Cybercrime a threat to development of e-business technology

| February 14, 2020


I want a proposal for a Ph.D. in e-business, actually, I don’t have an aspecific idea on that topic so please choose one topic and let me know about the topic before you start the proposal.

Note: My master’s degree in ICT (Information and communication technology) and I want the topic related to it.



Student’s Name:


Course Code:


Date the Assignment is due:


Introduction. 2

The motivation for the study. 2

Objectives of the research. 2

Research questions. 4

Research methodology. 5

Research methods. 5

Data analysis and evaluation methods. 6

Expected outcomes. 6

Sources of information. 7

References. 8


Information and communications technology have developed greatly in the past decade. E-commerce is quickly becoming a dominant reason why many people are pursuing internet connectivity. As e-commerce continues to grow, so do the dangers of cybercrime (Sinrod & Reilly 2000, p. 181, Savona 2004, p. 264). This research is an investigation into the state of cybercrime, how it affects e-commerce and how it can be dealt with.


The motivation for the study

Many people all over the world are getting into the cyberspace in order to transact business there. One of the challenges they face is the threat posed by cybercriminals (Shinder 2002, p. 187). These people often find it important to delve deep into academic research works in order to know about ways of dealing with cybercrime. Unfortunately, there is a shortage of scholarly information on cybercrime and its effects on e-commerce(Bocij & McFarlane 2003, p. 219). This study is, therefore, a contribution to this crucial field that is a core area of relevance for information and communication technology scholars. It is expected that the research will generate insights into whether any solutions have been found that can deal with cybercrime once and for all.

Objectives of the research

            Recently, new computing techniques have been developed. The users of these techniques sometimes fail to take time to verify their security levels, something Joshi et al. 2002, p. 112 attributes to ignorance, lack of technological capacity and/or inadequacy of resources. They, therefore, end up being targeted by cybercriminals who are aware of their ignorance. Additionally, institutions and corporations have to manage tones of personally identifiable information on a daily basis using these new computing systems. Cybercriminals, through ineffective security systems, can gain access to this information and use it to commit cybercrimes (Etter 2001 p. 169). This research sets out to look for ways through which these crimes can be dealt with when they occur. An understanding of their effects will also be important in order to provide a justification for the corrective measures that will be recommended.

A proper understanding of the cybercrime threat on e-commerce ought to be highlighted at the outset. Cybercriminals operate across many countries. Therefore, legislation by one country may not help much in curbing this crime universally (Cronin 2000 p. 136). On the other hand, concerted efforts at the international level are often hindered by vested interests, sabotage, and mutual lack of trust among competing for regional trading blocs (Goldstone & Shave 1999 p. 935).

Jurisdictional disputes relating to data protection have cast a cloud of doubt on the future of an international approach in dealing with cybercrime. The ubiquity of the internet has contributed largely to these disputes. Sometimes, data protection laws are in conflict with legal obligations in different areas (Hinde 2003, p. 93).

The possibility of doing e-business in areas with minimal cybercrime threats is worth assessing. However, when the damage has already been done, it might be difficult for business managers to trust these so-called minimum-risk internet hubs. Moreover, there is the burning question regarding which ones among these areas are less prone to cybercrimes. It is interesting to find out how existing laws can be applied in each of these areas and the effects the legal measures would have on existing e-commerce establishments.

This research addresses the measures that can best lead to a reduction of far-reaching, long-term damage once cyber crimes have been committed in both high-risk and low-risk e-commerce hubs. The main yardstick of assessing the effectiveness of these measures is the gravity of the negative effects of these crimes vis-à-vis the availability of control measures that need to be taken. The research will address two components of redress: legal dimension and technological dimension. The legal dimension will deal with the legal measures that should be put in place to ensure that justice prevails upon the victims of cybercrimes as well as the perpetrators. It also assesses how public perception of these legal decisions may impact on e-commerce activities. The technological dimension assesses the ways in which e-commerce players can be made aware of the availability of the most secure technologies. In this dimension, the process of verifying the security of alternative technologies and systems once the existing ones have been attacked is also assessed (Seničar 200, p. 161).

Research questions

  1. What are the most serious cybercrime threats to e-commerce today?
  2. How do cyber crimes affect the development of e-commerce?
  3. Which control measures can be taken to deal with these cyber crimes?
  4. What transnational legal loopholes need to be addressed to ensure justice for victims of cybercrimes as well as the perpetrators?
  5. How safe are the so-called “minimum risk eCommerce” networks?
  6. How can the level of security of new and emerging e-commerce platforms be verified?

Literature review

Research methodology

            The practical research element will involve an in-depth investigation into all the research questions listed. Before any efforts are made to assess the effectiveness of control measures to deal with cybercrime, the effects of this crime on e-commerce will first be analyzed. The features of e-commerce platforms that are vulnerable will be identified and the possible effects of attacks on these areas will be determined with a view of determining alternative platforms with more enhanced security.

Research methods

The chief method of data collection will be standard questionnaires (for example Likert Scale model). The questionnaires will be used to collect qualitative responses from users of e-commerce tools. The questionnaires will be complemented by use of interviews. The questionnaires will be given to business owners who heavily rely on e-commerce. Their personal experiences will be used as a foundation of gathering accurate information on how e-commerce affects users’ perceptions of information and communication technology as well as the alternative e-commerce that they have resorted in order to save their businesses from collapsing.

The population will be members of the e-commerce community. A feasibility study will be carried out in order to establish the best ways of accessing this population. The randomly selected sample of 20 respondents will be randomly divided into two groups. One of the groups will be requested to answer to questionnaires while the other group will be requested to attend interview sessions. The questionnaires will contain all the research questions only that these questions will be phrased in a closed-ended format. During the interview, the research questions will be posed in an open-ended form.

Data analysis and evaluation methods

            The data gathered will be analyzed using Standardized Statistical Packages (SPSS) to examine cross-tabulation, cross-grouping or associations that emerge, for instance, through factor analysis. In the case of qualitative data, a qualitative data analysis software package will be used for purposes of coding as well as the derivation of data from the information that will have been gathered from interviews.

Expected outcomes

The outcomes that are expected to come out of the research include:

  1. The effects of cyber crimes on e-commerce, with specific forms of crimes being highlighted.
  2. The different ways in which different cybercrime targets suffer from the crime.
  3. Various ways of remedying cyber crime situations, with specific highlights from experiences of e-commerce users. The experiences will form the basis of scholarly analysis in order to verify the validity and effectiveness of these measures.
  4. A proposition on the right approach to be taken in order to deal with the problem of cybercrimes through international legislation.
  5. Whether or not risk-free e-commerce platforms exist.
  6. Information on how the enhancements made on e-commerce security can be verified for effectiveness.

Sources of information

  1. Printed journals
  2. Online databases
  3. Online journals
  4. Books on e-commerce, information technology, and cyber crime
  5. Reference texts
  6. Government publications
  7. Publications by regulatory bodies


Bocij,  P. & McFarlane, L. 2003, Cyberstalking: The Technology of Hate, The Police Journal, Vol. 76 no.3 pp. 204-221

Cronin, B. 2000. Strategic Intelligence and Networked Business, Journal of Information Science, Vol. 26, No. 3, pp. 133-138.

Etter, C.B. 2001. The Forensic Challenges of E-Crime Presented at the 7th Indo-Pacific Congress on Legal Medicine and Forensic Sciences, Australasian Centre for Policing Research, Melbourne.

Goldstone, D. & Shave, B. 1999, International Dimensions of Crimes in Cyberspace, Fordham International Law Journal,Vol 22  no. 15pp. 925-937

Hinde, S. 2003, The Law, Cybercrime, Risk Assessment and Cyber Protection, Computers & Security, Vol. 22,  no.2, pp.  90-95.

Joshi  J. B. et al. 2002 ‘Security and Privacy Challenges of a Digital Government’ in Advances in Digital Government. Macmillan Publishers, New York.

Savona, E.U. 2004 The Fox and the Hunters: How IC Technologies Change the Crime Race, European Journal on Criminal Policy and Research, Vol. 10, no. 1 pp. 257-273.

Seničar, V. et al. 2003. Privacy-Enhancing Technologies—Approaches and Development, Computer Standards & Interfaces, Vol 25, no. 2, pp. 147-158.

Shinder, D. L.  2002. Scene of the Cybercrime: Computer Forensics Handbook, Syngress Publishing Inc., Toronto.Sinrod, E. J. &Reilly, W.P. 2000. Cyber-Crimes: A Practical Approach to the Application of Federal Computer Crime Laws, Santa Clara Computer & High Tech. L. J.  177 (4) pp. 178-196

Get a 15 % discount on an order above $ 30
Use the following coupon code :

Category: Technology

Our Services:
  • Essay
  • Custom Essays
  • Homework Help
  • Research Papers
  • Argumentative Essay
  • Assignment
  • College Papers
  • Powerpoint Presentation
  • Dissertation
  • Thesis Paper
  • Dissertation
  • Editing Services
  • Review Writing
  • Lab Report
  • Book Report
  • Article Critique
  • Case Study
  • Coursework
  • Term Paper
  • Personal Statement
Order a customized paper today!