of cyber attacks and the counter measures to restrict them and the issues of information and cyber security, cybercrime, the lawful and unlawful intercept of information flowing over the internet, profiling and information privacy concerns.

Keywords: electronic commerce; e-commerce; information sharing; cyber security; cybercrime; ethics; employees; managers; customers; clients; suppliers; trading partners; electronic data applications; data protection; unauthorised access; disclosure; data modification; data destruction; confidentiality; reliability; availability; business benefits; performance; efficiency; transparency; visibility; critical assets; risk reduction; bottom line; cyber attacks; business-to-commerce; B2C; business-to-business; B2B; intercepts; internet; world wide web; profiling.

DOI: 10.1504/IJLSE.2010.033357

International Journal of Liability and Scientific Enquiry, 2010 Vol.3 No.3, pp.225 - 237

Published online: 01 Jun 2010 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article