Page 306 - Introduction to Electronic Commerce and Social Commerce
P. 306

E-Commerce Security and Fraud Issues                                   10
                                   and Protections
















           Contents                                           Learning Objectives
             Opening Case: How State University of New York
           College at Old Westbury Controls Its Internet Use ..................  293  Upon completion of this chapter, you will be able to:
                                                                1.  Understand the importance and scope of security of infor-
           10.1   The Information Security Problem .................................  294
                                                                 mation systems for EC.
           10.2   Basic E-Commerce Security Issues and Landscape.......  299
                                                                2.  Describe the major concepts and terminology of EC
           10.3   Technical Malware Attack Methods:              security.
                From Viruses to Denial of Service ...................................  303    3.  Understand about the major EC security threats, vulner-
           10.4   Nontechnical Methods: From Phishing to Spam    abilities, and technical attacks.
                and Fraud ..........................................................................  307    4.  Understand Internet fraud, phishing, and spam.
           10.5   The Information Assurance Model               5.  Describe the information assurance security principles.
                and Defense Strategy ........................................................  312    6.  Describe the major technologies for protection of EC
           10.6   Defending Information Systems and E-Commerce .......  314  networks, including access control.
                                                                7.  Describe various types of controls and special defense
           10.7   Consumer and Seller Protection from Online Fraud .....  319
                                                                 mechanisms.
           10.8   Implementing Enterprisewide E-Commerce Security....  322    8.  Describe consumer and seller protection from fraud.
             Managerial Issues .........................................................................  324    9.  Discuss enterprisewide implementation issues for EC
             Closing Case: How One Bank Stopped Scams, Spams,    security.
           and Cybercriminals......................................................................  328    10.  Understand why it is so difficult to stop computer crimes.
                                                                11.  Discuss the future of EC.
           References .....................................................................................  329

                                                                OPENING CASE: HOW STATE UNIVERSITY
                                                              OF NEW YORK COLLEGE AT OLD WESTBURY
                                                              CONTROLS ITS INTERNET USE


                                                              The State University of New York (SUNY) College at Old
                                                              Westbury (oldwestbury.edu) is a relatively small U.S. uni-
                                                              versity located in Long Island, New York. The college has
                                                              3300 students and 122 full-time faculty. Internet access is
                                                              essential for both faculty and students.



                                                                The Problem

                                                              The College does not regulate the types of devices people
           Electronic supplementary material: The online version of this chapter
           (doi:10.1007/978-3-319-50091-1_10) contains supplementary material,   use in its network, such as laptops, tablets, and smartphones,
           which is available to authorized users.            nor the purposes for which the devices are used. Thus,  students,


           © Springer International Publishing AG 2017                                                     293
           E. Turban et al., Introduction to Electronic Commerce and Social Commerce,
           Springer Texts in Business and Economics, DOI 10.1007/978-3-319-50091-1_10
   301   302   303   304   305   306   307   308   309   310   311