EconPapers    
Economics at your fingertips  
 

E-Commerce Security and Fraud Issues and Protections

Efraim Turban, Judy Whiteside, David King and Jon Outland
Additional contact information
Efraim Turban: University of Hawaii
Judy Whiteside: Lang Associates
David King: Dataffiti, LLC
Jon Outland: Herzing University

Chapter 10 in Introduction to Electronic Commerce and Social Commerce, 2017, pp 293-330 from Springer

Abstract: Abstract Upon completion of this chapter, you will be able to: 1. Understand the importance and scope of security of information systems for EC. 2. Describe the major concepts and terminology of EC security. 3. Understand about the major EC security threats, vulnerabilities, and technical attacks. 4. Understand Internet fraud, phishing, and spam. 5. Describe the information assurance security principles. 6. Describe the major technologies for protection of EC networks, including access control. 7. Describe various types of controls and special defense mechanisms. 8. Describe consumer and seller protection from fraud. 9. Discuss enterprisewide implementation issues for EC security. 10. Understand why it is so difficult to stop computer crimes. 11. Discuss the future of EC.

Date: 2017
References: Add references at CitEc
Citations:

There are no downloads for this item, see the EconPapers FAQ for hints about obtaining it.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:spr:sptchp:978-3-319-50091-1_10

Ordering information: This item can be ordered from
http://www.springer.com/9783319500911

DOI: 10.1007/978-3-319-50091-1_10

Access Statistics for this chapter

More chapters in Springer Texts in Business and Economics from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().

 
Page updated 2025-04-01
Handle: RePEc:spr:sptchp:978-3-319-50091-1_10