Sunday, May 17, 2020

Corinth History, Legends, and Cultural Advances

Corinth is the name of an ancient Greek polis (city-state) and nearby isthmus that lent its name to a set of Panhellenic games, a war, and a style of architecture. In works attributed to Homer, you may find Corinth referred to as Ephyre. Corinth in the Middle of Greece That it is called isthmus means it is a neck of land, but the Isthmus of Corinth serves as more of a Hellenic waist separating the upper, mainland part of Greece and the lower Peloponnesian parts. The city of Corinth was a rich, important, cosmopolitan, commercial area, having one harbor that allowed trade with Asia, and another that led to Italy. From the 6th century B.C., the Diolkos, a paved route up to six meters wide designed for a fast passage, led from the Gulf of Corinth on the west to the Saronic Gulf on the east. Corinth is called wealthy because of its commerce, since it is situated on the Isthmus and is master of two harbours, of which the one leads straight to Asia, and the other to Italy; and it makes easy the exchange of merchandise from both countries that are so far distant from each other.Strabo Geography 8.6 Passage From the Mainland to the Peloponnese The land route from Attica into the Peloponnese passed through Corinth. A nine-kilometer section of rocks (the Sceironian rocks) along the land route from Athens made it treacherous—especially when brigands took advantage of the landscape—but there was also a sea route from the Piraeus past Salamis. Corinth in Greek Mythology According to Greek mythology, Sisyphus, a grandfather of Bellerophon—the Greek hero who rode Pegasus the winged horse—founded Corinth. (This may be a story invented by Eumelos, a poet of the Bacchiadae family.) This makes the city not one of the Dorian cities—like those in the Peloponnese—founded by the Heracleidae, but Aeolian). The Corinthians, however, claimed descent from Aletes, who was a descendant of Hercules from the Dorian invasion. Pausanias explains that at the time when the Heracleidae invaded the Peloponnese, Corinth was ruled by descendants of Sisyphus named Doeidas and Hyanthidas, who abdicated in favor of Aletes whose family kept the throne for five generations until the first of the Bacchiads, Bacchis., gained control Theseus, Sinis, and Sisyphus are among the names from mythology associated with Corinth, as the second century A.D. geographer Pausanias says: [2.1.3] In the Corinthian territory is also the place called Cromyon from Cromus the son of Poseidon. Here they say that Phaea was bred; overcoming this sow was one of the traditional achievements of Theseus. Farther on the pine still grew by the shore at the time of my visit, and there was an altar of Melicertes. At this place, they say, the boy was brought ashore by a dolphin; Sisyphus found him lying and gave him burial on the Isthmus, establishing the Isthmian games in his honor....[2.1.4] At the beginning of the Isthmus is the place where the brigand Sinis used to take hold of pine trees and draw them down. All those whom he overcame in fight he used to tie to the trees, and then allow them to swing up again. Thereupon each of the pines used to drag to itself the bound man, and as the bond gave way in neither direction but was stretched equally in both, he was torn in two. This was the way in which Sinis himself was slain by Theseus.Pausanias Description of Greece, translated b y W.H.S. Jones; 1918 Pre-Historic and Legendary Corinth Archaeological finds show that Corinth was inhabited in the Neolithic and early Helladic periods. Australian classicist and archaeologist Thomas James Dunbabin (1911-1955) says the nu-theta (nth) in the name Corinth shows it is a pre-Greek name. The oldest preserved building survives from the 6th century B.C. It is a temple, probably to Apollo. The earliest rulers name is Bakkhis, who may have ruled in the ninth century. Cypselus overthrew Bakkhis successors, the Bacchiads, c.657 B.C., after which Periander became the tyrant. He is credited with having created the Diolkos. In c. 585, an oligarchical council of 80 replaced the last tyrant. Corinth colonized Syracuse and Corcyra at about the same time it got rid of its kings. And the Bacchiadae, a rich and numerous and illustrious family, became tyrants of Corinth, and held their empire for nearly two hundred years, and without disturbance reaped the fruits of the commerce; and when Cypselus overthrew these, he himself became tyrant, and his house endured for three generations....ibid. Pausanias gives another account of this early, confusing, legendary period of Corinthian history: [2.4.4] Aletes himself and his descendants reigned for five generations to Bacchis, the son of Prumnis, and, named after him, the Bacchidae reigned for five more generations to Telestes, the son of Aristodemus. Telestes was killed in hate by Arieus and Perantas, and there were no more kings, but Prytanes (Presidents) taken from the Bacchidae and ruling for one year, until Cypselus, the son of Eetion, became tyrant and expelled the Bacchidae.11 Cypselus was a descendant of Melas, the son of Antasus. Melas from Gonussa above Sicyon joined the Dorians in the expedition against Corinth. When the god expressed disapproval Aletes at first ordered Melas to withdraw to other Greeks, but afterwards, mistaking the oracle, he received him as a settler. Such I found to be the history of the Corinthian kings.Pausanias, op.cit. Classical Corinth In the middle of the sixth century, Corinth allied with Spartan, but later opposed the Spartan King Cleomenes political interventions in Athens. It was aggressive actions of Corinth against Megara that led to the Peloponnesian War. Although Athens and Corinth were at odds during this war, by the time of the Corinthian War (395-386 B.C.), Corinth had joined Argos, Boeotia, and Athens against Sparta. Hellenistic and Roman Era Corinth After the Greeks lost to Philip of Macedonia at Chaeronea, the Greeks signed terms Philip insisted on so he could turn his attention to Persia. They made oaths not to overthrow Philip or his successors, or one another, in exchange for local autonomy and were joined together in a federation that we today call the League of Corinth. Members of the Corinthian League were responsible for levies of troops (for use by Philip) depending on the size of the city. Romans besieged Corinth during the second Macedonian War, but the city continued in Macedonian hands until the Romans decreed it independent and part of the Achaean confederacy after Rome defeated the Macedonians a Cynoscephalae. Rome kept a garrison in Corinths Acrocorinth—the citys high spot and citadel. Corinth failed to treat Rome with the respect it demanded. Strabo describes how Corinth provoked Rome: The Corinthians, when they were subject to Philip, not only sided with him in his quarrel with the Romans, but individually behaved so contemptuously towards the Romans that certain persons ventured to pour down filth upon the Roman ambassadors when passing by their house. For this and other offences, however, they soon paid the penalty, for a considerable army was sent thither.... Roman consul Lucius Mummius destroyed Corinth in 146 B.C., looting it, killing the men, selling the children and women, and burning what remained. [2.1.2] Corinth is no longer inhabited by any of the old Corinthians, but by colonists sent out by the Romans. This change is due to the Achaean League. The Corinthians, being members of it, joined in the war against the Romans, which Critolaus, when appointed general of the Achaeans, brought about by persuading to revolt both the Achaeans and the majority of the Greeks outside the Peloponnesus. When the Romans won the war, they carried out a general disarmament of the Greeks and dismantled the walls of such cities as were fortified. Corinth was laid waste by Mummius, who at that time commanded the Romans in the field, and it is said that it was afterwards refounded by Caesar, who was the author of the present constitution of Rome. Carthage, too, they say, was refounded in his reign.Pausanias; op. cit. By the time of the New Testaments St. Paul (author of Corinthians), Corinth was a booming Roman town, having been made a colony by Julius Caesar in 44 B.C.—Colonia Laus Iulia Corinthiensis. Rome rebuilt the city in Roman fashion, and settled it, mostly with freedmen, who grew prosperous within two generations. In the early 70s A.D., Emperor Vespasian established a second Roman colony at Corinth—Colonia Iulia Flavia Augusta Corinthiensis. It had an amphitheater, a circus, and other characteristic buildings and monuments. After the Roman conquest, the official language of Corinth was Latin until the time of Emperor Hadrian, when it became Greek. Located by the Isthmus, Corinth was responsible for the Isthmian Games, second in importance to the Olympics and held every two years in the spring. Also known as: Ephyra (old name) Examples: The highpoint or citadel of Corinth was called the Acrocorinth. Thucydides 1.13 says Corinth was the first Greek city to build war galleys: The Corinthians are said to have been the first that changed the form of shipping into the nearest to that which is now in use, and at Corinth are reported to have been made the first galleys of all Greece. Sources Corinth Oxford Dictionary of the Classical World. Ed. John Roberts. Oxford University Press, 2007.A Roman Circus in Corinth, by David Gilman Romano; Hesperia: The Journal of the American School of Classical Studies at Athens Vol. 74, No. 4 (Oct. - Dec., 2005), pp. 585-611.Greek Diplomatic Tradition and the Corinthian League of Philip of Macedon, by S. Perlman; Historia: Zeitschrift fÃÆ'Â ¼r Alte Geschichte Bd. 34, H. 2 (2nd Qtr., 1985), pp. 153-174.The Corinth That Saint Paul Saw, by Jerome Murphy-OConnor; The Biblical Archaeologist Vol. 47, No. 3 (Sep., 1984), pp. 147-159.The Early History of Corinth, by T. J. Dunbabin; The Journal of Hellenic Studies Vol. 68, (1948), pp. 59-69.A Geographical and Historical Description of Ancient Greece, by John Anthony CramerCorinth (Korinthos). The Oxford Companion to Classical Literature (3 ed.) Edited by M. C. HowatsonCorinth: Late Roman Horizonsmore, by Guy Sanders, from Hesperia 74 (2005), pp.243-297.

Wednesday, May 6, 2020

Mass Media and Obesity - 1926 Words

Mass Media and Obesity The media in today’s society has shown its advantages and disadvantages in order to attract a certain group of consumers. People are exposed to advertisements every day and everywhere. Ads and campaigns are seen by simply walking down the street; posted on walls, boards, and store windows. Even while driving, advertisements are on billboards in areas where there is heavy traffic. The most popular way companies are selling their products is by doing TV commercials. Most households have a TV nowadays; people use it for entertainment and know about the latest news happening around the world. Unfortunately, there are times where the media can be a detriment to our society. People can become vulnerable to things that seem†¦show more content†¦This should be done because parents are more capable in comprehending nutritional facts. The parents should limit the TV time for children because advertisements are a bad influence. There are many types of advertisements. Advertiseme nts appear everywhere and cannot be easily ignored. Since children watch so much television, they see so many advertisements a day. The most foods that are advertised during children’s programs are candy and snacks, sugared cereal, fast food, and sodas and soft drinks. The highest percentage is candy and snacks, which is about 34% of advertisements. That tells us that while children watch TV, they see so much food that makes them want it more. Advertisements are everywhere and that is how companies try to sell their products. â€Å"In 2009, the fast food industry alone spends $4.2 billion on advertising in all media† (Policy Statement, 202). All that money can be put to a better use, like education. Most companies care about the amount of money they could earn. â€Å"US companies spend $3.5 billion on fast food advertisements and $5.8 billion on the separate food, beverage, and confectionary category, including $785.5 million for the top five soda brands† (Hende rson, 191). With that, advertisements help them accomplish that goal. They earn all that money because so many children watch TV daily, seeing theShow MoreRelatedObesity And The Mass Media Essay935 Words   |  4 Pagescan resolve a problem, an issue or unknown? I am particularly interested in the contributors to eating disorder, for instance, the relationship between eating disorders to bullying, the media, social environments, and so forth. D. What is your topic about? The research topic is about bulimia and the mass media. The topic will relate to the mental health of female adolescents. There is no set geographic location nor would timeframe for the literature review as I felt it be too constraining. E.Read MoreMass Media And The Entertainment Industry949 Words   |  4 Pagesis your ideal of beauty influenced by an outside force like mass media and the entertainment industry? Some believe that mass media and the entertainment industry should be responsible for causing eating disorders in young girls, while others believe differently. I believe that mass media and the entertainment industry portray beauty in a deadly way, since they establish a false image of a â€Å"perfect† woman. Others think that mass media and the entertainment industry should not be accountable forRead MoreChildhood Obesity : A Developing Problem1197 Words   |  5 PagesObesity in America is a developing problem, and not just in adults. Today, one in three American children and teens are either overweight or obese; almost triple the rate previously in 1963. Child obesity has expeditiously become one of the most genuine health challenges of the 21st century (â€Å"10 Surprising Facts About Childhood Obesity†). Physical inactivity, race, junk food in schools, the mass media, and the child’s parents flaws are all factors that have resulted in the prevalence of childhoodRead MoreArgumentative Research Paper On Childhood Obesity1555 Words   |  7 Pages Argumentative Research Paper: Childhood Obesity Issac Jones ECPI University ENG 120 Advanced Composition M. Barnes June 11, 2017 Health has become a very popular topic in today’s society; how to lose weight, healthy body mass index, proper foods to eat to give your body nutrition, certain exercises to help lose weight here or gain muscle there, lower prices for a gym memberships, it seems to be a topic we are hearing about all the time now. However,Read MoreObesity : Obesity And Obesity1099 Words   |  5 Pagesof the new epidemic called Obesity. Obesity is not only a major health issue in the United States but also the world. Over the past 30 years, The World Health Organization has considered increasing Obesity’s prevalence to epidemic levels. One result as to why, is that Obesity is putting more worldwide people to risk of death from obesity rather than underweight. (Cowie, 2014) Over the past 30 years there has been a marked increase to the prevalence of childhood obesity, Sixty percent of childrenRead MoreEssay on Outline for Speech1256 Words   |  6 Pages Title: Child Obesity, a â€Å"Growing† Concern Topic: Most Prevalent Causes of Obesity in the U.S. Specific Purpose: To educate the audience on the key causes of the increasing obesity rate in the U.S. among adults, but especially among youth. Thesis Statement: The main contributors to obesity among adults, but mostly among youth are environmental factors, lack of choosing nutritious meals, portion distortion and the factor that fuels all of these, advertising media. INTRODUCTION Read MoreThe Causes And Implications Of Childhood Obesity873 Words   |  4 Pagesthat childhood obesity has gained a lot of attention in the recent years especially in the 21st century. It has the ability to affect a child in many ways, including physically, mentally, sociologically and psychologically. Childhood obesity is a serious health concern that is partially causes by the careless decisions about food intake, physical activity and lack of parental concerns and knowledge towards a child’s health. According to World Health Organization (WHO) childhood obesity is defined asRead MoreHow Obesity Has Revolutionized The Way We Think About Health And Sickness Essay1567 Words   |  7 Pagesconsiders obesity to be â€Å"the biggest unrecognized public health problem†Ã¢â‚¬â€it impacts millions of people worldwide (as cited in James, Rigby Leach, 2006). With adult obesity having already reached epidemic proportions, childhood obesity is beginning to do the same (World Health Organization, 2006). Canada has seen a dramatic increase in obesity among children aged 6 to 11: the rate of obesity has doubled from 13% in 1978 to 26% in 2004 (Shields, 2006). With the prevalence of childhood obesity increasingRead MoreHow Media Affects The Socialization Of Children1562 Words   |  7 PagesHow Media Affects the Socialization of Children As mass media continues to expand through our use of everyday electronics, children s socialization skills may be suffering by the lack of face to face, physical, and natural interaction. Mass media like television, computers, radios, newspapers, video games and many others play a huge role in socialization in children. Children need interaction, and mass media offers no physical interaction at all. Children are spending more and more time in theRead MoreThe Effects Of Childhood Obesity: An Epidemic In Our Nation.1391 Words   |  6 PagesThe Effects of Childhood Obesity: An Epidemic in Our Nation Seema Patel A Capstone Proposal Presented in Partial Fulfillment of the Requirements for the Degree Master of Healthcare Administration KAPLAN UNIVERSITY March 2017 The Effects of Childhood Obesity: An Epidemic in Our Nation Childhood obesity is a greatest public health concern in our nation because it has an immediate and long-term effect on morbidity and mortality later in life. Experts in this epidemic suggest that there is

Security and Fraud Issues Faced by eBusiness †Free Samples

Question: Discuss about the Security and Fraud Issues Faced by eBusiness. Answer: Introduction The aim of the current assignment is to highlight upon all types of security and fraud issues that can be encountered by Clicktowear.com, which is an e-business stores that offers all types of clothing and apparels. It is relevant to mention that security and fraud issues are one of the major concerns for all types of e-business organization. This is also currently one of the major weak points of all E-Commerce business. In the current age there is a massive increase in the volume of trade that occurs through online digital process. Huge amount of funds and business information are passed through online process, which increases the security risk of fraud transaction and data breach. One of other drawbacks of the e-Commerce is associated with the ethical and legal guidelines that are associated with entire business. Every business organizations like Clicktowear.com need to follow new ethical and legal protocols in order to carry out their E-Commerce business. The current report will aim to provide mitigation plan that will help Clicktowear.com and other business firms to deal with the issues related to security, fraud and ethical matters. This will help to increase the popularity of e-business and improve over their brand reputation. Security and Fraud issues faced by eBusiness As the popularity of e, business or eCommerce have risen significantly in the current age, more number of business transactions are occurring with the help of digital process. The business organization of e commerce section is entirely dependent upon web service and technological infrastructure to carry out on business transaction process. Taylor et al. (2014), have highlighted upon the malicious software that is a major security issue that is associated with Internet technology. There have been several reported cases related to Malware function that have resulted in business Data loss about information related to financial transaction. According to the report of Hashizume et al. (2013), all over the world wide Nearly 2 billion dollar is lost each year due to security fraud cases in eBusiness transactions. There are also several cases related to design of software bug that have the potential to hack information related to business transaction. The software bugs result in various types of errors that occur in a business website. Major security issues like site crash can also allow the hackers to steal away valuable information, thereby increasing the risk of financial loss for both the customers and business organization. This is possible due to the fact that hackers can have easy access to the information related to bank account details and credit card of the users. Laudon and Traver (2013), have mentioned in this context that most of the trade related to e-business is associated with excessive use of Internet that can increase the risk of physical data theft. In many cases the E-commerce website keep Backup storage information that is necessary in emergency cases of data loss. This can also increase the risk of security due to the fact that it is easily possible for the cyber criminals to access the backup information. Major E-Commerce business is dependent on wireless Internet Communication Technology. This can also be a major risk due to the fact that there is a high probability that outsiders can also connect with the wireless devices and get access to classified information of business strategies. In spite of security password there is highest that the wired communication devices are easily accessible to outside cyber criminals (Singhal et al. 2013). For large scale business organization like Clicktowear.com, has to form business partnership with various other third party organizations. It is important to note that verifying The Identity of the third party organizations through online transaction process is a challenge for the operational department. The online communication process is also highly risky due to the fact that it is easily possible for the outsiders to encrypt the content of the communication process. Turban et al. (2017), have mentioned about the fact that progress in the Encryption Algorithm by the cyber criminals the current days has been a major concern. With the process of encryption it is a really possible to hack the password of an individual and get detail access to personal information. On the other hand, high level of encryption is being processed in order to protect the security password that is provided to save the classified level of information. All E-commerce website and associated with the system of data integration, which help the website to easily identify all registered clients. It is important to note that there is a gap that exists within the system of authentication process that is necessary to identify all potential customers. Due to the fact that there are high levels of loopholes in a verification process, it is not easily possible for cyber criminals to hack valuable information. Niranjanamurthy et al. (2013), have highlighted open the trust concern which is a major cause of security problem in e-business transaction. It is important for all eCommerce websites to gain the trusted advantage of the customers. This is essential the process of earning reputation among the customer. The E-business transactions have to deal with business to business and business to customer type. There have been many reported cases related to security breach within implementing e business strategies of B2B or B2 types. All this have resulted in major financial loss from both the end of buyer and sellers. Mitigation Plan to deal with security and Fraud issues in eBusiness It is important for the business plan of Clicktowear.com to implement mitigation plan to deal with all type of security and fraud risk related to e-business transaction. According to Turban et al. (2018), the primary step that is needed in the mitigation plan is to identify all security threats that are associated with e-business transaction process. As mentioned previously trust factor is one of the major concern related to business transaction in the E-Commerce section. In this context, it can be said that in the initial stage it is essential for the E-commerce website to develop strong business relationship with all types of online vendors. This will help them to provide maximum level of security that is needed for all high level of online business transaction process. One of the major highlighting points about the e-business transaction is about the fact that it allows all types of business information easily accessible to the public domain. It is essential for business organizations like Clicktowear.com to use the latest form of Business Technology and infrastructure in designing of the website. This step will help in the process of dealing with complex level of information that is needed to deal with the business transaction through online procedures. The research work of Hossain et al. (2015), have highlighted up on the importance of well resourced formal organization that is needed in dealing with purpose related to Holistic security of e-business infrastructure. This can be achieved by increasing the trust level of Internet usage and acceptability by all business stakeholders. Integrated safety measures need to be the primary essential requirement of technological infrastructure. The database of the E-commerce website needs to enable with hig h level of security to protect the classified information. The change process of the business scenario need to be integrated with specific security measures, which can guarantee maximum possible safety for the business transaction process. Globalization process has been one of the key driving factors that have increased the popularity of digital business communication process. The online trading is highly dependent upon technological infrastructure that is available within the consumer market. It is important to note that e-business organizations are often dependent on various levels of employees, who are recruited from all over the globe. In order to increase the trust factor, it is important to implement essential recruitment plan, which will help the company to rely upon the workers. They also need to be strong security protocol for every employee, which will not allow them to misuse the classified company information and compromise upon the security level. The mitigation plan for online security also needs to implement proper training programs for the employees, which will help them to deal with all issues related to Cyber crimes. With having high level of Technical skills, it is possible for the employees to use p rofessional technique for dealing with all business communication process. This will reduce the risks that are associated with data breach and Internet Malware programming. High level of penalty also needs to be included within the protocol of the company. The overall mitigation plan needs to properly identify all the security threats that can compromise upon the business reputation and cause financial loss. In the following step, it is essential to deal with specific issues at each level and implement a blueprint of the security plan. Ethical and legal issues in eBusiness With the first range of Internet advertisement, there is a strong rise of popularity of e-business. However, ethical and legal issues related to Internet and digital usage is also applicable with the E-commerce. The business operation of e-commerce is dependent upon using of detail information of the client. The tracking software has the ability to get detailed personal information, which can also be stored for further references. There has been a strong level of ethical concerns due to the security issues related to accessing personal information of the clients. Hence, as mentioned by Ladan (2014), privacy issue is one of the major ethical concerns related to online business transaction. Cheng et al. (2014), have highlighted up on some of the major ethical concerns related to treatment of the E-Commerce business organization with employees. In many cases, the employees are being pushed in a critical zone that may eliminate them from the job. As mentioned in the previous section it is important for E-Commerce business organization to maintain a strong security protocol in relationship with every employee. However, in many cases the company seeks for personal level of information from the employee that can be other ethical issues. The E-Commerce businesses are entirely dependent upon customers, choosing the desired product from the description that is provided within the website. In this contact there is high probability that website can provide false or fake information about product description. There are many reported cases about fake product being provided to the customers at lower prices (Kolhe 2016). This can have a serious impact upon the overall business reputation of e-commerce trading. There is also the risk that in many occasions products are being damaged in the supply chain process due to lack of proper packaging system. The damage product can also result in poor level of customer satisfaction that is an also one of the major ethical concerns. Poor or fake information about product description can also raise legal concern. This can be direct example of violation in customer protection act. In order to provide product at lower cost, the eCommerce business organization compromise on product quality. Cases related to violation of Intellectual Property Rights are also a major legal concern in e-business transaction. Reports have highlighted up on violation in the intellectual property rights. There is also severing competition over the domain names that are being used by ECommerce websites. All business organizations aim to have a popular domain name, which can give them a competitive edge the fast growing eCommerce industry. However, in many cases business organizations adopt illegal ways to use domain names of third party web servers that can compromise upon the use of the company's legal and ethical reputation. Ways to deal with ethical and legal issues in eBusiness At the initial stage, it is essential for the e-commerce websites like Clicktowear.com to get detailed information about the legal and ethical matters related to respective business. The management of the company also needs to have a clear idea about the guidelines of the legal protocols that are being implemented for all online business transaction process. The company also needs to recruit special legal Advisors, which can help them in implementing business protocol that can help in improving upon the company's legal and ethical reputation (Raghunat and Panga 2013). Providing real and actual description of the product is highly essential to ensure that they are able to seek the trust level of the customers. The company also needs to have proper return policy that can help in case; the customer receives poor or damaged products. Employees should be trained with proper protocol that can prevent them to misuse private information of the client. Strict protocol should be also implemented against every employee that misuses the information (Akman et al. 2017). The company also needs to protect their intellectual property with the guidelines of respective guideline principles. Themarketing campaigns of the E-commerce website also need to have proper ethical and legal guideline principle, which will have to provide proper and correct information to the customers. This will help in gaining the trust of the clients and thereby increase the popularity of online shopping trends among the customers. Conclusion In concluding note, it can be said that with the increase popularity of e-commerce business there is a growing security and legal issues related to the business transaction process. This can be a major threat to all the future business opportunities that are associated with e-business. It is essential for all E-Commerce business organization like Clicktowear.com to have strong business strategy to deal with the security and ethical concern related to online business. The legal protocol can also help in the process of improving the business protocol and trust level of the customers. References Akman, I., Akman, I., Mishra, A. and Mishra, A., 2017. Factors influencing consumer intention in social commerce adoption. Information Technology People, 30(2), pp.356-370. Cheng, H.F., Yang, M.H., Chen, K.Y. and Chen, H.L., 2014. Concerns regarding ethical issues associated with online shopping are growing. Based on a framework that captures all stages of a transactional process, this study developed a transaction process-based scale, the eTransEthics scale, for assessing the consumer-perceived ethics of e-commerce websites. The results of applying exploratory factor analysis to data from 406 online shoppers indicate that... Electronic Commerce Research and Applications, 13(1), pp.32-44. Hashizume, K., Rosado, D.G., Fernndez-Medina, E. and Fernandez, E.B., 2013. An analysis of security issues for cloud computing. Journal of Internet Services and Applications, 4(1), p.5. Hossain, M.M., Fotouhi, M. and Hasan, R., 2015, June. Towards an analysis of security issues, challenges, and open problems in the internet of things. In Services (SERVICES), 2015 IEEE World Congress on (pp. 21-28). IEEE. Kolhe, S.D., 2016. E-Commerce New Trends, Strategies, Issues, Challenges and Best Practices. KHOJ: Journal of Indian Management Research and Practices, pp.34-40. Ladan, M.I., 2014, August. E-Commerce Security Issues. In Future Internet of Things and Cloud (FiCloud), 2014 International Conference on (pp. 197-201). IEEE. Laudon, K.C. and Traver, C.G., 2013. E-commerce. Pearson. Niranjanamurthy, M., Kavyashree, N., Jagannath, S. and Chahar, D., 2013. Analysis of e-commerce and m-commerce: advantages, limitations and security issues. International Journal of Advanced Research in Computer and Communication Engineering, 2(6). Raghunath, A. and Panga, M.D., 2013. Problem and Prospects of e-commerce. International Journal of Research and Development-A Management Review (IJRDMR), 2(1), pp.59-68. Singhal, M., Chandrasekhar, S., Ge, T., Sandhu, R., Krishnan, R., Ahn, G.J. and Bertino, E., 2013. Collaboration in multicloud computing environments: Framework and security issues. Computer, 46(2), pp.76-84. Taylor, R.W., Fritsch, E.J. and Liederbach, J., 2014. Digital crime and digital terrorism. Prentice Hall Press.marketing Turban, E., Outland, J., King, D., Lee, J.K., Liang, T.P. and Turban, D.C., 2017. Electronic Commerce 2018: A Managerial and Social Networks Perspective. Springer. Turban, E., Outland, J., King, D., Lee, J.K., Liang, T.P. and Turban, D.C., 2018. E-Commerce Security and Fraud Issues and Protections. In Electronic Commerce 2018 (pp. 403-455). Springer, Cham.