Preview

Personal Identifiable Information on the Internet and Online Shopping (E-Commerce)

Powerful Essays
Open Document
Open Document
1334 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Personal Identifiable Information on the Internet and Online Shopping (E-Commerce)
Online shopping is one of the biggest conveniences about using the internet. The idea of e-commerce came around in the early 1970s and in 1981 the first online marketplace was born. E-commerce is still a constantly evolving idea and technology. It’s a great idea for businesses wishing to expand to more people around the globe. The majority people that participate in online shopping have a good experience overall and positive view of the idea according to research (Saleh, 2013). However, there are still some that are concerned with buying merchandise on the web, especially the older generation that was born before the advent of the internet.
The biggest problem that plagues online marketplaces is the risk of identity theft. Identity theft is still a major concern for financial institutions and online businesses. It’s still such a big problem that even the US Attorney General, Eric Holder, urged congress to establish a set of guidelines for companies in the event that a customer’s personal identifiable information be stolen (Douglas, 2014), which came after the result of Targets servers being breached by hackers and having over 40 million customer records (including addresses, phone numbers, and even credit/debit card information) (Osborne, 2014). Currently there are only state guidelines as to how companies deal with data breaches, but the federal government is working on changing that.
There’s no doubt that as the internet continues to grow and more people gain access to the internet there will also be an increase in cybercrime. This includes phishing, where cyber criminals pose as legitimate businesses and companies online in order to steal information from consumers. The majority of phishers try to lure people into clicking a URL that looks similar to one they’ve been using to access the original website and sometimes even making the webpage look similar to the actual page, but in reality the page is fraudulent and instead the user would be sending their



Bibliography: Bose, I., & Leung, A. C. (2007). UNVEILING THE MASK OF PHISHING: THREATS, PREVENTIVE MEASURES, AND RESPONSIBILITIES. . Communications of the Association for Information Systems, 19, 544-566. Chacos, B. (2013, September 6). Here 's how to best secure your data now that the NSA can crack almost any encryption. Retrieved February 27, 2014, from PCWorld: http://www.pcworld.com/article/2048248/heres-how-to-best-secure-your-data-now-that-the-nsa-can-crack-almost-any-encryption.html Douglas, D. (2014, February 24). Here’s why the government wants a national data breach law. Retrieved February 27, 2014, from The Washington Post: http://www.washingtonpost.com/blogs/wonkblog/wp/2014/02/24/heres-why-the-government-wants-a-national-data-breach-law/ Hille, P., Walsh, G., & Brach, S. (2011). UNDERSTANDING ONLINE AND OFFLINE CONSUMER BEHAVIOR: CONCEPTUALIZING FEAR OF ONLINE IDENTITY THEFT: A QUALITATIVE STUDY AND MODEL DEVELOPMENT. AMA Summer Educators ' Conference Proceedings, 22, 214-215. Krebs, B. (2006, February 13). The New Face of Phishing. Retrieved February 27, 2014, from The Washington Post: http://voices.washingtonpost.com/securityfix/2006/02/the_new_face_of_phishing_1.html Lin, R. (2001, April 30). E-Commerce: An Introduction. Retrieved February 27, 2014, from Berkman Center for Internet & Society Harvard Law School, Open Education: http://cyber.law.harvard.edu/olds/ecommerce/ Osborne, C. (2014, February 13). How hackers stole millions of credit card records from Target. Retrieved February 27, 2014, from ZDnet: http://www.zdnet.com/how-hackers-stole-millions-of-credit-card-records-from-target-7000026299/ Saleh, Z. (2013). The Impact of Identity Theft on Perceived Security and Trusting E-Commerce. . Journal of Internet Banking & Commerce, 11. Wang, P. A. (2011, Dec). Online Phishing in the Eyes of Online Shoppers. IAENG International Journal of Computer Science, 38(4), 378-383.

You May Also Find These Documents Helpful

  • Best Essays

    References: Agarwal, R. and Karahanna, E. (2000). Time Flies When You 're Having Fun: Cognitive Absorption and Beliefs About Information Technology Usage. Management Information Systems Quarterly, 24, 665-692. Amber Stabek, S. B., and Watters, P. A. (2009). the Case for a Consistant Cyberscam Classification Framework. Internet Commerce Security Laboratory. ARIN (2009). ARIN: WHOIS Database Search Retrieved 20th Oct 2009 from ws.arin.net/ Arnold, B. (2008). The 419 scam: basis, statistics, regulation. Caslon Analytics [Online]. Available: http://www.caslon.com.au/419scamnote.htm#statistics. Bishop, J. (2008). Understanding and facilitating the development of social networks in online dating communities: A case study and model. Social Networking communities and eDating Services. Bolton, R. J. (2002). Unsupervised Profiling Methods for Fraud Detection. Statistical Science, 17, 235-255. Bonchi, E. F., Malin, B., and Jiang, W. (2008). PinKDD '08: Privacy, Security, and Trust in KDD: Post-Workshop Report. SIGKDD Explorations 2008, 10, 66-67. Dixon, R. (2005). I will eat your Dollars. Los Angeles Times [Online]. Available: http://web.archive.org/web/20051029165224/http://news.yahoo.com/s/latimests/20051020/ts_latim es/iwilleatyourdollars. Ellison, N., and Gibbs, J. (2006). Managing Impressions Online: Self Presentation in the Online Dating Environment. Journal of Computer Mediated Communication, 11. FDIC. (2009). Fraud Alert. Teller Vision. April. Feliciano, C., Robnett, B., and Komaie, G. (2009). Gendered racial exclusion among white Internet daters. Social Science Research, 38, 41-56. Ferreyra-Orozo, G. (2008). A Culture of Corruption: Everyday Deception and Popular Discontent in Nigeria. American Anthropologist, 110, 145-146. Gill, J. O. (2003). Perception of email personality at zero-acquaintance: Extroversion takes care of itself; Neuroticism is a worry. Proceedings of the 25th annual conference of the cognitive science society.…

    • 5113 Words
    • 21 Pages
    Best Essays
  • Satisfactory Essays

    Online shopping – this could lead to the loss of private information like card numbers and passwords and leading to identity fraud.…

    • 347 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Causes Of Identity Theft

    • 1108 Words
    • 5 Pages

    People often trust the internet too much when it comes to buying things or sending out their personal information. One does not take into account that there are hackers waiting to scam you for all your money and information. IN an article titled, “Information Security Breaches and the Threat to Consumers” written by Fred H. Cate, he states, “Consumers often end up unwittingly providing thieves with access to sensitive data by failing to secure their own data, by responding to fraud schemes, such as phishing and pharming, and by careless use of their personal information” (Cate 4). In other words, people tend to trust that what they put on the internet, however there are people who are trying to scam you for your money. People should be more aware and less careless about what they are sending through the internet and to who they are sending it to. While we continue to be careless with our information, we continue to see many crimes involving identity theft. Cate writes, “The vulnerability of unsecured personal data and the threat of identity-based frauds nevertheless continue to grow and evolve as perpetrators become more sophisticated in how they seek to obtain and exploit personal information” (Cate 2). It makes it easy for hackers to catch and use one’s personal information when the individual continues to be careless with their information…

    • 1108 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Lieber, R. (2011, May 6). Identity Theft. Retrieved October 6, 2011, from The New York Times: http://www.nytimes.com/2011/05/07/your-money/identity-theft/07money.html?_r=2&ref=identityfraud…

    • 1196 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Identity Theft Effect

    • 3103 Words
    • 13 Pages

    This act is designed to "strengthen data protection and safeguards, require data breach notification, and further prevent identity theft" (S.1408). (Consumers Union)…

    • 3103 Words
    • 13 Pages
    Better Essays
  • Good Essays

    The flaws of online shopping usually come between the reliability of the websites, the risk of identity theft, and the risk of credit card fraud committed by computer hackers. There is also a risk…

    • 1059 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Now it has struck harder than ever around the world. The United States has many laws that try to prevent the act of identity theft but has yet to “crack down” on the crime. In 2009 The Ministry of Justice of the Netherlands started awareness campaigns. These campaigns where made to prevent their citizens from falling victim to these Cybercrimes. Within the campaign they introduced a Fictional character “Sandra” who’s information was displayed on a television for all to see. Of course “Sandra” looking shocked was supposed to depict the unawareness of each naïve citizen. These campaigns where straight to the point and should left a mark on the public (Between Awareness and Ability: Consumers and Financial Identity Theft. Communications and Strategies. (81), 23-44.Barbara: ABC-CLIO, 1998. Credo Reference. 2 Sept. 2008. Web. 11 Nov. 2013. Van der Meulen, N. S. (2011).). In the United States there should be straighter to the point campaigns to show people that they are not…

    • 1478 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Phishing

    • 2531 Words
    • 11 Pages

    Although millions of people do business over the Internet daily, it's still important that you take steps to protect yourself. The Internet is unique technology with characteristics that offer potential for certain types of fraud. As a result, scam artists are continually trying to create new schemes to take your money.…

    • 2531 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    Phishing : Phishing attacks uses electronic communication medias such as email and websites to induce computer users into revealing confidential/personal information such as usernames, passwords, or credit card by masquerading as a trustworthy entity. Mostly the objective of phishing is to steal personal identification information relating to financial…

    • 733 Words
    • 3 Pages
    Good Essays
  • Good Essays

    HDFC case

    • 925 Words
    • 4 Pages

    Beginning in late 2006, it was reported that a large number of Indian bank customers of had received emails, which were falsely misrepresented to have been originated from their bank. In August 2007, HDFC was the fourth Indian bank to encounter this online fraud, known as 'phishing.” The recipients of the emails were told to update their bank account information on some pretext. These emails included a hyperlink within the email itself and a click to that link took recipients to a web page, which was a fake look alike to the bank’s web page. The key issue was some of the unsuspecting recipients responded to these mails and gave their login information and passwords. Later on, through net banking and by using the information collected, a large number of illegal/falsified transactions took place.…

    • 925 Words
    • 4 Pages
    Good Essays
  • Good Essays

    This assignment attempts to show the importance of awareness of the security knowledge that will make us more aware about threats like escrow services fraud, spams and spoofing. There’s statistics demonstrates the recent trends of these types of threats that people usually face in the Internet. The impacts mostly negative and sometimes there are big losses. The research studies the potential of cyberattacks to increase loss, scams and spoofing, both locally and worldwide.…

    • 933 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Phishing Attack

    • 4826 Words
    • 20 Pages

    In the field of computer security, Phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication. Phishing is a fraudulent e-mail that attempts to get you to divulge personal data that can then be used for illegitimate purposes.…

    • 4826 Words
    • 20 Pages
    Powerful Essays
  • Good Essays

    In today’s society, the internet has had a profound effect on the way people are living, working and consuming products. Convenience, time efficiency, and the availability of products at a possible lower cost are all enticing reasons to shop online; however, many people are still hesitant in shopping online in fear of their privacy and security as well as the inability to actually see the product they are purchasing and be able to instantly possess that product. Even with online purchasing becoming one of the biggest innovations to consumer purchasing, it is crucial for e-commerce managers to understand the negative factors that affect people using the Internet as a new channel of purchasing and why traditional ways of shopping will never become a way of the past, if not addressed.…

    • 823 Words
    • 4 Pages
    Good Essays
  • Better Essays

    <br>The Internet?s popularity has dramatically escalated over the past few years and has become an integral part of daily life. It has wide spread uses ranging from, obtaining information, downloading files, business advertisement to Internet commerce, which plays a major part in Internet practice. Our social structure is pressuring society to connect to the Internet, with schools world wide becoming more Web based and universities now have lectures, which can be solely viewed over the Internet. Within the next few years the potential and capabilities of the Internet are endless. With that in mind the following assignment will examine a continuously flourishing component of the Internet, Internet shopping. Although Internet shopping is on the increase, it will never surpass conventional shopping, as the ?experience of shopping? is lost, it is open to fraud and the ?try before you buy? concept does not occur. From this information, it could be stated, ?The promise of Internet shopping is drowning in a flood of deceit, customer dissatisfaction, fraud and misappropriation. The Internet is best known for being a information superhighway, not a superhighway to the shopping mall.?…

    • 1614 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    King, D., McKay, J., Marshall, P., Lee, J. & Viehland, D. (2008), Electronic Commerce 2008: A Managerial Perspective, Prentice Hall…

    • 2016 Words
    • 9 Pages
    Powerful Essays