Ecommerce

Read Complete Research Material



Ecommerce

Privacy issues in Ecommerce

Introduction

The arrival of the Internet has allowed the development of e-commerce and several users do not think it is risky to buy online, and in doing payment online. There is the question that how internet commerce is safe? Trade security, confidentiality, authenticity guarantees are required in electronic commerce. Measures have been taken to protect the most consumers and merchants against theft, non-payment, all the frauds that can crack down on Internet.

Discussion

Safety is a key issue for the implementation of e-commerce. The main obstacles that arise in the development of Internet payments, is the psychological factor associated with awareness of the potential threat of fraud. People still do not see the Internet as a secure environment, aided by objective information about the security of the Internet (Ackerman et al, 1997). Polls show that most people are afraid of a potential risk of someone of their personal data over the Internet. According to the VISA about 23% of transactions with bank cards and are not made for fear of the client to enter the requested electronically store personal information about the customer. As a result, people mainly use the Internet as an information channel to obtain information of interest.

Unauthorized Access

Individuals scams usually do not care, because their balances are not large enough. Moreover, the probability of breaking legal entities increased due to the fact that the accountant during the week always active. Each month in the police record, dozens of similar incidents occurred due to these threats. By volume of the damage they can be quite significant and in actual practice, the majority of thefts on e-banking system is in 250 thousand rubles, and some are known and with 1 million dollars (Garfinkel, 2002).

In most cases, organized theft of money from the unauthorized use of the recoverable can be considered as the online attacks, when the USB-token is set in a working computer. Token in turn is a small device equipped with a keyboard and a liquid crystal display (Ackerman et al, 1997). These devices allow you to protect the key from unauthorized access at the program level as they can only take advantage of a person who knows the corresponding PIN-code and the physical layer. Even if the token is stolen and disassembled into parts by attackers to gain access to information stored on it is impossible (Garfinkel, 2002).

USB Token

Most problems occur if your balance is not only equipped with a permanently installed one USB-token, but the system unit shuts down for the night and only translated into a sleep mode, while remaining connected to the access channel to the Internet. The first mass incidents of attacks on-line at the e-banking users become apparent from the beginning of 2010 into computers on viruses isolated during the recess of the e-banking system, and after adjustment to set the computer to the client software and read the basic parameters of the such operations, and start making their money orders to send to the bank (LaRose et al, ...
Related Ads