StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Electronic Financial Transactions over the Internet - Term Paper Example

Cite this document
Summary
This paper looks into the various types of security threats facing electronic financial transactions, the potential damage they could inflict, the remedial measures to counter these threats. The architecture of the Internet is such that it is inherently difficult to ensure security…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.3% of users find it useful
Electronic Financial Transactions over the Internet
Read Text Preview

Extract of sample "Electronic Financial Transactions over the Internet"

Threats facing Electronic financial transactions over the Internet: With the development of the Internet in the last twenty years, the nature and manner in which financial transactions are carried out has undergone a sea change. In its early days, the Internet was used solely for purposes of communication. But in recent years the role and scope of the Internet has assumed new dimensions with the introduction of commercial transactions. What has come to be called e-commerce has its origins in the dotcom boom of the late 1990s. But it is only after the inevitable dotcom bust in the early years of the millennia that e-commerce established itself as a viable and dependable method of conducting business. Technological innovation in terms of developing security software aided this process and so did the process of globalization. As a culmination of these parallel but complementary processes, e-commerce in general and electronic financial transactions in particular has firmly taken root in mainstream global economy. While this kind of progress in such a short span of time is an impressive achievement, there is much work to be done in terms of creating robust security systems for the Internet. This essay will look into the various types of security threats facing electronic financial transactions, the potential damage they could inflict, the remedial measures to counter these threats and the effectiveness of such measures. The architecture of the Internet is such that it is inherently difficult to ensure security. Alongside this, the concept of user anonymity makes the Internet “an attractive medium for extortion and crimes involving theft of personal information for illicit financial gain” (Misra Scherer et al, 2004). As per a report released by IDG News Service, many organized crime groups avail of the services offered by hackers to implement complex and sophisticated financial schemes to swindle money from unsuspecting participants. According to the Internet Crime Complaint Center, as much as $200 million was lost in the year 2006 alone. And each year this sum seems to increase, since financial institutions like banks and insurance companies are lucrative targets for cybercriminals. A FBI report released at the beginning of the new millennia has confirmed the nexus between computer hackers and organized crime groups. Many of these organized crime groups are said to operate from Eastern European countries that were part of the erstwhile Soviet Union. In such cases, the hackers first crack the security systems in place and gain access to vital data. The organized crime groups then sell this data to interested parties, who in turn exploit it to “gain unauthorized access to credit card, bank, and brokerage accounts of unsuspecting victims” (Kiessig, 2006). Indeed the market for stolen identities is so big that it recently reached dollar one billion mark. But the threats dont end with just monetary loss, as the following cases illustrate: “The most alarming development in the area of information systems security is that terrorist organizations now perceive cybercrimes both as a source of financing for their activities and as a new weapon in their arsenal. For example, according to law enforcement organizations, the Irish Republican Army and the terrorists that plotted the foiled bombing of the Los Angeles International Airport used identity theft to finance their activities. Imam Samudra, the radical Muslim cleric and mastermind of the devastating 2002 Bali bombing attacks that claimed 202 lives, called for fellow Muslim radicals to take jihad into cyberspace and tap into online credit card fraud as a source of funding.” (Misra Scherer et al, 2004) Instances of a particular type of financial crime called “insider fraud” have also escalated during the age of the Internet. The improvement in telecommunication technology, which has helped businesses in unprecedented ways, has also incidentally facilitated fraudsters. According to industry analysts, two thirds of all losses arise due to this kind of fraudulent activity within the confines of the organization. As much as 6% of the annual revenue of a business organization can be lost in this manner (Kiessig, 2006). As was rightly pointed out by a report, this kind of electronic financial transaction fraud is perpetrated by technology-savvy employees, who have a thorough understanding of the financial processes, business system customizations and network technology. Recently laid-off employees, subcontractors and third-party consultants also commit such frauds. In such cases, the enemy is clearly within and not without. So who gains access to vital computer systems will have a bearing on the overall security of business operations. (Taylor, 2005) Another issue facing the e-commerce industry is the concept of electronic money. There are online payment systems in existence which have created a niche for them in the Internet. While the US Dollar remains the standard currency being used for electronic financial transactions, online payment systems like E-Gold, Pecunix, Liberty Reserve, etc have emerged as gold-backed alternatives to USD, although not with issues of their own. For example, E-Gold is now practically defunct due to its abuse. And those that remain in business are imposing strict regulations to curb activities like money laundering, funding terrorism, paying for child pornography, etc. Amid all the myriad of regulatory problems faced by gold-backed online payment systems, only PayPal has emerged as a reliable company. One reason why so many of the gold-backed online payment companies are prone to misuse and abuse, is the lack of an overarching governing body. Since the Internet does not fall under the purview of any national government, enforcing cyber laws have become difficult. Moreover, different nations have slightly different cyber laws, making it impossible to deduce a common set of laws applicable to all Internet users. (Misra, Scherer, et al, 2004) But with each instance of critical security breach, the electronic commerce industry challenges itself to improve its security systems. Technological innovation is one such measure, and the development of higher security standards is another. Creating awareness among consumers and business owners alike is another strategy to counter hacks. After studying the e-commerce industry, the European Unions central bank released a report in which they laid out a set of guidelines for electronic money systems. The first guideline for issuers of electronic money is that they should be subject to prudential supervision. Also, “the rights and obligations on the part of the respective participants (customers, merchants, issuers, and operators) in an electronic money system must be clearly defined and disclosed” (Kiessig, 2006). The system should also maintain sufficient technical and procedural safety nets to prevent or mitigate the threats posed to the integrity of the transactions. Measures for safeguarding the electronic financial transaction system against criminal abuse should be considered at the time of designing the system itself. With the advent of the Euro a few years ago, the dynamics of the cross national financial transactions have changed a lot. As a result, the electronic financial transaction systems of each country should supply the central bank with up to date information. Furthermore, issuers of electronic money must be “legally obliged to redeem electronic money against central bank money at par, at the request of the holder of the electronic money; and the possibility must exist for central banks to impose reserve requirements on all issuers of electronic money.” (Misra Scherer et al, 2004) While security threats can be partly dealt with through upgrading technology, there is also a managerial problem to deal with. That a majority of commercial and financial institutions provide minimal security is a clear indication of the “lack of managerial awareness and understanding of the need to protect the information stored in, and transmitted between, computers” (Wright, 1994). The consequence of such neglect can be quite acute, as the following examples show. For example, the German automobile manufacturer Volkswagen suffered a loss of $260 million due to an insider fraud that created fake currency-exchange transactions but showed them as real financial transactions after a few days. The perpetrators of this fraud profited from the favorable change in currency exchange rate in the interim period. In the case of the Bank of New York, a loss of $32 billion overdraft was incurred due to a processing error that went undetected. Further, “A group of hackers, operating under the name Masters of Deception, victimized such companies as Southwestern Bell, New York Telephone Company, Pacific Bell, US West, TRW Inc., Information America Inc., Martin Marietta Electronics Information and Missile Group, ITT Corporation, Educational Broadcast Corporation, Bugle Boy, New York University, and the University of Washington. The hackers stole credit reports, and altered or deleted files at some sites. Southwestern Bell alone reportedly spent $370,000 to repair corrupted programs and to buy more secure hardware and software” (Wright, 1994) The personnel of the IT department also have their share of duties to perform to ensure safety of financial transactions. Today, managers of this department carry their fair share of responsibility in protecting computer systems. They are given the task of tracking employees computer usage and to report aberrant or suspicious activity. The IT personnel play a key role in incident response teams alongside legal experts in ensuring adherence with applicable laws. These days, the Internet Service Providers are also extending their services to include security features so that their customers can have an Internet experience that is free of “spam, malware, phishing attacks, worms, and viruses” (Ena, 2008). Third party security vendors have also come up offering sophisticated software and hardware products that would protect computer networks from security threats. On the legislative front, to take the case of the United States, the Sarbanes-Oxley Act is a vital step forward in preventing fraudulent financial transactions. The Act holds responsible managers of business corporations for maintaining strict network protection mechanisms. Section 404 of the Sarbanes-Oxley Act is worthy of mention here, as it sets out guidelines for documenting internal controls. It further mandates that businesses should constantly monitor the effectiveness of these controls. The CEOs of companies are required to file reports with the Securities and Exchange Commission as to the veracity of the “companys financial statements based on the integrity of these controls” (Guttmann, 2002). Also, Section 302 of the Act makes it mandatory for companies to “disclose all deficiencies in their internal controls and any fraud involving employees. Developing factors that could have a negative impact on internal controls must also be reported.” (Taylor, 2005) Hence the Sarbanes-Oxley act is a much needed legislation that has contributed toward reducing instances of financial transaction fraud over the Internet. Another way in which companies can strengthen their security systems is by implementing Enterprise Resource Planning (ERP) systems such as PeopleSoft and SAP. Once this is done, the operations and electronic financial transactions across various departments such as sales, manufacturing, accounting, etc can be seamlessly integrated. (Taylor, 2005) The ERP systems created by software companies such as PeopleSoft and SAP come with many in-built security features which can come handy in preventing electronic financial transaction fraud. But the problem is that “employees often view these controls as a burden and, thus, fail to maintain and update them. In many cases, employees never even properly implement the controls due to the complexity of maintaining them and the need to understand all relevant business processes before implementing those controls” (Guttmann, 2002). Hence, we learn that the prevailing threats to security systems can be significantly reduced if only employees and managers will adhere and apply certain basic security guidelines as devised by ERP systems. (Taylor, 2005) In addition to this, businesses can build transaction-integrity monitoring systems. Hence, in conclusion, it can be stated that the tug of war between computer system owners and hackers will continue in the future too. As businesses tighten up their security systems, fraudsters on the lookout for quick money will invent ingenious ways of breaking into the computer networks. In this scenario, it is quite clear that the stakeholders in the security of computer networks should stay one step ahead and come up with robust security arrangements to ward off possible threats. A coordinated effort from top managers, IT personnel, Internet Service Providers and legislators is necessary to ensure the integrity and consistency of electronic financial transactions. References Ena, M. (2008). Securing Online Transactions: Crime Prevention Is the Key. Fordham Urban Law Journal, 35(1), 147+. Guttmann, R. (2002). Cybercash: The Coming Era of Electronic Money. New York: Palgrave Macmillan. Hyman, J. (2000, September 11). Banks Use Local Firms as On-Line Guard Dogs. The Washington Times, p. 10. Katz, E. (2005, February). Adapting to Automated Fraud: Fraudsters Are Using Technology to Automate the Fraud Process, and Banks and Financial Institutions Must Prepare for These Challenges. Security Management, 49, 59+. Kiessig, T. M., Karpf, B. W., & Linkins, J. R. (2006). Financial Institutions Fraud. American Criminal Law Review, 43(2), 527+. Misra, S. K., Javalgi, R. (., & Scherer, R. F. (2004). Global Electronic Money and Related Issues. Review of Business, 25(2), 15+. Taylor, P. (2005, June). Auditing for Anomalies: New Software Tools Are Available to Help Companies Scan Transactions for Anomalies That May Signal Internal Fraud. Security Management, 49, 76+. Wright, M. A. (1994). Protecting Information: Effective Security Controls. Review of Business, 16(2), 24+. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Electronic Financial Transactions over the Internet Term Paper, n.d.)
Electronic Financial Transactions over the Internet Term Paper. Retrieved from https://studentshare.org/finance-accounting/1569204-electronic-financial-transactions-over-the-internet
(Electronic Financial Transactions over the Internet Term Paper)
Electronic Financial Transactions over the Internet Term Paper. https://studentshare.org/finance-accounting/1569204-electronic-financial-transactions-over-the-internet.
“Electronic Financial Transactions over the Internet Term Paper”. https://studentshare.org/finance-accounting/1569204-electronic-financial-transactions-over-the-internet.
  • Cited: 0 times

CHECK THESE SAMPLES OF Electronic Financial Transactions over the Internet

Electronic Fund Transfer in the Modern World

Fraudulent agents make fake promises on the internet and hence tempt the users to make payments.... This has also enabled a social revolution all over the world and made interactions easier.... Introduction The popularity of Electronic Fund Transfer in the present days has become unimaginable and its importance is clearly undeniable with the fact that the process of fund transfer taking place through online internet media with cheap network and improved cryptography making it faster, quicker and accessible to a large mass thus saving a lot of time and making the process very much transparent....
13 Pages (3250 words) Essay

Online Banking and the Banking Sector

hellip; Great changes has been noted specifically in the advent of internet and technology use for depositing, withdrawing as well as transferring of money from an account to another through the internet and mobile phone wireless services (Gbadeyan and Akinyosoye, 2011, p.... Debates have however shaped the discussions about the topic of e banking; why the modern day banking institutions are adopting the e-commerce practices through adoption of such technologies as the internet for performing the transactions as against the traditional physical banking practices....
16 Pages (4000 words) Essay

Law of Electronic Commerce and the Internet

As the electronic communication involves the border crossing the internet is borderless.... Thus Federal legal system prevail over the state legal system as the high court is the ultimate court to appeal for both the systems.... It can resolve the interstate disputes and thus the federal system prevails over the state legal system.... In the absence of internet and e commerce, the Jurisdiction used to depend on the geographical context of the occurrence of the incident....
10 Pages (2500 words) Essay

Electronic Evolution in Negotiability of Negotiable Instruments

hellip; The new practices and techniques laid down by UNICITRAL with the intention that it would not displace the more conventional usages, especially in the important role of financing international transactions.... 1) The United Nations Commission on International Trade Law Model Law on electronic Commerce 1996 (2)is a set of rules that provides a model for reform in this context.... It is recommended that the Model Law should be adopted to increase certainty in relation to the enforceability of electronic bills of exchange....
12 Pages (3000 words) Essay

Improving Transactional Processing in AIS with Internal Controls

Innovative technology has had phenomenal effect in aspects of financial accounting, budgeting, reporting, consolidation, and transaction processing reinforced by… The rapidly changing technology has had phenomenal effect on key areas of IAS, such as a firm's revenue cycle, expenditure cycle, human resources, payroll cycle, and financial reporting systems.... The technological change within the financial accounting Technology enhances the ability to capture, analyze, and simulate financial data with ease....
5 Pages (1250 words) Essay

IT Evolution in Global Banking

Many banks feared transacting over the internet because of the security threats.... Information technology can offer a bank a competitive edge over other banks (Singer, Ross & Avery 2005) the internet invention was the greatest breakthrough for banks in carrying out their transactions with customers (Wanderi 2012).... The most important concept is the internet.... In early years of internet, banks normally used the internet for internal purposes such as publishing of corporate data and offerings....
5 Pages (1250 words) Essay

Software Technology and Electronic Transactions

Commerce over the internet can be subject to a wide range of automation which provides easy access to target customers (Hedley, 2006).... nbsp; … Over time there is no definite assurance about the safety of transactions at all considering there is constant innovation and there are still much to be learned about the integration of information technology in the internet world.... New business models using the internet have ensured to target their customers as far as their marketing strategies are concerned....
8 Pages (2000 words) Essay

Consumer Confidence on the PayPal Platform

onsumer matrix has changed with the introduction of world wide web, consequently, the consumer has a more heterogeneous environment like the internet to create trust, thus trust has become a vital influence to the success of e-commerce (Theodosios Tsiakis, 2007).... The basic motive of this project is to find out the level of confidence in people when transacting on the PayPal platform....
6 Pages (1500 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us