Page 21 - Introduction to Electronic Commerce and Social Commerce
P. 21

xxii                                                                                        Contents

                    Why Internet Advertising? ........................................    272
               9.5  Online Advertising Methods: From E-Mail to SEO and Video Ads ........    272
                    Major Categories of Ads  .........................................    272
                    Banners  ......................................................    273
                    Pop-Up and Similar Type Ads .....................................    274
                    Search Engine Advertisement and Optimization .......................    275
                    Google: The Online Advertising King ...............................    276
                    Augmented Reality in Advertising ..................................    279
                    Advertising in Chat Rooms and Forums .............................    280
               9.6  Mobile Marketing and Advertising .................................   280
                    Mobile Marketing and Mobile Commerce  ...........................    280
                    Mobile Marketing Implementation Guidelines ........................    282
                    Tools to Support Mobile Advertisement  .............................   282
                    Mobile Ad Trends  ..............................................   282
               9.7  Advertising Strategies and Promotions ..............................   282
                    Permission Advertising  ..........................................   282
                    Other Advertising Strategies ......................................   283
                    Localization in Advertising .......................................   284
                    Developing an Online Advertising Plan ..............................    284
                    Advertising on Facebook .........................................   285
               Managerial Issues ...................................................    285
               Summary ..........................................................    286
               Closing Case: Johnson & Johnson Uses New Media Marketing ...............    289
               References .........................................................    290

             10  E-Commerce Security and Fraud Issues and Protections ..................    293
               Opening Case: How State University of New York College at Old Westbury
               Controls Its Internet Use ..............................................    293
               10.1  The Information Security Problem  .................................    294
                    What Is EC Security? ............................................    294
                    Security Risks in Mobile Devices ..................................   296
                    Cyberwars and Cyberespionage Across Borders .......................    296
                    The Drivers of EC Security Problems ...............................   297
                    The Darknet and the Underground Economy  .........................   298
               10.2  Basic E-Commerce Security Issues and Landscape  ....................    299
                    Basic Security Terminology .......................................    299
                    The EC Security Battleground .....................................    300
                    The Threats, Attacks, and Attackers .................................    300
                    The Targets of the Attacks in Vulnerable Areas ........................    301
                    EC Security Requirements ........................................   302
                    The Defense: Defenders, Strategy, and Methods .......................    303
               10.3  Technical Malware Attack Methods: From Viruses to Denial of Service ....    303
                    Technical and Nontechnical Attacks: An Overview .....................    304
                    The Major Technical Attack Methods ...............................    304
                    Malware (Malicious Code): Viruses, Worms, and Trojan Horses ..........    304
               10.4  Nontechnical Methods: From Phishing to Spam and Fraud ..............    307
                    Social Engineering and Fraud .....................................    307
                    Social Phishing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    308
                    Fraud and Scams on the Internet ...................................    308
                    Top Ten Attacks and Remedies ....................................    310
                    Identity Theft and Identify Fraud ...................................    310
                    Cyber Bank Robberies ...........................................    310
                    Spam Attacks ..................................................    310
   16   17   18   19   20   21   22   23   24   25   26