NVCC Safety Problems Faced by Elderly Online Customers Essay

User Generated

chaavr89

Humanities

Northern Virginia Community College

Description

Last time you helped me chose the topic and 250 word handwrite about the topic for me. I would attach it, so it can remind you in some way. Below is 3 small discussion which is related to that topic you chose. This would help you prepare in the next big assignment that I would have you help me finish it.

A. Please check out the tutorials and articles on primary, secondary, and tertiary sources (attached file)

What is a primary source? Name a SCHOLARLY primary source that you plan to use for the proposal assignment.

What is a secondary source? Name SCHOLARLY secondary source that you plan to use for the proposal assignment.

What is a tertiary source? Name a SCHOLARLY tertiary source that you plan to use for the proposal assignment. .

Please list the sources in full bibliographic citation - author, title, publication etc.

B. Please describe the difference between a trade publication and a scholarly publication. Use an example to help illustrate your explanation. I encourage you to use sources that you might use in the research proposal.

Use a full bibliographical citation for each publication.

C. Outline with statement of the problem and an annotated bibliography of 7-8 articles you plan to use for your review of literature.

Unformatted Attachment Preview

1 Running head: SAFETY PROBLEMS FACED BY ELDERLY ONLINE SHOPPERS IN KANSAS CITY Characterizing Safety Problems Faced by Elderly Online Shoppers in Kansas City Student Name: Professors Name: Institution: Date SAFETY PROBLEMS FACED BY ELDERLY ONLINE SHOPPERS IN KANSAS CITY 2 Characterizing Safety Problems Faced by Elderly Online Shoppers in Kansas City The use of the internet for online transactions has gained popularity all over the world. In Kansas City, citizens increasingly engage in online transactions due to the convenience that it gives them. Despite the surge in online transactions, the citizens of Kansas are left vulnerable to security risks in cyberspace due to the lack of information, and awareness about how risks involved in the online transactions can be mitigated (Dornbrook, 2020). The elderly citizens are particularly more predisposed to risks of fraud due to their lack of awareness, and knowledge of how the risks might be detected, and prevented (Schreft, 2007). This situation needs to be addressed by providing the vulnerable elderly citizens of Kansas with practice information they need to avoid exploitation when making transactions in cyberspace. The education of the vulnerable users of internet resources on the risks, and risk prevention is one of the most important duties of Information Systems Operations Managers (ISOMs). For the ISOMs to effectively educate the vulnerable citizens on the risks involved in online transactions, they need to first understand the characteristics of safety risks that the elderly people are exposed to. As noted by Schreft (2007), the safety risks involved in online transactions in Kansas are complex in nature, having unique attributes relating to the type, magnitude, likelihood, vulnerability factors, impacts, and remediation strategies of the risk. The safety risks that affect the elderly online shoppers could also be unique given the fact that unscrupulous individuals design specific strategies for exploiting ignorant online shoppers (Dornbrook, 2020). Therefore, the characterization of safety issues affecting this vulnerable category of online shoppers should precede the development of education programs for empowering elderly shoppers to avoid, and/or combat these safety risks in cyberspace. SAFETY PROBLEMS FACED BY ELDERLY ONLINE SHOPPERS IN KANSAS CITY 3 References Dornbrook, J. (2020, April 14). Businesses beware: Financial fraud is on the rise. Kansas City Business Journal. Schreft, S. (2007). Risk of identity theft: can the market protect the payment systems. Economic Review, 5-39.
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

1

Running head: CHARACTERIZING SAFETY PROBLEMS FACED BY ELDERLY ONLINE
COSTOMERS IN KANSAS CITY

Characterizing Safety Problems Faced by Elderly Online Customers in Kansas City
Student Name:
Professors Name:
Institution:

Date

2

CHARACTERIZING SAFETY PROBLEMS FACED BY ELDERLY ONLINE COSTOMERS
IN KANSAS CITY
Characterizing Safety Problems Faced by Elderly Online Customers in Kansas City

Primary, Secondary and Tertiary Sources
Primary sources of information for proposal writing are those materials conveying firsthand information. As noted by Empire State College (2020), primary sources of information used
for proposal development are often written based on close observation of (and/or interviews about)
a phenomenon. They may include articles written based on data obtained from an experimental
research project, for example. The following is an example of a primary source: Masoud, E. (2013).
The effects of perceived risks on online shopping in Jordan. European Journal of Business &
Management, 5(6), 76-87.
A secondary source is a document written based on information obtained from a primary
source of information. For example, an author of a secondary source of information might
synthesis data from past experimental research project reports (primary sources) in order to show
the trend of a particular event. Secondary sources might also be books written based on knowledge
obtained from primary sources such as institutional reports, photographs, and /or previously
recorded interviews (Empire State College, 2020). The distinguishing feature of secondary sources
is that they provide second-hand information about a phenomenon. The following is an example
of a secondary source: Arjan, R. (2016). Financial fraud: A literature review, MPIfG Discussion
Paper, No. 16/5, Max Planck Institute for the Study of Societies, Cologne.
Tertiary sources are written based on information obtained from secondary sources.
Therefore, tertiary sources provide third-hand information about a given phenomenon (Empire
State College, 2020). For example, a tertiary source might be a textbook, or an article that
contained an analysis of information obtained from secondary sources. They might provide

3

CHARACTERIZING SAFETY PROBLEMS FACED BY ELDERLY ONLINE COSTOMERS
IN KANSAS CITY
synthesized information that is not contained in either primary, or secondary sources. The
following is an example of a tertiary source: Calder, A., & Watkins, S. (2015). IT governance: An
international guide to data security and ISO27001/ISO27002. London: Kogan Page Limited.

Difference Between Scholarly Publication and Trade Publications
Scholarly publications are materials that are authored by scholars and/or experts affiliated
with academic institutions. For instance, authors of scholarly publications are usually experts with
doctoral degrees (Empire State College, 2020). These types of publications are written for scholars
in a given field. For example, a scholarly publication about the challenges of online transactions
might be written by ...


Anonymous
I was struggling with this subject, and this helped me a ton!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags