E-commerce Security and Payment Systems Session 9-10 Course : ISYS6204 E-Business Design Effective Period : February 2019
Learning Outcomes • Understand the scope of e-commerce crime and security problems. • Describe the key dimensions of e-commerce security. • Understand the tension between security and other values. • Identify the key security threats in the e-commerce environment. • Describe how technology helps protect the security of messages sent over the Internet. • Identify the tools used to establish secure Internet communications channels and protect networks, servers, and clients. • Appreciate the importance of policies, procedures, and laws in creating security. • Describe the features of traditional payment systems. • Identify the major e-commerce payment systems in use today. • Describe the features and functionality of electronic billing presentment and payment systems.
Acknowledgments These slides have been adapted from Kenneth C. Laudon E-Commerce 2014. 10 Edition. Pearson.
Outline • The E-commerce Security Environment • Security Threats in the E-commerce Environment • Technology Solutions • Management Policies, Business Procedures, and Public Laws • Payment Systems • E-commerce Payment Systems • Electronic Billing Presentment and Payment
• Open an online shop in market place(s). It can be in some platforms • Develop a website for your business and product profile (student can use template or free website) • The shop will start on week 2 and students should make presentation on session 13-14 and final presentation in session 25-26 Semester Group Assignment
• Student has to design how make a strong engagement with the customers • The group performance based on engagement indicators such as: high comment, shop rate from customers, shop rank in the flat form, and a high sales is an advantage (not a must), etc. • The strategies in design the online shop such as: product display (photograph), sales script, automatic reply customers service are important. Semester Group Assignment (Continue)
The E-commerce Security Environment
Discuss • What is the difference between hacking and cyberwar? • Why has cyberwar become more potentially devastating in the past decade? • What percentage of computers have been compromised by stealth malware programs? • Will a political solution to MAD 2.0 be effective enough?
The E-commerce Security Environment • Overall size and losses of cybercrime unclear – Reporting issues • Underground economy marketplace: – Stolen information stored on underground economy servers
What Is Good E-commerce Security? • To achieve highest degree of security – New technologies – Organizational policies and procedures – Industry standards and government laws • Other factors – Time value of money – Cost of security vs.
You've reached the end of your free preview.
Want to read all 53 pages?
- Summer '19
- Public-key cryptography, Pretty Good Privacy