The satisfied client in the form of e-commerce (a subset of e-business) can then decide to repurchase the good or product or have an intention to do so in the future. Trust has been found to be based on the expectations that certain persons and firms with whom a given entity interact would not result in the entity being taken advantage of or be over-depended upon (Gefen
The real equations behind a cryptographic element is often not easy to fathom or figure out. This therefore makes it an important tool to be utilized in securing information that is exchanged across various networks and the security of the data itself (Robinson, 2008)
However, the distance between the United States and its enemies is dramatically reduced. The lessons from early cyber conflicts need to be learned now to properly prepare for future conflicts" (Allen & Demchak, p
These software experts may use their newfound skills to develop cyberwarfare capabilities that transcend current threats (Williams, 2009). While many cyber attacks are not made public, what is known is sufficiently disturbing to demand a substantive response (Cetron & Davies, 2009)
54). Current trends indicate that the threat to the nation's security is genuine, particularly with respect to the proliferation of computer viruses which have steadily increased in recent years (Denning, 2001)
36). The potential outcomes of such massive cyber attacks on a modern society that is highly dependent on its information systems will be devastating because of the effects such attacks will have on humans as well as the computer they rely upon (Gable, 2010)
(2008, p. 276) These increasing threats correspond to the growing reliance on information systems to manage the entire spectrum of modern commerce and energy resources, making the disruption of a single element in the integrated system a potential threat to the remaining components that can result in a massive disruption to a nation's economy (Jurich, 2008)
20). While there is a growing body of knowledge concerning what forms cyberwarfare can assume and its potential for destruction, there remains a serious gap between what is known and what is taking place in other countries and among non-state actors who may be mounting a Manhattan Project level effort to disrupt the nation's defenses (Korns & Kastenberg, 2008)
276). Notwithstanding the clear and present threat represents by cyber attacks, the inexorable march toward ubiquitous computing continues, and the threats to these vital information systems continue to increase as well (Liptak, 2009)
7). Perhaps the most alarming aspect of cyberwarfare is its insidious qualities wherein attackers can be other countries, terrorist groups or even an adolescent at home mimicking these efforts by others (O'Rourke, 2010)
Current trends indicate that the threat to the nation's security is genuine, particularly with respect to the proliferation of computer viruses which have steadily increased in recent years (Denning, 2001). According to Trendle (20020, the number of viruses increased by more 150% just between 1998 to 2002, and in more than 50,000 viruses have launched with as many of 400 viruses being active at any given time; further, as many as a dozen new viruses are placed on the Internet every day (Trendle, 2002)
22). These software experts may use their newfound skills to develop cyberwarfare capabilities that transcend current threats (Williams, 2009)
30). Industry analysts believe that these cyber attacks have been sponsored, at least in part, by China but Chinese officials consistently deny such allegations (Wright, 2009)
federal government plans to improve the country's cyber security through accelerating the availability of training and educational resources and material to significantly improve the cyber skills, knowledge and behavior of every sector of the population to create a safer and more secure cyber space for all. The NICE initiative has three objectives (Newhouse, 2012): 1
This suggests that there was a possibility that some public organizations might have been attacked and might have not disclosed such information to the public. Plan Process The plan process is outlined below (Szykman and Lee, 2006): 1