Q: 1 Online business websites contain critical information most often targeted by hackers. Measures for protecting and preventing the data should be legally guarded against misuse, manipulation and destruction from illegally users. However, it is also important for the e-commerce Company or organizations selling their products and/or service online to understand and ascertain measures for enhancing data protection and privacy. The policies are developed basing on the operational rules and regulations for the server providers and the international IT privacy policies. The policies entail the collection, sharing, storage and usage of data obtained for personal or organization use (Laudon & Traver 2018). The process should follow strict restriction and regulation basing the importance, risk or ethical values for invading personal information related to customer’s activities on the e-commerce.“TheLawDictionary.com defines personal information as “information recorded about any person, such as their name, email address, ethnicity, social security or other identifying number and even their employment history.” (Cochran & Gilmer 2012). I strongly commend on the standardization of ethical values in regard to information privacy and data management.The e-commerce websites owners are mandated with enhancing customer’s education and awareness in regard to data protection and privacy. The sensitive involved in e-commerce business is gradually advancing as a result of increase commercial activities on mobile phones. The policy at stake for e-commerce data privacy and protection is the General Data Protection Regulation (Bidgoli 2002). According to the policy, maximum protection for customer’s private information should be highly regarded. Prior to engaging any online business activity with and individual, the business owner should inform and obtain the consent of the individual to enhance informed decision making in regard to the provision of his personal information and its access. The policies enhance the provision of legal framework of operating online business following the ethical understanding of information privacy and protection.Answer: I want 150 words explanation on this paragraph with reference, your sentence must have to start from, I like your post, I want to add some more details on your discussion.Q:2Privacy is the ability when an individual or group of people stop sharing or disclosing information about themselves after a certain degree of disclosure, when people stop choosing to disclose the information.With modern technologies such as the Internet, social media, mobile phones, big data and others, people’s privacy and security is a big issue nowadays. Preserving privacy today is very difficult as several non-governmental and governmental bodies also infringe people’s privacy.Also, for a variety of good or bad purposes, individuals, attackers, hackers and other people breach other people’s privacy. Privacy is something that is very difficult to recover once lost, or it takes a very long time to recover and achieve privacy after it has been lost. The privacy of the information is where only authorized users should be presented and able to access sensitive and private information and therefore this confidentiality needs to be protected and therefore access only to authorized users should be restricted.Thus, the privacy of the data is important in order to protect the information and confidential data in the systems and we need to secure the data or information that is confidential and private to us. This week article which I found interesting is Information security policy compliance model in organizations The Internet and data innovation has impacted human life essentially. Be that as it may, data security is as yet a significant worry for the two clients and associations. Innovation can’t exclusively ensure a safe domain for data; the human parts of data security ought to be thought about, other than the mechanical angles. The absence of data security mindfulness, numbness, carelessness, lack of care, fiendishness, and opposition are the base of clients’ oversights. In this examination, a novel model shows how consenting to authoritative data security strategies shapes and mitigates the danger of representatives’ conduct. The huge part of this exploration is gotten from the conceptualization of various parts of contribution, for example, data security learning sharing, coordinated effort, meditation, and experience, just as connection, duty, and individual standards that are significant components in the Social Bond Theory. The aftereffects of the information examination uncovered that data security learning sharing, cooperation, mediation, and experience all significantly affect workers’ frame of mind towards consistency with hierarchical data security approaches. In any case, the connection does not significantly affect workers’ demeanour towards data security approach consistency. What’s more, the discoveries have demonstrated that responsibility and individual standards influence workers’ frame of mind. The frame of mind towards consistency with data security authoritative arrangements additionally significantly affects the conduct aim in regards to data security consistency.Answer:I want 150 words explanation on this paragraph with reference, your sentence must have to start from, I like your post, I want to add some more details on your discussion.