Preview

Online Security and Payment Systems

Good Essays
Open Document
Open Document
743 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Online Security and Payment Systems
Online Security and Payment Systems
It is undeniable that online payment systems are on the upswing in today’s society, the USA and the world. Electronic payments are now being used by government agencies for direct deposit tax refunds and to pay government benefit via the use of debit cards. Individuals are also using electronic payments to settle financial transactions without the use of checks or cash. These electronic funds transfers can actually make currency conversions, if necessary. Further, companies are giving discounts on services if they are allowed to electronically draft an account (demand or credit card). With this increase in ecommerce transactions, it is reasonable to expect an increase in cybercrime. Therefore, as a consumer a major concern is the protection of identities, especially mine. The online security issues relating to the dimensions of ecommerce security stood out the most because it deals with identity and information protection. Specifically, possessing the integrity to secure and protect privacy, confidentiality and availability of personal information, is of major concern. The ability to protect and an individual’s identity and privacy is difficult to secure in an ecommerce society because individual integrity cannot be policed, “public record” is available to anyone who looks for it, and people’s lack of computer knowledge.

Establishing ethical standards (standards of behavior or integrity) does not guarantee the protection of an individual’s identity and privacy because the integrity of people cannot be policed. Ethics refers to standards or laws of behavior that dictates how human beings ought to act in given situations. A person’s behavior may not follow the law. Behaviors are influenced by feelings and feelings impact ethical choices. If a person feels hate, their choices and actions may be that of hatred. There is no standard or law to police the way a person feels. Morris Massey in the video, “What You Are



Cited: Massey, M. (1986). What You Are Is Where You Were When. Retrieved February 01, 2010, from The Richardson Company: http://www.rctm.com/5712.htm National Cyber Security Alliance. (2008, 04 10). Techshow Wire. Retrieved 11 07, 2009, from RSA 2008: Seventy-One Percent of Consumers Lack Knowledge on the Internet’s Fastest Growing Cyber Crime Threat, ‘Botnets’: http://www.techshowwire.com/2008/04/10/rsa-2008-seventy-one-percent-of-consumers-lack-knowledge-on-the-internets-fastest-growing-cyber-crime-threat-botnets-2/

You May Also Find These Documents Helpful

  • Good Essays

    There are various types of electronic categories for the e-commerce system. The most popular type of electronic payment is the digital wallet. By using the digital wallet for paying purchases over the web more efficiently and by eliminating the need repeated information for each purchase. The digital wallet is more secure, and the owner’s information is saved automatically when the information is completed for a purchase. For example; the consumer would not have repeat credit-card information each time they purchase something. Example: Google Checkout.…

    • 679 Words
    • 3 Pages
    Good Essays
  • Better Essays

    E-commerce networks are prone to external attacks. They present large targets with valuable internal data, such as customer information, credit card numbers and bank accounts, supply chain information, pricing, and so on. They must allow legitimate, worldwide users to connect and interact with the network. Speed is a priority to end users, where long transaction times or slow site navigation will motivate them to move to a different vendor. Security is another priority. Customers must be assured that their privacy and confidential information will remain intact and guarded.…

    • 890 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    In order to operate a successful and efficient E-Business, organizations must avoid legal problems by always operating by policies and procedures established by the company and the intellectual property laws and rights. Security is crucial on an online business to protect customer’s personal and financial information. In order to perform safely and responsibly, organization must keep operating systems updated, limit access of sensitive information to those who need to see it, and use encryption software to protect customers’ financial information from theft during…

    • 423 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Hw Week2

    • 899 Words
    • 4 Pages

    Ethics are the principles and standards that guide our behavior towards other people. Ethics are more subjective, more a matter of personal or cultural interpretation than laws. Laws either clearly require or prohibit an action, while ethical determinations can be harder to make because the distinctions between what is right and wrong are not always clearly defined in such black and white terms.…

    • 899 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Exam Final ECOM 320

    • 3983 Words
    • 11 Pages

    Lesson 7: E-commerce security and controls Access control: Mechanism that determines who can legitimately use a network resource. Active tokens: Access token Authentication: Process to verify the real identify of an individual, computer, computer program, or EC website. Authorization: Determines whether a buyers card is active and whether the customer has sufficient funds. Biometric systems: Authentication systems that identify a person by measurement of biological characteristic, such as fingerprints, iris patterns, facial features, or voice. Biometric control: An automated method for verifying the identity of a person based on physical or behavioral characteristics. Botnet: A huge number of hijacked Internet computers that have been set up to forward traffic, including spam and viruses, to other computers on the Internet. Business continuity plan: A plan that keeps the business running after a disaster occurs. Each function in the business should have a valid recovery capability plan. Certificate authority (CA): Third parties that issue digital certificates. Ciphertext: a plaintext message after it has been encrypted into a machine-readable form. Confidentiality: Assurance data privacy and accuracy. Keeping private or sensitive information from being disclosed to unauthorized individuals, entities, or processes. Cybercrime: Intentional crimes carried out on the Internet. Cybercriminal: A person who intentionally carries out crimes over the Internet. Crackers: A malicious hacker who may represent a serious problem for a corporation. Cryptography: is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. Data breach: A security incident in which sensitive, protected, or confidential, data is copied transmitted, viewed, stolen, or used by an individual unauthorized to do so. Denial-of-service (DoS) attack: An attack on a website in which an attacker uses specialized software to send a…

    • 3983 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Can Ethics Be Taught?

    • 1617 Words
    • 7 Pages

    Ethics are the set beliefs and values of an individual which they apply to circumstances relating to morality. To act in an ‘ethical’ manner, an individual must display integrity by doing what they believe to be right.…

    • 1617 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    Chapter 1

    • 1013 Words
    • 5 Pages

    Ethics is the standards of behavior, developed as a result of one’s concept of right and wrong.…

    • 1013 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    “E Commerce is one of the most important facets of the Internet to have emerged in the recent times. Ecommerce or electronic commerce involves carrying out business over the Internet with the assistance of computers, which are linked to each other forming a network. To be specific, ecommerce would be buying and selling of goods and services and transfer of funds through digital communications” (Benefits of Ecommerce", 2007).…

    • 1838 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Online shopping – this could lead to the loss of private information like card numbers and passwords and leading to identity fraud.…

    • 347 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    When it comes to online marketing there are many risks an individual can face when it comes to purchasing online. As this generation is all about technology most things that are set up online require personal information for example New Look requires its customer to set up an online account to purchase items. This may make the customers wary, as they wouldn’t like to become a victim of fraud due to payment security being an issue.…

    • 341 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Amazon vs. Ebay

    • 584 Words
    • 3 Pages

    According to Heyes (2005), in recent years online shopping is becoming more popular. Two popular online shopping sites are Amazon and eBay. Therefore, in this report, I want to explore which site is more competitive and how each one will do in the future, in relation to the industry in which they compete. The industry of online shopping has a unique service. Online shopping is the process through which consumers directly buy goods or services from a seller in real-time, without an intermediary service, over the internet. Internet business began in1991. It was not until 1994 that online shopping was being utilized, such as online banking. “During the same year, 1994, Netscape introduced SSL (Secure Sockets Layer) encryption of data transferred online, which has become essential for secure online shopping. Also in 1994 the German company Intershop introduced its first online shopping system. In 1995 Amazon launched its online shopping site, and in 1996 eBay appeared” (Wikipedia, 2011, page.1).…

    • 584 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Mr Zhu Qi

    • 1893 Words
    • 8 Pages

    As information technology (IT) and information systems (IS) improving rapidly, a massive number of business activities can be done by IT and IS. However, it is inevitable that the risks and threats are increasing at the same time. Thus, new kinds of risks and crimes, which mentioned by Choo and Smith, may emerge during doing the cyber events like online payments, auctions, gaming, social networking sites and blogs (Choo & Smith, 2008). Obviously, in Flayton’s case, the company suffering from data breach which happened at the processes of online payments is a typical and common information technology problem recently.…

    • 1893 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Causes Of Identity Theft

    • 1108 Words
    • 5 Pages

    People often trust the internet too much when it comes to buying things or sending out their personal information. One does not take into account that there are hackers waiting to scam you for all your money and information. IN an article titled, “Information Security Breaches and the Threat to Consumers” written by Fred H. Cate, he states, “Consumers often end up unwittingly providing thieves with access to sensitive data by failing to secure their own data, by responding to fraud schemes, such as phishing and pharming, and by careless use of their personal information” (Cate 4). In other words, people tend to trust that what they put on the internet, however there are people who are trying to scam you for your money. People should be more aware and less careless about what they are sending through the internet and to who they are sending it to. While we continue to be careless with our information, we continue to see many crimes involving identity theft. Cate writes, “The vulnerability of unsecured personal data and the threat of identity-based frauds nevertheless continue to grow and evolve as perpetrators become more sophisticated in how they seek to obtain and exploit personal information” (Cate 2). It makes it easy for hackers to catch and use one’s personal information when the individual continues to be careless with their information…

    • 1108 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Most of the platforms of what we now know as E-commerce are ridden with privacy risks issues that compromise the competitive advantages of customers and merchants and their personal and business data. When…

    • 724 Words
    • 3 Pages
    Good Essays
  • Better Essays

    E-Voting System

    • 2098 Words
    • 9 Pages

    Many of us have dealt with electronic commerce transactions. This is already a part of…

    • 2098 Words
    • 9 Pages
    Better Essays