Friday, December 27, 2019

Racism Is Still Alive Today - 1238 Words

Avery Matney Mr. Berkoben English IV 13 November 2015 Racism in Oklahoma Everyone is different. No matter what you look like, where you came from, or how you grew up. Race does not define a person. Racism issues have appeared throughout many different generations. In Oklahoma, there are factors of events proving that racism is still alive today. Racism is any negative thought or action toward members of a racial minority or any manifestation of racial inequality. There are different types of racism: Individual racism, Institutional racism, and Cultural racism. This essay will analyze racism and certain component parts: causes, effects, prevention. There are various examples of causes coming from racism. Fraternity members at the University of Oklahoma learned a racist chant which was caught on camera and posted online. It was not something that was a part of the tradition. â€Å"Do I think these young men are racist in their heart? Do I think they’re proud of what they did? No.† said Boren. (Bidwell). 25 students have r eceived discipline from this video coming out. Also kids from school districts have experienced racist remarks and bullying. Kids are getting bullied for all types of reasons and racism is one of them. People think that remarks about your cultural or ethnicity are not a huge problem. Racist slurs can sometimes be taken lightly. Two stories were shared from students who attended schools in the Oklahoma area. â€Å"Holemant said for 2 years she has triedShow MoreRelatedRacism : Still Alive Today1514 Words   |  7 Pages Racism: Still Alive Today If one were to drive down any random road in South Carolina today, they might spot a Confederate Flag hanging proudly from a building or a house or even a national monument. The ones who support the display of this flag say that it is more to do with cultural history than racism, however, the history that this flag represents is what motivated Dylann Roof to kill nine innocent people in a South Carolina church in 2015. In this day and age, how did something like theRead MoreGrowing Up As A Latino Child1678 Words   |  7 Pagesfamilies because I thought that was the way things were supposed to be. Even today in America. communities are segregated and made up of people with similar backgrounds. I never questioned why we were not surrounded by people that were African American, Asian, or any other race differing from my own. As I grew older, I started to realize how this was a problem because it did not allow for the community to be diverse. Today, I believe that by not being exposed to other cultures at such an early ageRead MoreThe Three Principles Of Privilege878 Words   |  4 Pagesof essentialism or constructionism? Depending on who you ask, the answer to this question will vary. For example, if this question is asked to a white person, their sociocultural and economic advantages as well as their inexperience with systemic racism will influence them to respond with the belief that privilege falls under constructionism. However, if the same question is presented to a minority, the hardships that they might have faced as a result of the color of their skin will lead them toRead MoreRacism in America Today Essay1048 Words   |  5 Pagescan you be so sure when you actually open your eyes and see reality. Rapper Kanye West once said â€Å"racism is still alive, they just be concealing it† and these words are everything but false. You must ask yourself the real question about racism and it is how could you ever cure such a thing in people’s mind s? People are free to think and believe what ever they would like and old habits such as racism will never change in people. 1619, a date remembered by most African Americans (Afroamhistory).Read MoreLooking Back At The Dream Martin Luther King Jr.855 Words   |  4 Pages had, he envisioned for social equality in this nation. Today that dream in some aspects it is still existent. Although he died for fighting for his dream; unfortunately, it is broken in many ways. His legacy and his dream have lived on for decades but I don’t know that it is still alive today for multiple reasons. While the Declaration of Independence states that â€Å"all men are created equal,† even after the civil war people of color still received vastly different treatment from whites. They weren’tRead MoreRacism Is Still Very Much Alive1573 Words   |  7 PagesPuckerine World History 2 Today, racism still remains a prevalent issue that has constantly reared its ugly head. While bringing awareness towards racism has improved, we are still being faced with a gruesome reality that racism is still very much alive. Instead of Jim Crow laws and slavery, racism has transformed itself into microaggressions, police brutality, racial profiling, and mass incarceration of people of color (especially black men). When one talks about racism, most of our opinions areRead MoreThe Voting Rights Act Of 1965862 Words   |  4 Pagesagain that times have changed, so we should not treat states differently for something they did forty years ago. Forty years ago is not very long ago. People who were alive forty years ago when the Voting Rights Act was implemented are still alive today. Moreover, we still see examples of racism in this country all the time. Racism is alive and well in the United States and our history of prejudice and discrimination is not behind us. To undo this decision, Congress must pass new legislation to replaceRead MoreEssay on Black Like Me and Crash965 Words   |  4 Pagesdays of racism are over. That is a completely untrue statement. The movie Crash depicts modern day racism and shows how prevalent it really is in today’s society. Both of these works can relate to one another in many ways and really show how racism truly is. The book Black Like Me and the film Crash have many connections that can be drawn to one another. For one, the main focus of the two works is racism, but they take place in very different times. Black Like Me takes place back when racism was veryRead MoreRacism : It Still Lives Today !1485 Words   |  6 PagesRacism: It still lives today! â€Å"Racism is still with us. But it is up to us to prepare our children for what they have to meet, and, hopefully, we shall overcome.†(brainyquotes.com) In 2016, racism is still present in many ways. Although, police brutality has always been a hot topic in the media and politics, today it affects the rising generations directly. The workforce has also always penalized minorities in job opportunities, salaries, as well as putting limits on the options for professionalRead MoreWe Must Stop Racism Essay1214 Words   |  5 Pagesbackground, with unique history and life experiences. Today we have broken-down a lot of racial barriers that existed in the past, and we have learn become more accepting of each other culture and way of life. Even though our society is growing up and becoming more tolerant of each other, they are still many barriers that needs to be broken. Racism still exists today, it is something that we cannot get rid of easily. Some people express racism in var ious degrees. Around the world they are many cases

Thursday, December 19, 2019

Discrtimination in the Workplace - 1182 Words

Discrimination in the Workplace Introduction Discrimination, prejudice, ethnocentricity and diversity are the challenges of a cohesive workplace environment. For this project I will discuss the need for a culturally diverse environment in the nursing profession, and the plight of Latina woman and her challenges in succeeding in a predominantly Anglo male held role. Learning about different types of discrimination and prejudice will allow us to become culturally sensitive and provide us with the ability to recognize and prevent discrimination from occurring. Scenario I have been placed to review the promotion policy of a particular company. Maria is a native born American citizen with Latino ancestry. Maria has a graduate degree and has invested many years with her company and position. 10 years with the company and 7 in her current role. Maria has been passed up for a promotion for an Anglo male named Alex and with less time in the company. He is considered an â€Å"up and comer†. The main acknowledged reason given to Maria for her denial of a promotion was her accent. The company stated that clients would have trouble understanding it. The company also stated that she has a loud and aggressive approach to coworkers and supervisors, and in addition she has had some problems with attendance. Maria is also the only woman of color in her department and that her lower evaluations reflect a built-in bias on the part of her white male supervisors. What is Discrimination? Work related

Wednesday, December 11, 2019

My Favorite and Least Favorite Building Essay Example For Students

My Favorite and Least Favorite Building Essay My personal interests and professional work of scope in architecture have been about how to better create landmark building for cities. The basic characteristic of landmark is that people can use the simplest form and a minimum of strokes to evoke the memory for it. Just like the Pyramids of Egypt, Opera House of Sydney, Temple of Heaven in Beijing, Empire State of New York, and many other famous landmarks in the world, they become a symbol and business card of the city. In this essay, I will discuss my most and least liked landmark office buildings in London, UK and Shenyang, China. By compare and contrast their individual relationship to the local culture and building environment, we can better understand the reasons behind their success and failure. Most Like: 62 Buckingham Gate, SW1, London, UK 62 Buckingham Gate, completed in 2013, is a mixed-use development providing 260,000 sq ft of office space as well as retail and leisure units. The neighborhood is full of government offices that were built in the 1960s and 1970s, many of which are going to be replaced by new development in the next decade. The overall geometry of the building is quite bold, yet still respecting the existing street frontage of adjacent buildings. The building faà §ade is made of different folding planes, reflecting the changing surroundings in a harmonious way. Unlike traditional office buildings with regular 90-degree lines and traditional divisions, the tilting planes of the faà §ade create a more intimate and unique scale. At different time depending weather of the day, the various reflections also add a touch of elegance to the building. The gesture is strong, but not overwhelming; the reflecting planes are complex looking, yet still sensitive to the historic architecture of Victoria. Giving the complex outer shell, the structure of the building is extremely challenging, resulting efficient floor plans and spatial arrangements. On the lower level, inward-tilting planes brings life to the street by creating bays for outdoor restaurant seating. On the upper floors, sustainable design features are spread-out in all floors including a green roof, landscaped terraces and an energy-efficient building envelope. Least Liked: Fang Yuan Building, Shenyang, China Different from the challenges London is facing in new urban development, city of Shenyang in China is experiencing a different level of â€Å"transformation† which combines eastern and western culture in a controversial way. Fang Yuan Building, completed in 2001, is a 24-storey office building with a total floor area of 52,000 sq ft. The building is located at Financial Trade Zone in Shenyang, the largest city in Northeast China with a population of 5. 3 million. The idea behind the building design is from the traditional Chinese coin shape with square cut out, representing the hope that money will be rolling and businesses will be smooth. In the 2000 World Architecture Design Exhibition in Venice, Fang Yuan building become the only Asian winner while getting praises like â€Å"the world’s most innovative and revolutionary architecture†. However in 2012, it was rated as the top ten world’s more ugly buildings by CNN’s life travel website. The fusion of eastern and western architectural style is undeniably not a perfect marriage, instead causing more â€Å"confusion†. This overly figurative design uses the most straightforward way to join prototype of Chinese traditional entities with modern building materials. There is no smooth connection between the glass windows and solid concrete base. Not only the building has little respect to surrounding buildings’ design and street frontage, the gesture is forceful rather than effortless. In addition, the coin shaped massing required a lot of structural engineering, however at the end did not create an interesting interior experience for the users. Different area and shape of floors makes the office space inefficient and hard to layout. In modern Chinese thinking, money is considered a vulgar element. .ub5f424bad2a406120388404351e8a17b , .ub5f424bad2a406120388404351e8a17b .postImageUrl , .ub5f424bad2a406120388404351e8a17b .centered-text-area { min-height: 80px; position: relative; } .ub5f424bad2a406120388404351e8a17b , .ub5f424bad2a406120388404351e8a17b:hover , .ub5f424bad2a406120388404351e8a17b:visited , .ub5f424bad2a406120388404351e8a17b:active { border:0!important; } .ub5f424bad2a406120388404351e8a17b .clearfix:after { content: ""; display: table; clear: both; } .ub5f424bad2a406120388404351e8a17b { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .ub5f424bad2a406120388404351e8a17b:active , .ub5f424bad2a406120388404351e8a17b:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .ub5f424bad2a406120388404351e8a17b .centered-text-area { width: 100%; position: relative ; } .ub5f424bad2a406120388404351e8a17b .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .ub5f424bad2a406120388404351e8a17b .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .ub5f424bad2a406120388404351e8a17b .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .ub5f424bad2a406120388404351e8a17b:hover .ctaButton { background-color: #34495E!important; } .ub5f424bad2a406120388404351e8a17b .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .ub5f424bad2a406120388404351e8a17b .ub5f424bad2a406120388404351e8a17b-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .ub5f424bad2a406120388404351e8a17b:after { content: ""; display: block; clear: both; } READ: Urban Design Through the Work of Donovan Hill's Architect EssayThe fact that this building exposes the desire to make money in such bold way also ruins the expressive beauty of the structure. It would be much better if the designer took his initial approach in an abstract way. For now, the building is more of an absurd attachment to the city than a successful landmark. In conclusion, a good landmark building should not only reflect the advantages of the geographical area, the building itself should also be outstanding, unique and effortless. During the design process, culture backgrounds and traditional symbols are good to taken into consideration as inspiration. The actual design approach should be natural and abstract, emphasizing on the architectural feature other than specific shapes or figure. Under the current level of urban development, landmark building represents not only the building itself, but also a lifestyle and a new trend of spatial experience. The success behind each landmark building is never just the architectural design itself. It is the combined aspects of environmental, culture, sustainability that work together to create a local or even world classic.

Tuesday, December 3, 2019

Issues in Electronic Commerce Security

Abstract Trust is an important factor when people are engaging in various transactions over the internet. If this is not met, customers are likely to go back to the traditional methods of transaction as far as business is concerned. Security issues in e-commerce must be addressed so that e-commerce transactions are not compromised.Advertising We will write a custom term paper sample on Issues in Electronic Commerce Security specifically for you for only $16.05 $11/page Learn More E-commerce is a simplified and an important avenue for online business but with increasing network insecurity, internet operations may slow down. The author of this paper is going to discuss some pertinent issues surrounding e-commerce as far as security is concerned. The issues will include insecurity in both network and computer services which is a threat to customers as well as the e-commerce itself. The perpetrators are believed to be hackers and the biggest concern is that insecurity originates from the e-commerce itself. This development may make customers shy away. The author will also touch on the weaknesses of the security systems in place. Privacy becomes an important factor in e-commerce. Various controversies surrounding e- commerce will be analyzed in this paper. In conclusion, the author will give recommendations arising from the discussions in this paper. Introduction Electronic commerce involves buying and selling of goods and services over electronic systems such as the internet and other computer applications. Transactions conducted electronically include electronic funds transfer, online transaction processing among many others. Trust at this juncture becomes an important factor in this business. If trust is not established, customers are likely to revert to traditional methods of trading (Craig Mihajlo, 2011). Trust is being destroyed by frequent reports of hackers that attack e-commerce web sites compromising consumer security. Recent ly, viral attacks were launched against the Microsoft Outlook in the name of code red worms. To avert such scenarios, there is need to address insecurity (Mayor, 2009). History of E-Commerce Back in the 1970s, e-commerce was used by companies to forward transaction documents such as purchase orders and invoices. The rise of e-commerce in the 1980s was marked by the use of telephones, credit cards and most interesting booking for reservations in airlines. This was especially so in USA and the United Kingdom (Eisingerich, Andreas Kretschmer, 2008).Advertising Looking for term paper on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More A decade later, e-commerce added value to its services by including an enterprise resource planning system as well as data mining which resulted in data warehousing. This was the period during which the famous World Wide Web came into being. The person behind this important achievement was Tim B erners-Lee (Chan Kwok, 2001). There were major improvements in e-commerce but unfortunately, the founders were unable to use the internet until the year 1995. This was due to the fact that there were no security protocols as far as privacy was concerned. The introduction of security protocols was a big boost to the internet usage since privacy was guaranteed for most transactions. Current Security Issues in E-Commerce Currently, e-commerce has grown tremendously and this is observed when increasing numbers of people are reported to use online services. Online shopping goes up each holiday season due to the fact that people are interested in new and unique things and e-commerce is the only platform that they can realize this (Graham, 2008). People gain experience as they familiarize themselves with online services. A study done by Comscore (a consultant in this field) states that when shoppers are experienced and comfortable with the services offered, spending shoots up increasing t he use of internet services (Kotler, 2009). Unfortunately as the transactions are taking place, many inconveniences arise. Many issues affect online transactions and e-commerce in general. Security is one of these issues that sometimes make users shy away from internet services Security concerns in e-commerce occur when data is exposed to or accessed by unauthorized persons leading to compromised information that is rendered invalid (Kevin, 2005). This is for example when hackers access personal information such as bank account details during a wire transfer. This is where privacy issues come in. Privacy involves having control over personal data without the interference of a third party. This issue affects all stakeholders in the e-commerce industry.Advertising We will write a custom term paper sample on Issues in Electronic Commerce Security specifically for you for only $16.05 $11/page Learn More Electronic commerce security issues can be categorized under system availability, data integrity as well as information confidentiality (Chan Kwok, 2001). For instance, system availability implies that relevant elements are in place to offer support to particular user’s communication needs. On the other hand, data integrity provides that all messages that are sent over the network are received as they are without any alterations that could make them invalid. For example, hackers may alter the information sent via a Short Message Service (SMS) such that the receiver gets a message that is totally different from that which was sent. Information confidentiality implies that messages are only viewed by the intended users only (Rowley, 2006). It is always necessary to continuously review network security at both the electronic commerce and consumer sites and put in place suitable counter- strategies. These are for example passwords for emails and other accounts as stated above. This is because the security of internal systems and th e external networks rely mostly on the security of the site. Electronic commerce has grown tremendously leading to fast and effective ways of exchanging goods and services both locally and internationally. This has been accompanied by an equal rise in the number of attacks as analyzed above putting at risk the security of online payment. Some of these attacks have increased vulnerabilities that have been published in reusable third party elements used by websites such as shopping cart software. Security can be conceptualized from two perspectives in the software business (Sam, 2001). First, the software development community illustrates the security aspects of a system. In this case, safety strategy provides for secret codes that are sophisticated so as to reduce vulnerability during encrypting.Advertising Looking for term paper on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More The second perspective entails protection against attacks and spywares which threatens internet usage. This is for example the use of firewalls and such other measures to protect data. Security Problems in E-commerce Development In the e-commerce arena, there exist threats that are likely to bring down the industry if no instant measures are put into account. Efforts to develop e-commerce are always affected by attacks that target the three systems. These are the network system, client system and the server system. The inability to protect the integrity of the business data system is a major problem in the e- commerce industry. This problem extends to transaction security between the customers and the business (Bruce Kok, 2008) Viruses are considered to be the most serious and common threats surrounding e-commerce. All data and windows are prone to viral attacks. Sophisticated software and hardware are not fully dependable when it comes to protecting the system. For example, viruse s such as Melissa and Resume affect at least part of the operating system if not the entire system (Ralph, 2000). Another huge problem is the invention of hacking tools by those who develop operating systems. This is for example the Trojan horses which are so sophisticated in that they can operate a targeted computer system. The virus can send information anywhere posing as the legitimate user of the computer. Other tools like VNCviewer normally used commercially can hack the systems and other web sites. Other hacking web sites are also playing a role in e- commerce insecurity. This is for example www.rootshell.com and many others which are the problem in development of the e-commerce security systems (Xiaoming, 2008). The customers have their privacy affected. This is a problem that is developing roots and is drawing global attention. This is especially so given the fact that international governments are concerned with this issue. The initiation of Distributed Denial of Services A ttacks (herein referred to as DDOS) is a form of software that can be used to compromise security during transactions between the business and the client. They pose as the legitimate client and transacts with the online business operator. It is only much later that the organization realizes that a wrong transaction has been made. Both the business and the customer loses since the customer information has been hacked into and lose of money to both parties is exhibited. (Mauricio, 2010) Electronic Commerce Security and Legal Issues One of the parties addressing legal issues in e-commerce is the Electronic Commerce Working Group (ECWG). This group meets regularly to discuss security matters arising. Resolutions are then forwarded to other federal agencies for rectifications (Jeng, 2004). Advice is normally given to the companies involved in e-commerce transaction process so as to address the issues effectively. Government regulations make it mandatory to provide public confidence throu gh reliability in all transactions. Consumer protection has also been taken care of but some fraud cases are still being reported. Government Regulations and Security in E- commerce Some e- commerce activities in USA are controlled by the Federal Trade Commission (FTC). E-commerce activities such as business e-mails’ privacy and advertising are watched keenly to safeguard internet rights. Like other businesses, e-commerce operates under rules and regulations. E-commerce transcends international boundaries and hence there is need to comply with the regulations. The economy and the national security depend highly on information technology which is a reliable infrastructure that targets large numbers of people at the same time (Ralph, 2000). It is noted that these computer networks also manage physical installations such as electricity transformers, stock markets, trains as well as radars. Hackers can attack such installations jeopardizing national security and the economy. This is why government regulation is crucial. To this end, the federal and local governments have major roles to play in order to maintain security as far as e-commerce is concerned (George, 2005). The main problem is that the tools and methodologies currently used in these attacks on e- commerce are readily available. The technical capability and sophistication of tools used in attacks reduce the effectiveness of strategies used to fight insecurity. It is noted that relevant agencies, federal and local governments are best equipped to respond to an evolving internet threat (Ndou, 2004). Controversies and Challenges Facing E-commerce There are various challenges and problems facing e-commerce. For instance, most infrastructures and the internet on which they depend are owned and operated privately. This implies that it is difficult for the government to provide the needed security for electronic commerce (Xiaoming, 2008). This calls for partnerships between the government, industry, aca demia, as well as non- governmental groups to provide security to electronic commerce. Very few if any of the organizations are willing to come out or even associate with others in order to offer the security needed in electronic commerce (Xiaoming, 2008). Furthermore, it is not easy to identify all of the groups dealing with electronic business because some have not registered their businesses with the government. As a result, it becomes hard for such private businesses to come out and share their problems due to the fear of being prosecuted (Xiaoming, 2008). Another challenge includes the lack of agreement in developing a national strategy in order to offer protection to the electronic commerce industry. This is because there is need to gather views from both the public and private sectors (Sheth, 2007). This as a result leads to varying opinions that require time to scrutinize in order to come up with the best solution to achieve the objective of having a safe electronic commerce in all sectors in the country and the world as a whole. In some cases, the redrafting process may incorporate the suggestions made, but not everyone will accept each component of the national strategy to (Bruce Kok, 2008). This is because a significant number of issues may not be addressed and others are not yet ready for national policy. The approach is not absolute because events are bound to evolve (Kevin, 2005). Technological advance leads to more threats and increased vulnerability and thus improves people’s understanding of electronic commerce. Impact of Security on E-commerce Security is a significant challenge facing electronic commerce (Zeithaml, 2002). This is because without the assurance of privacy and safety, people are not willing to participate in electronic commerce. Burning issues on safety include the theft of personal data from the credit card by hackers. This makes the authorities question the suitability of providing public services online. As a result of such cases of insecurity, the effectiveness of e-commerce as a driver of the economy is greatly reduced. This may lead to the deterioration of the services provided through electronic commerce thus affecting the production cost of goods and services. Security concerns are the biggest challenge in expanding the reach of electronic commerce (Zeithaml, 2002) The attacks from hackers and web page vandals makes the general public and the government to be more cautious when carrying out sensitive transactions that may comprise personal or financial information via the internet (Xin, 2011). Every person desires to feel secure when conducting online businesses and hopes that their information will be safe and confidential. Recommendations To enhance security, most service providers try to make sure that only authorized users can send and receive information over the internet or over the phone. This is one of the reasons why e-mails have passwords and phones require the use of security co des and Personal Identification Numbers (PIN). However, it is these safety protocols which are circumvented by hackers and other unauthorized third parties. This affects e-commerce that is conducted via such channels. Electronic commerce providers have made efforts to address the security issues in their internal networks. A number of guidelines have been put in place to secure systems making networking available for the electronic commerce personnel to study and implement. Training and educating the consumer on security issues is still in progress. For instance, Trojan horse programs initiated against customers’ systems become a risk to electronic commerce mainly because they can circumvent or undermine most of the verification and approval procedures used in electronic commerce (Luarn, 2003). E-commerce requires the provision of security for the internet users. To achieve this, measures need to be put in place so as to win trust of the customers. This is for example video- hosting services on every website to speak to the customer directly if there is need to clarify on some issues (Luarn, 2003). Many people are not well informed on e-commerce mechanisms and how it works. There should be efforts to create awareness about e-commerce so that everyone is knowledgeable about internet services (Sam, 2001). Consumer protection is an important area which should be addressed due to increased insecurity. The consumer is the party most affected by online insecurities. To this end, there should be measures to safeguard the rights of the consumers. As much as there are new innovations on thefts’ and attacks’ software, there should also be innovations that track down any online offenders. There should be customer oriented privacy practices to improve consumer satisfaction. This should include a system capable of showing how e-commerce organizations’ sites gather, handles, and uses personal information. Private and non- governmental organizatio ns with significant computing resources should be encouraged to take active roles in information sharing (Ndou, 2004). This is because colleges, corporations and universities have a vital role in identifying and reporting internet attacks. Conclusion The aim of this paper was to analyze security issues in e-commerce. The author started by looking at the historical background of e-commerce. The author also looked at several issues such as controversies revolving around e-commerce, problems encountered in e-commerce among others. It was found that stakeholders such as federal and local governments have important roles to play in e-commerce. The author found that security is a major concern in e-commerce. References Bruce, C., Kok, B. (2008). An empirical study of the use of e-security seals in e-commerce. Michigan: Michigan University Press. Chan, M., Kwok, L. (2001). Integrating security design into the software development process for e-commerce systems. Chicago: Free Press. Craig , E., Mihajlo, Z. (2011). A personalized approach to web privacy: Awareness, attitudes and actions. New York: Thimble. Eisingerich, A., Andreas, B., Kretschmer, T. (2008). In e-commerce, more is more. Harvard Business Review, 8(6): 20-21. George, S. (2005). Rethinking e-commerce security. Harvard: Harvard University Press. Graham, M. (2008). Warped geographies of development: The internet and theories of economic development. Geography Compass, 2(3): 771. Jeng, C. (2004). Trust and privacy in electronic commerce. Boston: IEEE. Kevin, K. (2005). We are the web. Managing Service Quality, 3(2), 23-39. Kotler, P. (2009). Marketing management. Pearson: Prentice-Hall. Luarn, P. (2003). A customer loyalty model for e-service context. Journal of Electronic Commerce Research, 4(4): 20-23. Mauricio, S. (2010). Reducing online privacy risk to facilitate e-service adoption: The influence of perceived ease of use and corporate credibility. Journal of Services Marketing, 24(3): 219-229. Mayor, S. (2009). E-commerce policies and customer privacy: Information Management and computer security. Boston: Cengage Learning. Ndou, V. (2004). E-Government for developing countries: Opportunities and Challenges. New York: Free Press. Ralph, T. (2000). IT security in electronic commerce: From cost to value driver. International Workshop on Database and Expert Systems Applications,16: 23-29. Rowley, J. (2006). An analysis of the e-service literature: Towards a research agenda. Internet Research, 16 (3): 339-359. Sam, R (2001). A framework for analyzing e-commerce security: Information Management and computer security. New York: Routledge. Sheth, J. (2007). E-services: A framework for growth. Journal of Value Chain Management, 1(1/2): 1-20. Xiaoming, M. (2008). Analyze and prevent the security risks of e-commerce privacy. Chicago: John and Wiley Publishing Company. Xin, W. (2011). Study on information management and security of e-commerce system. California: LEE. Zeithaml, V. A. (2002). Service excellence in electronic channels. Managing Service Quality, 12(3): 135-138. This term paper on Issues in Electronic Commerce Security was written and submitted by user Jaylyn B. to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.