SlideShare a Scribd company logo
Chapter 6: RISK IN E-COMMERCE
Risks Associated With Internet
Transactions
 Risk as the “possibility of loss or injury” or
someone or something that creates or suggests a
hazards."
 Losses or injuries in a digital society may occur
in many different ways:
• Data stolen, corrupted, misused, altered, or
falsely generated.
• Attacks on hardware may occur the system
unable to operate properly.
INFORMATION RISK
• Information risks stem from information
published and contained in web sites and
associated with the conduct of e-
commerce. Peripheral to information risks are
risks associated with misuse of information,
such as violation of laws in the United States and
other countries.
TECHNOLOGY RISK
• Technology risks include risks involving
hardware, software, telecommunications and
databases. These risks include the
consequences resulting from the misuse of
technology or the use of inappropriate
technologies required to address business
needs.
BUSINESS RISK
• Business risks concern customer and supplier
relationships, and risks associated with products
and services marketed and distributed over the
Internet. They also include risks associated with
managerial aspects of the business including
personnel and contractual relations.
Risks faced by customers when they
transact online:
False or Malicious Websites : Malicious websites are
typically set up for the purpose of stealing visitors' IDs and
passwords, stealing credit card information, spying on a
visitor's hard drive, and uploading files from the visitor's hard
drive.
Privacy and the Use of Cookies (Browser Safety)
• The issue of privacy on the Internet is of concern to many
people.
• Cookies from web browser is use to stored small piece
information in client side.
• Were designed to allow Web servers to operate more
efficiently, provide a better response time to repeat visitors
to their sites, and more accurately track how many different
users visit a site.
How the COOKIES
works.
FRAUD
• Access to data and programs by insiders have
always been a primary concern to auditors. The
internal control devices were easier to
implement and monitor in centralized.
INFORMATION THEFT
• Data files that are stored digitally and connected
to public telecommunications lines can
potentially be accessed by an unauthorized user
without the perpetrator ever having to leave the
comfort of home
CUSTOMER DISPUTES AND CHARGE
BACKS
• Stripe receives a notification of the disputed charge.
We automatically send you an email with details.
Additionally, we send a charge.dispute.created event
to any webhook URLs you have.
• As you know, customers or cardholders obtain credit
cards from banks, which are referred to as the
"issuing bank." A chargeback (also known as a
reversal) is a form of customer protection provided
by the issuing banks, which allows cardholders to
file a complaint regarding fraudulent transactions
on their statement. Once the cardholder files a
dispute, the issuing bank makes an investigation
into the complaint.
SABOTAGE OR DEFACEMENT
• This is when a website is attacked and the visual
appearance and/or website functions are
changed.
Denial of Service Attacks
• A denial of service attack is used by an
individual to destroy, shut down, or degrade a
computer or network resource.
• Other denial of service scenarios include the
deletion of the startup files on a computer,
rendering it unbootable, or deleting Web pages
from a Web server.
BUSINESS RECOVERY PLANS
All firms should have a disaster recovery plan,
which is a contingency plan for resuming operations
for those 'situations in which operations are
interrupted for any reason, including when an
unforeseen man-made or natural disaster occurs.
Natural disasters include incidents such as fires,
smoke, floods, tornadoes, earthquakes, and high
wind and electrical storms.
Man-made disasters include incidents such as
viruses. hardware failure, sabotage, and error.
Examples of natural disasters
e-Commerce: Chapter 6
e-Commerce: Chapter 6

More Related Content

What's hot

e commerce security and fraud protection
e commerce security and fraud protectione commerce security and fraud protection
e commerce security and fraud protection
tumetr1
 
E-Commerce Security: A Primer
E-Commerce Security: A PrimerE-Commerce Security: A Primer
E-Commerce Security: A Primer
John ILIADIS
 
Security issues in E-commerce
Security issues in E-commerceSecurity issues in E-commerce
Security issues in E-commerce
nikitaTahilyani1
 
Threats of E-Commerce in Database
Threats of E-Commerce in DatabaseThreats of E-Commerce in Database
Threats of E-Commerce in Database
Mentalist Akram
 
Web Application Hacking 2004
Web Application Hacking 2004Web Application Hacking 2004
Web Application Hacking 2004
Mike Spaulding
 
E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & Security
NetstarterSL
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerce
SensePost
 
Ecommerce security
Ecommerce securityEcommerce security
Ecommerce security
politegcuf
 
Ec2009 ch10 e commerce security
Ec2009 ch10 e commerce securityEc2009 ch10 e commerce security
Ec2009 ch10 e commerce security
Nuth Otanasap
 
Security Threats in E-Commerce
Security Threats in E-CommerceSecurity Threats in E-Commerce
Security Threats in E-Commerce
Dattatreya Reddy Peram
 
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSE-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
rausdeen anfas
 
Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce  Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce
Titas Ahmed
 
Limitations E - Commerce Security measures
Limitations E - Commerce Security measuresLimitations E - Commerce Security measures
Limitations E - Commerce Security measures
Jeril Peter
 
04-1 E-commerce Security slides
04-1 E-commerce Security slides04-1 E-commerce Security slides
04-1 E-commerce Security slides
monchai sopitka
 
Eamonn O Raghallaigh The Major Security Issues In E Commerce
Eamonn O Raghallaigh   The Major Security Issues In E CommerceEamonn O Raghallaigh   The Major Security Issues In E Commerce
Eamonn O Raghallaigh The Major Security Issues In E Commerce
EamonnORagh
 
E business security
E business securityE business security
E business security
Sameer Sharma
 
Security issues in e business
Security issues in e businessSecurity issues in e business
Security issues in e business
Rahul Kumar
 
E commerce security
E commerce securityE commerce security
E commerce security
Shakti Singh
 
E commerce Security
E commerce Security E commerce Security
E commerce Security
Wisnu Dewobroto
 
Online security and payment system
Online security and payment systemOnline security and payment system
Online security and payment system
Gc university faisalabad
 

What's hot (20)

e commerce security and fraud protection
e commerce security and fraud protectione commerce security and fraud protection
e commerce security and fraud protection
 
E-Commerce Security: A Primer
E-Commerce Security: A PrimerE-Commerce Security: A Primer
E-Commerce Security: A Primer
 
Security issues in E-commerce
Security issues in E-commerceSecurity issues in E-commerce
Security issues in E-commerce
 
Threats of E-Commerce in Database
Threats of E-Commerce in DatabaseThreats of E-Commerce in Database
Threats of E-Commerce in Database
 
Web Application Hacking 2004
Web Application Hacking 2004Web Application Hacking 2004
Web Application Hacking 2004
 
E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & Security
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerce
 
Ecommerce security
Ecommerce securityEcommerce security
Ecommerce security
 
Ec2009 ch10 e commerce security
Ec2009 ch10 e commerce securityEc2009 ch10 e commerce security
Ec2009 ch10 e commerce security
 
Security Threats in E-Commerce
Security Threats in E-CommerceSecurity Threats in E-Commerce
Security Threats in E-Commerce
 
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSE-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
 
Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce  Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce
 
Limitations E - Commerce Security measures
Limitations E - Commerce Security measuresLimitations E - Commerce Security measures
Limitations E - Commerce Security measures
 
04-1 E-commerce Security slides
04-1 E-commerce Security slides04-1 E-commerce Security slides
04-1 E-commerce Security slides
 
Eamonn O Raghallaigh The Major Security Issues In E Commerce
Eamonn O Raghallaigh   The Major Security Issues In E CommerceEamonn O Raghallaigh   The Major Security Issues In E Commerce
Eamonn O Raghallaigh The Major Security Issues In E Commerce
 
E business security
E business securityE business security
E business security
 
Security issues in e business
Security issues in e businessSecurity issues in e business
Security issues in e business
 
E commerce security
E commerce securityE commerce security
E commerce security
 
E commerce Security
E commerce Security E commerce Security
E commerce Security
 
Online security and payment system
Online security and payment systemOnline security and payment system
Online security and payment system
 

Viewers also liked

E Commerce Presentation
E  Commerce  PresentationE  Commerce  Presentation
E Commerce Presentation
Tylerjd
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commerce
m8817
 
Work men & road safety
Work men & road safetyWork men & road safety
Work men & road safety
Nitin Verma
 
streach film
streach filmstreach film
streach film
Nitin Verma
 
Identifying Software Project Risks: An International Delphi Study
Identifying Software Project Risks: An International Delphi StudyIdentifying Software Project Risks: An International Delphi Study
Identifying Software Project Risks: An International Delphi Study
Yung-Chun Chang
 
Chap 6 e-commerce marketing concepts
Chap 6   e-commerce marketing conceptsChap 6   e-commerce marketing concepts
Chap 6 e-commerce marketing conceptsNorisuwanah Jaffar
 
M1
M1M1
M1
har139
 
Lecture 6 e-cmmerce , e commerce infrastructure,the internet -chapter 3
Lecture 6  e-cmmerce ,  e commerce infrastructure,the internet -chapter 3Lecture 6  e-cmmerce ,  e commerce infrastructure,the internet -chapter 3
Lecture 6 e-cmmerce , e commerce infrastructure,the internet -chapter 3
Habib Ullah Qamar
 
Introduction to E-Commerce - Creating your own website in 6 easy steps!
Introduction to E-Commerce - Creating your own website in 6 easy steps!Introduction to E-Commerce - Creating your own website in 6 easy steps!
Introduction to E-Commerce - Creating your own website in 6 easy steps!
Ramon Manuel Nisperos, MBA, CEP
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
Nada G.Youssef
 
Tools and techniques for data science
Tools and techniques for data scienceTools and techniques for data science
Tools and techniques for data science
Ajay Ohri
 
Unit 8 ecommerce p1
Unit 8   ecommerce p1Unit 8   ecommerce p1
Unit 8 ecommerce p1
IronCheese
 
1st task unit 8 e commerce p2
1st task unit 8 e commerce p21st task unit 8 e commerce p2
1st task unit 8 e commerce p2
IronCheese
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
Nada G.Youssef
 
Statistics for data scientists
Statistics for  data scientistsStatistics for  data scientists
Statistics for data scientists
Ajay Ohri
 
Open Source Tools & Data Science Competitions
Open Source Tools & Data Science Competitions Open Source Tools & Data Science Competitions
Open Source Tools & Data Science Competitions
odsc
 
Chapter 4 5-6 - e commerce - m- commerce
Chapter 4 5-6 - e commerce - m- commerceChapter 4 5-6 - e commerce - m- commerce
Chapter 4 5-6 - e commerce - m- commerce
suman86
 
Business analyst ppt
Business analyst pptBusiness analyst ppt
Business analyst ppt
Yaswanth Babu Gummadivelli
 
Entrepreneurship development programme notes
Entrepreneurship development programme notes Entrepreneurship development programme notes
Entrepreneurship development programme notes
Sonam kapil
 
E-Commerce PPT
E-Commerce PPTE-Commerce PPT
E-Commerce PPT
OTHERS
 

Viewers also liked (20)

E Commerce Presentation
E  Commerce  PresentationE  Commerce  Presentation
E Commerce Presentation
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commerce
 
Work men & road safety
Work men & road safetyWork men & road safety
Work men & road safety
 
streach film
streach filmstreach film
streach film
 
Identifying Software Project Risks: An International Delphi Study
Identifying Software Project Risks: An International Delphi StudyIdentifying Software Project Risks: An International Delphi Study
Identifying Software Project Risks: An International Delphi Study
 
Chap 6 e-commerce marketing concepts
Chap 6   e-commerce marketing conceptsChap 6   e-commerce marketing concepts
Chap 6 e-commerce marketing concepts
 
M1
M1M1
M1
 
Lecture 6 e-cmmerce , e commerce infrastructure,the internet -chapter 3
Lecture 6  e-cmmerce ,  e commerce infrastructure,the internet -chapter 3Lecture 6  e-cmmerce ,  e commerce infrastructure,the internet -chapter 3
Lecture 6 e-cmmerce , e commerce infrastructure,the internet -chapter 3
 
Introduction to E-Commerce - Creating your own website in 6 easy steps!
Introduction to E-Commerce - Creating your own website in 6 easy steps!Introduction to E-Commerce - Creating your own website in 6 easy steps!
Introduction to E-Commerce - Creating your own website in 6 easy steps!
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Tools and techniques for data science
Tools and techniques for data scienceTools and techniques for data science
Tools and techniques for data science
 
Unit 8 ecommerce p1
Unit 8   ecommerce p1Unit 8   ecommerce p1
Unit 8 ecommerce p1
 
1st task unit 8 e commerce p2
1st task unit 8 e commerce p21st task unit 8 e commerce p2
1st task unit 8 e commerce p2
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Statistics for data scientists
Statistics for  data scientistsStatistics for  data scientists
Statistics for data scientists
 
Open Source Tools & Data Science Competitions
Open Source Tools & Data Science Competitions Open Source Tools & Data Science Competitions
Open Source Tools & Data Science Competitions
 
Chapter 4 5-6 - e commerce - m- commerce
Chapter 4 5-6 - e commerce - m- commerceChapter 4 5-6 - e commerce - m- commerce
Chapter 4 5-6 - e commerce - m- commerce
 
Business analyst ppt
Business analyst pptBusiness analyst ppt
Business analyst ppt
 
Entrepreneurship development programme notes
Entrepreneurship development programme notes Entrepreneurship development programme notes
Entrepreneurship development programme notes
 
E-Commerce PPT
E-Commerce PPTE-Commerce PPT
E-Commerce PPT
 

Similar to e-Commerce: Chapter 6

Cyber liaility insurance the basics
Cyber liaility insurance   the basicsCyber liaility insurance   the basics
Cyber liaility insurance the basics
Chandrasekar Koushik ACII®
 
The Basics of Cyber Insurance
The Basics of Cyber InsuranceThe Basics of Cyber Insurance
The Basics of Cyber Insurance
HB Litigation Conferences
 
Information and Cyber Warfare
Information and Cyber WarfareInformation and Cyber Warfare
Information and Cyber Warfare
Swapnil Jagtap
 
Why Do We Need To Secure Web Applications.pdf
Why Do We Need To Secure Web Applications.pdfWhy Do We Need To Secure Web Applications.pdf
Why Do We Need To Secure Web Applications.pdf
Bytecode Security
 
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
AwodiranOlumide
 
Banks and cybersecurity v2
Banks and cybersecurity v2Banks and cybersecurity v2
Banks and cybersecurity v2
Semir Ibrahimovic
 
Banks and cybersecurity v2
Banks and cybersecurity v2Banks and cybersecurity v2
Banks and cybersecurity v2
Semir Ibrahimovic
 
Module 8 - External Crisis – Changing Technology.pptx
Module 8 - External Crisis – Changing Technology.pptxModule 8 - External Crisis – Changing Technology.pptx
Module 8 - External Crisis – Changing Technology.pptx
caniceconsulting
 
Protecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksProtecting Your Business From Cyber Risks
Protecting Your Business From Cyber Risks
This account is closed
 
Privacy Issues in Networked Economy
Privacy Issues in Networked EconomyPrivacy Issues in Networked Economy
Privacy Issues in Networked Economy
Sonia Kaul Takoo
 
Cyber security best practices power point presentation
Cyber security best practices power point presentationCyber security best practices power point presentation
Cyber security best practices power point presentation
AbcdEfg576575
 
Cyber 101 for smb execs v1
Cyber 101 for smb execs v1Cyber 101 for smb execs v1
Cyber 101 for smb execs v1
NetWatcher
 
The Devastating Consequences Of Cyber Crime: Six Tips To Protect Your Business
The Devastating Consequences Of Cyber Crime: Six Tips To Protect Your BusinessThe Devastating Consequences Of Cyber Crime: Six Tips To Protect Your Business
The Devastating Consequences Of Cyber Crime: Six Tips To Protect Your Business
York Risk
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
EY
 
ITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security Seminar
Daniel Versola
 
CyberSecurityPPT_V3_1CyberSecurityPPT_V3_1
CyberSecurityPPT_V3_1CyberSecurityPPT_V3_1CyberSecurityPPT_V3_1CyberSecurityPPT_V3_1
CyberSecurityPPT_V3_1CyberSecurityPPT_V3_1
NilKhunt
 
What Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" TheftWhat Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" Theft
CBIZ, Inc.
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
AkshayKhade21
 
Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information System
Satya P. Joshi
 
Anti-Fraud Datasheet
Anti-Fraud DatasheetAnti-Fraud Datasheet
Anti-Fraud Datasheet
Mani Rai
 

Similar to e-Commerce: Chapter 6 (20)

Cyber liaility insurance the basics
Cyber liaility insurance   the basicsCyber liaility insurance   the basics
Cyber liaility insurance the basics
 
The Basics of Cyber Insurance
The Basics of Cyber InsuranceThe Basics of Cyber Insurance
The Basics of Cyber Insurance
 
Information and Cyber Warfare
Information and Cyber WarfareInformation and Cyber Warfare
Information and Cyber Warfare
 
Why Do We Need To Secure Web Applications.pdf
Why Do We Need To Secure Web Applications.pdfWhy Do We Need To Secure Web Applications.pdf
Why Do We Need To Secure Web Applications.pdf
 
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
 
Banks and cybersecurity v2
Banks and cybersecurity v2Banks and cybersecurity v2
Banks and cybersecurity v2
 
Banks and cybersecurity v2
Banks and cybersecurity v2Banks and cybersecurity v2
Banks and cybersecurity v2
 
Module 8 - External Crisis – Changing Technology.pptx
Module 8 - External Crisis – Changing Technology.pptxModule 8 - External Crisis – Changing Technology.pptx
Module 8 - External Crisis – Changing Technology.pptx
 
Protecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksProtecting Your Business From Cyber Risks
Protecting Your Business From Cyber Risks
 
Privacy Issues in Networked Economy
Privacy Issues in Networked EconomyPrivacy Issues in Networked Economy
Privacy Issues in Networked Economy
 
Cyber security best practices power point presentation
Cyber security best practices power point presentationCyber security best practices power point presentation
Cyber security best practices power point presentation
 
Cyber 101 for smb execs v1
Cyber 101 for smb execs v1Cyber 101 for smb execs v1
Cyber 101 for smb execs v1
 
The Devastating Consequences Of Cyber Crime: Six Tips To Protect Your Business
The Devastating Consequences Of Cyber Crime: Six Tips To Protect Your BusinessThe Devastating Consequences Of Cyber Crime: Six Tips To Protect Your Business
The Devastating Consequences Of Cyber Crime: Six Tips To Protect Your Business
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
ITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security Seminar
 
CyberSecurityPPT_V3_1CyberSecurityPPT_V3_1
CyberSecurityPPT_V3_1CyberSecurityPPT_V3_1CyberSecurityPPT_V3_1CyberSecurityPPT_V3_1
CyberSecurityPPT_V3_1CyberSecurityPPT_V3_1
 
What Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" TheftWhat Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" Theft
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information System
 
Anti-Fraud Datasheet
Anti-Fraud DatasheetAnti-Fraud Datasheet
Anti-Fraud Datasheet
 

Recently uploaded

Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 

Recently uploaded (20)

Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 

e-Commerce: Chapter 6

  • 1. Chapter 6: RISK IN E-COMMERCE
  • 2.
  • 3. Risks Associated With Internet Transactions  Risk as the “possibility of loss or injury” or someone or something that creates or suggests a hazards."  Losses or injuries in a digital society may occur in many different ways: • Data stolen, corrupted, misused, altered, or falsely generated. • Attacks on hardware may occur the system unable to operate properly.
  • 4.
  • 5. INFORMATION RISK • Information risks stem from information published and contained in web sites and associated with the conduct of e- commerce. Peripheral to information risks are risks associated with misuse of information, such as violation of laws in the United States and other countries.
  • 6. TECHNOLOGY RISK • Technology risks include risks involving hardware, software, telecommunications and databases. These risks include the consequences resulting from the misuse of technology or the use of inappropriate technologies required to address business needs.
  • 7. BUSINESS RISK • Business risks concern customer and supplier relationships, and risks associated with products and services marketed and distributed over the Internet. They also include risks associated with managerial aspects of the business including personnel and contractual relations.
  • 8. Risks faced by customers when they transact online: False or Malicious Websites : Malicious websites are typically set up for the purpose of stealing visitors' IDs and passwords, stealing credit card information, spying on a visitor's hard drive, and uploading files from the visitor's hard drive. Privacy and the Use of Cookies (Browser Safety) • The issue of privacy on the Internet is of concern to many people. • Cookies from web browser is use to stored small piece information in client side. • Were designed to allow Web servers to operate more efficiently, provide a better response time to repeat visitors to their sites, and more accurately track how many different users visit a site.
  • 10.
  • 11. FRAUD • Access to data and programs by insiders have always been a primary concern to auditors. The internal control devices were easier to implement and monitor in centralized.
  • 12. INFORMATION THEFT • Data files that are stored digitally and connected to public telecommunications lines can potentially be accessed by an unauthorized user without the perpetrator ever having to leave the comfort of home
  • 13. CUSTOMER DISPUTES AND CHARGE BACKS • Stripe receives a notification of the disputed charge. We automatically send you an email with details. Additionally, we send a charge.dispute.created event to any webhook URLs you have. • As you know, customers or cardholders obtain credit cards from banks, which are referred to as the "issuing bank." A chargeback (also known as a reversal) is a form of customer protection provided by the issuing banks, which allows cardholders to file a complaint regarding fraudulent transactions on their statement. Once the cardholder files a dispute, the issuing bank makes an investigation into the complaint.
  • 14. SABOTAGE OR DEFACEMENT • This is when a website is attacked and the visual appearance and/or website functions are changed.
  • 15. Denial of Service Attacks • A denial of service attack is used by an individual to destroy, shut down, or degrade a computer or network resource. • Other denial of service scenarios include the deletion of the startup files on a computer, rendering it unbootable, or deleting Web pages from a Web server.
  • 16.
  • 17. BUSINESS RECOVERY PLANS All firms should have a disaster recovery plan, which is a contingency plan for resuming operations for those 'situations in which operations are interrupted for any reason, including when an unforeseen man-made or natural disaster occurs. Natural disasters include incidents such as fires, smoke, floods, tornadoes, earthquakes, and high wind and electrical storms. Man-made disasters include incidents such as viruses. hardware failure, sabotage, and error.
  • 18. Examples of natural disasters