20181219050703D3328_Z11700010220174018Z11700000220154005P9-10 Revised.pptx - Course ISYS6204 E-Business Design Effective Period February 2019 E-commerce

20181219050703D3328_Z11700010220174018Z11700000220154005P9-10 Revised.pptx

This preview shows page 1 - 11 out of 53 pages.

E-commerce Security and Payment Systems Session 9-10 Course : ISYS6204 E-Business Design Effective Period : February 2019
Image of page 1
Learning Outcomes Understand the scope of e-commerce crime and security problems. Describe the key dimensions of e-commerce security. Understand the tension between security and other values. Identify the key security threats in the e-commerce environment. Describe how technology helps protect the security of messages sent over the Internet. Identify the tools used to establish secure Internet communications channels and protect networks, servers, and clients. Appreciate the importance of policies, procedures, and laws in creating security. Describe the features of traditional payment systems. Identify the major e-commerce payment systems in use today. Describe the features and functionality of electronic billing presentment and payment systems.
Image of page 2
Acknowledgments These slides have been adapted from Kenneth C. Laudon E-Commerce 2014. 10 Edition. Pearson.
Image of page 3
Outline The E-commerce Security Environment Security Threats in the E-commerce Environment Technology Solutions Management Policies, Business Procedures, and Public Laws Payment Systems E-commerce Payment Systems Electronic Billing Presentment and Payment
Image of page 4
Open an online shop in market place(s). It can be in some platforms Develop a website for your business and product profile (student can use template or free website) The shop will start on week 2 and students should make presentation on session 13-14 and final presentation in session 25-26 Semester Group Assignment
Image of page 5
Student has to design how make a strong engagement with the customers The group performance based on engagement indicators such as: high comment, shop rate from customers, shop rank in the flat form, and a high sales is an advantage (not a must), etc. The strategies in design the online shop such as: product display (photograph), sales script, automatic reply customers service are important. Semester Group Assignment (Continue)
Image of page 6
The E-commerce Security Environment
Image of page 7
Discuss What is the difference between hacking and cyberwar? Why has cyberwar become more potentially devastating in the past decade? What percentage of computers have been compromised by stealth malware programs? Will a political solution to MAD 2.0 be effective enough?
Image of page 8
The E-commerce Security Environment Overall size and losses of cybercrime unclear Reporting issues Underground economy marketplace: Stolen information stored on underground economy servers
Image of page 9
What Is Good E-commerce Security? To achieve highest degree of security New technologies Organizational policies and procedures Industry standards and government laws Other factors Time value of money Cost of security vs.
Image of page 10
Image of page 11

You've reached the end of your free preview.

Want to read all 53 pages?

  • Summer '19
  • Public-key cryptography, Pretty Good Privacy

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture