Skip to main content
Top

2017 | OriginalPaper | Chapter

10. E-Commerce Security and Fraud Issues and Protections

Authors : Efraim Turban, Judy Whiteside, David King, Jon Outland

Published in: Introduction to Electronic Commerce and Social Commerce

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Upon completion of this chapter, you will be able to:
1.
Understand the importance and scope of security of information systems for EC.
 
2.
Describe the major concepts and terminology of EC security.
 
3.
Understand about the major EC security threats, vulnerabilities, and technical attacks.
 
4.
Understand Internet fraud, phishing, and spam.
 
5.
Describe the information assurance security principles.
 
6.
Describe the major technologies for protection of EC networks, including access control.
 
7.
Describe various types of controls and special defense mechanisms.
 
8.
Describe consumer and seller protection from fraud.
 
9.
Discuss enterprisewide implementation issues for EC security.
 
10.
Understand why it is so difficult to stop computer crimes.
 
11.
Discuss the future of EC.
 

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Literature
go back to reference Alto, P. “Infographic: The Real Cost of Cyberattacks.” Enterprise Innovation, March 21, 2016. Alto, P. “Infographic: The Real Cost of Cyberattacks.” Enterprise Innovation, March 21, 2016.
go back to reference Andress, J. The Basics of Information Security, Second Edition: Understanding the Fundamentals of InfoSec in Theory and Practice. Rockham, MA: Syngress Pub., 2014. Andress, J. The Basics of Information Security, Second Edition: Understanding the Fundamentals of InfoSec in Theory and Practice. Rockham, MA: Syngress Pub., 2014.
go back to reference Bort, J. “For the First Time, Hackers Have Used a Refrigerator to Attack Businesses.” Business Insider, January 16, 2014. Bort, J. “For the First Time, Hackers Have Used a Refrigerator to Attack Businesses.” Business Insider, January 16, 2014.
go back to reference Cloud, J. Internet Security: Online Protection from Computer Hacking. North Charleston, USA: CreateSpace Publishing Platform, 2015. Cloud, J. Internet Security: Online Protection from Computer Hacking. North Charleston, USA: CreateSpace Publishing Platform, 2015.
go back to reference Constantin, L. “Identity Thieves Obtain 100,000 Electronic Filing PINs from IRS System.” IDG News Service, February 10, 2016. Constantin, L. “Identity Thieves Obtain 100,000 Electronic Filing PINs from IRS System.” IDG News Service, February 10, 2016.
go back to reference CyberSource. 14th Annual 2013 Online Fraud Report, CyberSource Corporation (2013). CyberSource. 14th Annual 2013 Online Fraud Report, CyberSource Corporation (2013).
go back to reference Dawn Ontario. “Virus Information: Guide to Computer Viruses.” n.d. Dawn Ontario. “Virus Information: Guide to Computer Viruses.” n.d.
go back to reference Forrest, C. “Phishing Gets More Dangerous: New Report Analyzes the Weapons of Choice.” TechRepublic, January 27, 2016. Forrest, C. “Phishing Gets More Dangerous: New Report Analyzes the Weapons of Choice.” TechRepublic, January 27, 2016.
go back to reference Frenkel, K. A. “2016 Has the Markings of a Perfect Storm for Fraud.” CIO Insight, January 28, 2016. Frenkel, K. A. “2016 Has the Markings of a Perfect Storm for Fraud.” CIO Insight, January 28, 2016.
go back to reference Goodman, M. Future Crimes: Inside the Digital Underground and the Battle for our Connected World. New York: Anchor Reprint, 2016. Goodman, M. Future Crimes: Inside the Digital Underground and the Battle for our Connected World. New York: Anchor Reprint, 2016.
go back to reference Greengard, S. “Breaches of Health Care Data: A Growing Epidemic.” Baseline, February 12, 2016. Greengard, S. “Breaches of Health Care Data: A Growing Epidemic.” Baseline, February 12, 2016.
go back to reference Harrison, V., and J. Pagliery. “Nearly 1 Million New Malware Threats Released Everyday.” CNN News, April 14, 2015. Harrison, V., and J. Pagliery. “Nearly 1 Million New Malware Threats Released Everyday.” CNN News, April 14, 2015.
go back to reference Harwood, M. Internet Security: How to Defend Against Attackers on the Web (Jones & Bartlett Learning Information Systems Security & Assurance), 2nd edition. Burlington, MA: John Bartlett Learning, 2015. Harwood, M. Internet Security: How to Defend Against Attackers on the Web (Jones & Bartlett Learning Information Systems Security & Assurance), 2nd edition. Burlington, MA: John Bartlett Learning, 2015.
go back to reference Hinckley, S. “Pay by Selfie? Amazon Says Your Portrait Can Protect Online Purchases.” CSMonitor, March 15, 2016. Hinckley, S. “Pay by Selfie? Amazon Says Your Portrait Can Protect Online Purchases.” CSMonitor, March 15, 2016.
go back to reference Horowitz, D., and A. Horowitz. “Online Merchandise Scams Target Students.” The Costco Connection, December 2015. Horowitz, D., and A. Horowitz. “Online Merchandise Scams Target Students.” The Costco Connection, December 2015.
go back to reference Jennings, R. “This Hollywood Hospital Didn’t Backup Its Data? “Ransomware” Payday for Evil Hackers.” Computerworld, February 18, 2016. Jennings, R. “This Hollywood Hospital Didn’t Backup Its Data? “Ransomware” Payday for Evil Hackers.” Computerworld, February 18, 2016.
go back to reference John, A. Internet Security. Publisher: Self-Publishing, 2016. John, A. Internet Security. Publisher: Self-Publishing, 2016.
go back to reference Jones, M. “Facebook Tests Tool that Identifies Fake Accounts.” Value Walk, March 24, 2016. Jones, M. “Facebook Tests Tool that Identifies Fake Accounts.” Value Walk, March 24, 2016.
go back to reference Kan, M. “Alibaba Uses Facial Recognition Tech for Online Payments.” Computer World, March 16, 2015. Kan, M. “Alibaba Uses Facial Recognition Tech for Online Payments.” Computer World, March 16, 2015.
go back to reference Lawinski, J. “Security Slideshow: Malicious Attacks Skyrocket as Hackers Explore New Targets.” CIO Insight, May 7, 2012. Lawinski, J. “Security Slideshow: Malicious Attacks Skyrocket as Hackers Explore New Targets.” CIO Insight, May 7, 2012.
go back to reference Lemos, R. “Phishing Attacks Continue to Sneak Past Defenses.” eWeek, February 11, 2016. Lemos, R. “Phishing Attacks Continue to Sneak Past Defenses.” eWeek, February 11, 2016.
go back to reference Maxwell, D. Hacking: Bootcamp—How to Hack Computers, Basic Security and Penetration Testing (Hacking The Common Core). [Kindle Edition] Seattle, WA: Amazon Digital Services, 2016. Maxwell, D. Hacking: Bootcamp—How to Hack Computers, Basic Security and Penetration Testing (Hacking The Common Core). [Kindle Edition] Seattle, WA: Amazon Digital Services, 2016.
go back to reference Nakashima, E., and M. Zapotosky. “U.S. Charges Iran-Linked Hackers with Targeting Banks, N.Y. Dam.” The Washington Post, March 24, 2016. Nakashima, E., and M. Zapotosky. “U.S. Charges Iran-Linked Hackers with Targeting Banks, N.Y. Dam.” The Washington Post, March 24, 2016.
go back to reference Pagliery, J. “Your Car Is a Giant Computer- and It Can Be Hacked.” CNN Money, June 2, 2014b. Pagliery, J. “Your Car Is a Giant Computer- and It Can Be Hacked.” CNN Money, June 2, 2014b.
go back to reference Reisinger, D. “10 Mobile Security Issues that Should Worry You.” eWeek, February 11, 2014. Reisinger, D. “10 Mobile Security Issues that Should Worry You.” eWeek, February 11, 2014.
go back to reference Russell, K. “Here’s How to Protect Yourself from the Massive Security Flaw That’s Taken over the Internet.” Business Insider, April 8, 2014. Russell, K. “Here’s How to Protect Yourself from the Massive Security Flaw That’s Taken over the Internet.” Business Insider, April 8, 2014.
go back to reference Scott, J. Cybersecurity 101: What You Absolutely Must Know!- Volume 1: Learn to be Pwned, Thwart Spear Phishing and Zero Day Exploits, Cloud Security Basics and Much More. [Kindle Edition] Seattle, WA: Amazon Digital Services, 2016a. Scott, J. Cybersecurity 101: What You Absolutely Must Know!- Volume 1: Learn to be Pwned, Thwart Spear Phishing and Zero Day Exploits, Cloud Security Basics and Much More. [Kindle Edition] Seattle, WA: Amazon Digital Services, 2016a.
go back to reference Scott, J. Cybersecurity 101: What You Absolutely Must Know!- Volume 2: Learn JavaScript Threat Basics, USB Attacks, Easy Steps to Strong Cybersecurity, Defense Against Cookie Vulnerabilities, and Much More! [Kindle Edition] Seattle, WA: Amazon Digital Services, 2016b. Scott, J. Cybersecurity 101: What You Absolutely Must Know!- Volume 2: Learn JavaScript Threat Basics, USB Attacks, Easy Steps to Strong Cybersecurity, Defense Against Cookie Vulnerabilities, and Much More! [Kindle Edition] Seattle, WA: Amazon Digital Services, 2016b.
go back to reference Scott, W. Information Security 249 Success Secrets- 249 Most Asked Questions on Information Security- What You Need to Know. Brisbane, Queensland, Australia: Emereo Publishing, 2014. Scott, W. Information Security 249 Success Secrets- 249 Most Asked Questions on Information Security- What You Need to Know. Brisbane, Queensland, Australia: Emereo Publishing, 2014.
go back to reference Singer, P. W., and A. Friedman. Cybersecurity and Cyberwar: What Everyone Needs to Know. 1st Edition, New York: Oxford University Press, 2014. Singer, P. W., and A. Friedman. Cybersecurity and Cyberwar: What Everyone Needs to Know. 1st Edition, New York: Oxford University Press, 2014.
go back to reference Smith, R. Elementary Information Security, 2nd edition. Burlington, MA: Jones Bartlett, 2015. Smith, R. Elementary Information Security, 2nd edition. Burlington, MA: Jones Bartlett, 2015.
go back to reference Swann, C. T. Marlins Cry a Phishing Story. Spokane, WA: Cutting Edge Communications, Inc., 2012. Swann, C. T. Marlins Cry a Phishing Story. Spokane, WA: Cutting Edge Communications, Inc., 2012.
go back to reference TechRepublic Staff. “The 15 Most Frightening Data Breaches.” TechRepublic, October 29, 2015. TechRepublic Staff. “The 15 Most Frightening Data Breaches.” TechRepublic, October 29, 2015.
go back to reference Teo, F. “Monitoring Your Internal Network with Intelligent Firewalls.” Enterprise Innovation, January 18, 2016. Teo, F. “Monitoring Your Internal Network with Intelligent Firewalls.” Enterprise Innovation, January 18, 2016.
go back to reference Troinovski, A. “German Parliament Struggles to Purge Hackers from Computer Network.” The Wall Street Journal, June 12, 2015. Troinovski, A. “German Parliament Struggles to Purge Hackers from Computer Network.” The Wall Street Journal, June 12, 2015.
go back to reference Van Allen, F. “The 18 Scariest Computer Viruses of All Time.” TechRepublic, January 22, 2016. Van Allen, F. “The 18 Scariest Computer Viruses of All Time.” TechRepublic, January 22, 2016.
go back to reference Victor, D. “Authorities Shut Down Darkode, a Marketplace for Stolen Personal Data.” New York Times, July 15, 2015. Victor, D. “Authorities Shut Down Darkode, a Marketplace for Stolen Personal Data.” New York Times, July 15, 2015.
go back to reference Wagstaff, K. “Why Is the U.S. Going After Chinese Hackers? Jobs?” NBC News, May 19, 2014. Wagstaff, K. “Why Is the U.S. Going After Chinese Hackers? Jobs?” NBC News, May 19, 2014.
go back to reference Winton, R. “Hollywood Hospital Pays $17,000 in Bitcoin to Hackers: FBI Investigation.” Los Angeles Times, February 18, 2016. Winton, R. “Hollywood Hospital Pays $17,000 in Bitcoin to Hackers: FBI Investigation.” Los Angeles Times, February 18, 2016.
go back to reference Wollen, J. “10 Social Engineering Exploits Your Users Should Be Aware Of.” TechRepublic, January 27, 2016. Wollen, J. “10 Social Engineering Exploits Your Users Should Be Aware Of.” TechRepublic, January 27, 2016.
go back to reference Yan, S. “Chinese Man Admits to Cyber Spying on Boeing and Other U.S. Firms.” Money CNN News, March 24, 2016. Yan, S. “Chinese Man Admits to Cyber Spying on Boeing and Other U.S. Firms.” Money CNN News, March 24, 2016.
Metadata
Title
E-Commerce Security and Fraud Issues and Protections
Authors
Efraim Turban
Judy Whiteside
David King
Jon Outland
Copyright Year
2017
DOI
https://doi.org/10.1007/978-3-319-50091-1_10