Page 22 - Introduction to Electronic Commerce and Social Commerce
P. 22
Contents xxiii
Spyware ...................................................... 311
Social Networking Makes Social Engineering Easy .................... 311
Data Breach (Leak) ............................................. 311
10.5 The Information Assurance Model and Defense Strategy ................ 312
Confidentiality, Integrity, and Availability ............................ 312
Authentication, Authorization, and Nonrepudiation .................... 312
E-Commerce Security Strategy .................................... 312
The Defense Side EC Systems ..................................... 313
10.6 Defending Information Systems and E-Commerce ..................... 314
The Defense I: Access Control, Encryption, and PKI ................... 314
The Defense II: Securing E-Commerce Networks ..................... 316
The Defense III: General Controls, Spam, Pop Ups, and Social
Engineering Controls ............................................ 317
Business Continuity and Disaster Recovery .......................... 318
10.7 Consumer and Seller Protection from Online Fraud .................... 319
Consumer (Buyer) Protection ..................................... 319
Seller Protection ................................................ 320
Protecting Marketplaces and Social Network Services .................. 321
Protecting Both Buyers and Sellers: Using Electronic Signatures
and Other Security Features ....................................... 321
10.8 Implementing Enterprisewide E-Commerce Security ................... 322
The Drivers of EC Security Management ............................ 322
Senior Management Commitment and Support ........................ 322
EC Security Policies and Training .................................. 322
EC Risk Analysis and Ethical Issues ................................ 322
Why Is It Difficult to Stop Internet Crime? ........................... 323
Protecting Mobile Devices, Networks, and Applications ................ 323
Managerial Issues ................................................... 324
Summary .......................................................... 324
Closing Case: How One Bank Stopped Scams, Spams, and Cybercriminals ...... 328
References ......................................................... 329
11 Electronic Commerce Payment Systems and Order Fulfillment ............ 331
Opening Case: Cross-Border EC—Partnering with Tmall Global .............. 331
11.1 Changing Retail Landscape ....................................... 335
Omni-Channel Retail ............................................ 335
Cash Versus Noncash Transactions ................................. 335
Move to Mobile ................................................ 336
Implications for EC Payments ..................................... 337
Critical Mass .................................................. 337
11.2 Using Payment Cards Online ...................................... 338
Processing Cards Online ......................................... 339
Fraudulent Card Transactions ..................................... 341
11.3 Smart Cards ................................................... 342
Types of Smart Cards ............................................ 342
Stored-Value Cards ............................................. 343
Applications of Smart Cards ...................................... 343
11.4 EC Micropayments ............................................. 344
Case 11.1: EC Application: Innovative Credit Card Micropayments
for the Korean Metropolitan Unified Fare System .......................... 346
11.5 Paypal and Other Third-Party Payment Gateways ...................... 348
11.6 Mobile Payments ............................................... 349
Types of Mobile Payments ........................................ 349