This paper outlines some of the current security measures that have been adopted to safeguard consumers. Thus, the paper articulates access control approaches, securing of e-commerce channels, security in payment protocols and communications security…
Download file to see previous pages...
E-commerce refers to the buying and selling of goods and services by via electronic platforms such as the Internet and other computer-based networks (Schneider, 2011). It has grown to be a necessary tool for efficiency in business. However, this platform has been faced with a myriad of challenges with Moftah, Abdullah and Hawedi (2012) indicating that the problems relate to consumers’ protection in their transactions which call for trust and privacy across the different geographical locations. Mohapatra (2013) argues that e-commerce transactions have been constrained by security, with consumers wary of the privacy of their personal information and the use of credit cards to make online purchases. The increased use of mobile devices has even further complicated security provision in e-commerce. Thus, a secured system would be needed to enhance e-commerce growth.
E-commerce is online, thus accessible to the general public. The increase in cyber crime has also seen an increase in security threats in e-commerce. According to Mohapatra (2013), amounts reported globally, largely from frauds and hacking in e-commerce, stand at over $ 388 billion per year. As such, e-commerce has suffered the resultant liabilities, loss of trust and additional cost for clean-up. This calls for an effective security systems that would protect consumers and merchants from such losses. According to Schneider (2011), such a system would be pegged on a complex interaction of several database management systems, applications development platforms, network infrastructure and systems software. This encompasses preservation of integrity, confidentiality and availability of computer and data resources, referred to as the security triad. Further to this, there would be need for non-repudiation, access control and privacy. Access Control Approaches The first way in which e-commerce has been secured and protected against fraud is through access control. Physically, access control would involve the restriction of an unauthorized person into a building, property or room. In a similar manner, e-commerce has applied several technologies that control access to Internet resources, including authorization, authentication and audit (Farshchi, Gharib and Ziyaee, 2011). The model in this case entails the subjects, these being entities that could perform an action on the system, and objects, these being entities to which access needs to be controlled. Both of these should be taken as software entities as opposed to human users since a human user would only have an impact on the system through software entities on which they have control. First, user IDs, passwords, biometrics and tokens have been used to authenticate an individual. As observed by Mohapatra (2013), authentication involves what the user knows such as a password, what a user possesses such as a token or what the user is, such as biometric characteristic. The user ID/password approach verifies a user against a set of ID and password. This has however been noted to be the least secure technique in e-commerce because of the threat of guessing, eavesdropping, external disclosure, host compromise and replay attacks (Schneider, 2011). Thus, user IDs and passwords could be combined with physical tokens, creating a multiple factor authentication so as to
...Download file to see next pagesRead More
Cite this document
(“E-commerce security and fraud protection Term Paper”, n.d.)
Retrieved from https://studentshare.org/e-commerce/1493785-e-commerce-security-and-fraud-protection
(E-Commerce Security and Fraud Protection Term Paper)
“E-Commerce Security and Fraud Protection Term Paper”, n.d. https://studentshare.org/e-commerce/1493785-e-commerce-security-and-fraud-protection.
The study will assess the products the four firms are dealing with, the strategies they employ in order to realize their goal, cost and revenue drivers and the business models. Finally, the conclusion will be drawn with all the four companies put into the comparison bearing in mind on the strategies they all employ in a successful ecommerce transaction.
Online payments have been gaining greater impetus in the recent years. Along with this fact, it has also been observed that e-commerce is also rapidly gaining huge popularity. Although the traditional modes of payments such as cash and cheque are still in use, however the modern methods of payments has become more well-liked.
The author states that the web based technologies like digital TV and internet have the potential to offer more common and appreciative community contribution in the policymaking practices and procedures. However, old and legacy systems are able to encompass to persist separately for a distinct generation.
Under the situation analysis, we look at the target market needs which describe the target group of the ecommerce website and how the website is going to help them automate their transactions. This section also describes the market demographics. Market demographics describe the segmentation of the market in terms of age, income gender and society.
This has come to be known as e-commerce. When it involves businesses over the internet, crucial security measures must be taken. This is to protect the business and the clients. In e-commerce, the security measures should be up to date with the changes in times (Margherita, 2005).
White collar crime. White collar crimes often relate to crimes that have to do with large finances yet no physical violence takes place. These crimes involve most of the legal principles as other crimes, but they are complex than other crimes as they involve complicated legal and factual issues.
Zhixiong Chen ----- Department of Mathematics and Computer Information Science School of Liberal Arts Acknowledgements This dissertation would not have been possible without the guidance and the help of several individuals who in one way or another contributed and extended their valuable assistance in the preparation and completion of this study.
This essay analyzes that commerce, as it is, is the transfer of goods or/and services from one person often called the seller to another person known as the buyer or consumer of the goods or services. There is a need for an agreement between the two parties that are doing business on issues such as price, a form of the goods or services, mode of payment.
The author describes different laws, legislations, regulations and Acts in detail so as to give a full view of what measures are being taken to ensure the consumers’ protection in the online community. The idea of educating the consumers has also been emphasized upon so that they can play their part in protecting their own from the cyber criminals.