Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

ONLINE TRUST: HOW DO WE ESTABLISH TRUST IN ONLINE CONNECTIVITY? CONVEYING TRUST

ID: 358757 • Letter: O

Question

ONLINE TRUST: HOW DO WE ESTABLISH TRUST IN ONLINE CONNECTIVITY?

CONVEYING TRUST ONLINE: Discuss examples of how an organization can facilitate trust over the internet. What kinds of things exemplify a trusted website? What kinds of things convey a lack of trust online? What are the long run implications of conveying trust online to a firm’s profitability? How about the implications of trust in electronic commerce to the economy?

ELECTRONIC COMMERCE AND PRICING: How does the Internet changes the dynamics of market competition? What is the effect of online e-commerce on prices? Examine and discuss the effect of the Internet on buyer search costs; How does the internet allow dynamic pricing, what is dynamic pricing, and can this help a firm to sell more product? Finally, compare how online and offline competition stacks-up.

WHAT HAPPENED TO OUR PRIVACY WHEN WE ALL WENT ONLINE: Discuss several online privacy issues that you found in researching articles about online privacy; present some of the rules, regulations, and legislation that addresses online privacy; What are some tools and techniques for protecting online privacy? What are key components in creating an online privacy policy and in enforcing self-regulation? What are some of the benefits of privacy risk management?

DESCRIBE SOME TECHNOLOGIES THAT CAN HELP CREATE ONLINE TRUST AND SECURITY: List, describe and classify several types of electronic commerce security threats; discuss key mechanisms to deploy online security; find and copy to us a chart that shows the basic elements of both symmetric and asymmetric (public key) cryptography; find and copy to us a chart that describes EDI, find and copy to us a chart that describes a digital signature.

Explanation / Answer

1. Online Trust

2. Online price:

3. Privacy

4. Technologies for online security