Page 335 - Introduction to Electronic Commerce and Social Commerce
P. 335

322                                                     10  E-Commerce Security and Fraud Issues and Protections

           almost impossible for an applicant to impersonate another   Senior Management Commitment and Support
           person. Overall, trust in online transactions and in EC in
             general would increase significantly. Authentication can be  The success of an EC security strategy and program depends
           achieved in several ways, including the use of biometrics.  on the commitment and involvement of senior management.
                                                              Many  forms  of  security  are  unpopular  because  they  are
             Fraud Detecting Systems                          inconvenient, restrictive, time-consuming, and expensive.
                                                              Security practices may not be a top organizational priority
           There are a large number of fraud detection systems such as  unless they are mandated.
           the use of data mining for credit card fraud. CyberSource also   Therefore, an EC security and privacy model for effective
           has developed several tools for detecting fraud. For details, see  enterprisewide security should begin with senior manage-
           Cyber Source periodic reports and authorize.net/resources/  ment’s commitment and support, as shown in Figure 10.10.
           files/fdswhitepaper.pdf.                           The model views EC security (as well as the broader IT secu-
                                                              rity) as a combination of commitment and support, policies
                                                              and training, procedures and enforcement, and tools, all exe-
             SECTION 10.7  REVIEW QUESTIONS                   cuted as a continuous process.

             1.  Describe consumer protection measures.
             2.  Describe assurance services.                   EC Security Policies and Training
             3.  What must a seller do to protect itself against fraud? How?
             4.  Describe types of electronic signatures. Who is protected?  An important security task is developing an organizational
              Why?                                            EC security policy, as well as procedures for specific security
             5.  Describe authentication.                     and EC activities such as access control and protecting cus-
                                                              tomer data. Customers should:
           10.8   IMPLEMENTING ENTERPRISEWIDE
                  E-COMMERCE SECURITY                           •  Know that data is being collected, and when it is
                                                                  done.
           Now that you have learned about both the threats and the   •  Give their permission for the data to be collected.
           defenses, we can discuss some implementation issues starting   •  Have knowledge and some control over how the
           with the reasons why it is difficult, or even impossible, to stop   data is controlled and used.
           computer crimes and the malfunction of information systems.  •  Be informed that the information collected is not to
                                                                  be shared with other organizations.

             The Drivers of EC Security Management
                                                                To protect against criminal use of social media, you can:
           The explosive growth of EC and SC, together with an increase
           in the ever-changing strategies of cybercriminals, combined
           with regulatory requirements and demands by insurance
                                                                •  Develop policies and procedures to exploit opportu-
           companies, drives the need for comprehensive EC security   nities but provide customer protection.
           management. Additional drivers are:
                                                                •  Educate employees and others about what is accept-
                                                                  able and what is not acceptable.

              •  The laws and regulations with which organizations
                must comply.
              •  The conduct of global EC. More protection is needed   According to sans.org, cyberintelligence is an important
                when doing business with a foreign country.   defense tool.
              •  Information assets have become critical to the oper-
                ation of many businesses.
              •  New and faster information technologies are shared
                throughout organizations. Organizational collabora-    EC Risk Analysis and Ethical Issues
                tion is needed.
                                                              EC security procedures require an evaluation of the digital
              •  The complexity of both the attacks and the defense
                requires an organization-wide collaboration approach.  and financial assets at risk—including cost and operational
                                                              considerations.
   330   331   332   333   334   335   336   337   338   339   340