Preview

Personal Identifiable Information on the Internet and Online Shopping (E-Commerce)

Powerful Essays
Open Document
Open Document
1334 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Personal Identifiable Information on the Internet and Online Shopping (E-Commerce)
Online shopping is one of the biggest conveniences about using the internet. The idea of e-commerce came around in the early 1970s and in 1981 the first online marketplace was born. E-commerce is still a constantly evolving idea and technology. It’s a great idea for businesses wishing to expand to more people around the globe. The majority people that participate in online shopping have a good experience overall and positive view of the idea according to research (Saleh, 2013). However, there are still some that are concerned with buying merchandise on the web, especially the older generation that was born before the advent of the internet.
The biggest problem that plagues online marketplaces is the risk of identity theft. Identity theft is still a major concern for financial institutions and online businesses. It’s still such a big problem that even the US Attorney General, Eric Holder, urged congress to establish a set of guidelines for companies in the event that a customer’s personal identifiable information be stolen (Douglas, 2014), which came after the result of Targets servers being breached by hackers and having over 40 million customer records (including addresses, phone numbers, and even credit/debit card information) (Osborne, 2014). Currently there are only state guidelines as to how companies deal with data breaches, but the federal government is working on changing that.
There’s no doubt that as the internet continues to grow and more people gain access to the internet there will also be an increase in cybercrime. This includes phishing, where cyber criminals pose as legitimate businesses and companies online in order to steal information from consumers. The majority of phishers try to lure people into clicking a URL that looks similar to one they’ve been using to access the original website and sometimes even making the webpage look similar to the actual page, but in reality the page is fraudulent and instead the user would be sending their



Bibliography: Bose, I., & Leung, A. C. (2007). UNVEILING THE MASK OF PHISHING: THREATS, PREVENTIVE MEASURES, AND RESPONSIBILITIES. . Communications of the Association for Information Systems, 19, 544-566. Chacos, B. (2013, September 6). Here 's how to best secure your data now that the NSA can crack almost any encryption. Retrieved February 27, 2014, from PCWorld: http://www.pcworld.com/article/2048248/heres-how-to-best-secure-your-data-now-that-the-nsa-can-crack-almost-any-encryption.html Douglas, D. (2014, February 24). Here’s why the government wants a national data breach law. Retrieved February 27, 2014, from The Washington Post: http://www.washingtonpost.com/blogs/wonkblog/wp/2014/02/24/heres-why-the-government-wants-a-national-data-breach-law/ Hille, P., Walsh, G., & Brach, S. (2011). UNDERSTANDING ONLINE AND OFFLINE CONSUMER BEHAVIOR: CONCEPTUALIZING FEAR OF ONLINE IDENTITY THEFT: A QUALITATIVE STUDY AND MODEL DEVELOPMENT. AMA Summer Educators ' Conference Proceedings, 22, 214-215. Krebs, B. (2006, February 13). The New Face of Phishing. Retrieved February 27, 2014, from The Washington Post: http://voices.washingtonpost.com/securityfix/2006/02/the_new_face_of_phishing_1.html Lin, R. (2001, April 30). E-Commerce: An Introduction. Retrieved February 27, 2014, from Berkman Center for Internet & Society Harvard Law School, Open Education: http://cyber.law.harvard.edu/olds/ecommerce/ Osborne, C. (2014, February 13). How hackers stole millions of credit card records from Target. Retrieved February 27, 2014, from ZDnet: http://www.zdnet.com/how-hackers-stole-millions-of-credit-card-records-from-target-7000026299/ Saleh, Z. (2013). The Impact of Identity Theft on Perceived Security and Trusting E-Commerce. . Journal of Internet Banking & Commerce, 11. Wang, P. A. (2011, Dec). Online Phishing in the Eyes of Online Shoppers. IAENG International Journal of Computer Science, 38(4), 378-383.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    mis 535

    • 2196 Words
    • 8 Pages

    Major corporations, governments, and other organizations are hacked each week, mostly by means of phishing attacks. Describe how users and IT organizations should arm themselves against these attacks.…

    • 2196 Words
    • 8 Pages
    Satisfactory Essays
  • Powerful Essays

    Swot Analysis Of Jcpenney

    • 4916 Words
    • 20 Pages

    People pose as sellers of a particular product, lure the customer into buying it, and then ask for their credit card number and other personal information like their home phone number, their social security number, address and so on. Later on, they use this information to their benefit by purchasing items for their own use. The person whose identity has been just stolen is then held responsible for the payment. This way, the thieves get what they want and escape from paying even a penny. This has become a big threat to all businesses operating over the net. Companies need to keep checking and updating their online theft-blocking, spam blocking software and assure customers about the same time and time again in order for people to visit their website and make…

    • 4916 Words
    • 20 Pages
    Powerful Essays
  • Good Essays

    Each e-commerce have to keep their online data safe such as customers personal details, their bank details and many more and in order to make sure that their data stays safe and secured, they have to be aware of all the frauds that is taking place now days because e-commerce have to deal with payments such as online banking, electronic transactions, using debit cards, credit cards and many other ways and because of these e-commerce’s have more compliance issues as they are at more risk from being targeted than other websites. Data’s can be stolen in many ways such as by hacking and by adding viruses into systems and many other ways.…

    • 646 Words
    • 3 Pages
    Good Essays
  • Good Essays

    McGregor, J. P. How the TJX Breach May Change Security Awareness. (2007, April 11). Retrieved October 9, 2007, from https://www.scmagazineus.com…

    • 302 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Ethics

    • 916 Words
    • 4 Pages

    Phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication. Phishing is typically carried out by email or instant messaging, and often directs users to enter details at a website, although phone contact has also been used. Phishing is an example of social engineering techniques used to fool users.…

    • 916 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Online shopping – this could lead to the loss of private information like card numbers and passwords and leading to identity fraud.…

    • 347 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    When it comes to online marketing there are many risks an individual can face when it comes to purchasing online. As this generation is all about technology most things that are set up online require personal information for example New Look requires its customer to set up an online account to purchase items. This may make the customers wary, as they wouldn’t like to become a victim of fraud due to payment security being an issue.…

    • 341 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The act of phishing has been around since the mid-1990s, but it was not legally defined as a crime until the early 2000s when it became more widespread (Rekouche 2011). To help understand the implications of phishing, this essay will critically view a significant case study that happened in 2009, Operation Phish Phry’. Understanding the actions taken by the various actors involved in this case could provide an insight regarding the countermeasures proposed by relevant authorities about phishing. Additionally, I would argue that the proposed countermeasures are insufficient and that there is still room for improvements which I will cover in this essay.…

    • 1498 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Identity Theft

    • 2479 Words
    • 8 Pages

    Thesis: One day you receive a call from your bank, stating you had just made a purchase for a random estimate of 5,000 dollars. But you did not go on a shopping spree. Your identity just has stolen. How secure is your identity? Do you ever wonder about your identity? Ways to prevent/protect yourself from identity theft and frauds.…

    • 2479 Words
    • 8 Pages
    Satisfactory Essays
  • Good Essays

    Causes Of Identity Theft

    • 1108 Words
    • 5 Pages

    People often trust the internet too much when it comes to buying things or sending out their personal information. One does not take into account that there are hackers waiting to scam you for all your money and information. IN an article titled, “Information Security Breaches and the Threat to Consumers” written by Fred H. Cate, he states, “Consumers often end up unwittingly providing thieves with access to sensitive data by failing to secure their own data, by responding to fraud schemes, such as phishing and pharming, and by careless use of their personal information” (Cate 4). In other words, people tend to trust that what they put on the internet, however there are people who are trying to scam you for your money. People should be more aware and less careless about what they are sending through the internet and to who they are sending it to. While we continue to be careless with our information, we continue to see many crimes involving identity theft. Cate writes, “The vulnerability of unsecured personal data and the threat of identity-based frauds nevertheless continue to grow and evolve as perpetrators become more sophisticated in how they seek to obtain and exploit personal information” (Cate 2). It makes it easy for hackers to catch and use one’s personal information when the individual continues to be careless with their information…

    • 1108 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Coates, Nicholas "The privacy crackdown." News Media & the Law (2007) Academic Search Premier. EBSCO. Web. 21 Sept. 2013.…

    • 626 Words
    • 3 Pages
    Satisfactory Essays
  • Best Essays

    References: Agarwal, R. and Karahanna, E. (2000). Time Flies When You 're Having Fun: Cognitive Absorption and Beliefs About Information Technology Usage. Management Information Systems Quarterly, 24, 665-692. Amber Stabek, S. B., and Watters, P. A. (2009). the Case for a Consistant Cyberscam Classification Framework. Internet Commerce Security Laboratory. ARIN (2009). ARIN: WHOIS Database Search Retrieved 20th Oct 2009 from ws.arin.net/ Arnold, B. (2008). The 419 scam: basis, statistics, regulation. Caslon Analytics [Online]. Available: http://www.caslon.com.au/419scamnote.htm#statistics. Bishop, J. (2008). Understanding and facilitating the development of social networks in online dating communities: A case study and model. Social Networking communities and eDating Services. Bolton, R. J. (2002). Unsupervised Profiling Methods for Fraud Detection. Statistical Science, 17, 235-255. Bonchi, E. F., Malin, B., and Jiang, W. (2008). PinKDD '08: Privacy, Security, and Trust in KDD: Post-Workshop Report. SIGKDD Explorations 2008, 10, 66-67. Dixon, R. (2005). I will eat your Dollars. Los Angeles Times [Online]. Available: http://web.archive.org/web/20051029165224/http://news.yahoo.com/s/latimests/20051020/ts_latim es/iwilleatyourdollars. Ellison, N., and Gibbs, J. (2006). Managing Impressions Online: Self Presentation in the Online Dating Environment. Journal of Computer Mediated Communication, 11. FDIC. (2009). Fraud Alert. Teller Vision. April. Feliciano, C., Robnett, B., and Komaie, G. (2009). Gendered racial exclusion among white Internet daters. Social Science Research, 38, 41-56. Ferreyra-Orozo, G. (2008). A Culture of Corruption: Everyday Deception and Popular Discontent in Nigeria. American Anthropologist, 110, 145-146. Gill, J. O. (2003). Perception of email personality at zero-acquaintance: Extroversion takes care of itself; Neuroticism is a worry. Proceedings of the 25th annual conference of the cognitive science society.…

    • 5113 Words
    • 21 Pages
    Best Essays
  • Powerful Essays

    Phishing Attack

    • 4826 Words
    • 20 Pages

    In the field of computer security, Phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication. Phishing is a fraudulent e-mail that attempts to get you to divulge personal data that can then be used for illegitimate purposes.…

    • 4826 Words
    • 20 Pages
    Powerful Essays
  • Good Essays

    HDFC case

    • 925 Words
    • 4 Pages

    Beginning in late 2006, it was reported that a large number of Indian bank customers of had received emails, which were falsely misrepresented to have been originated from their bank. In August 2007, HDFC was the fourth Indian bank to encounter this online fraud, known as 'phishing.” The recipients of the emails were told to update their bank account information on some pretext. These emails included a hyperlink within the email itself and a click to that link took recipients to a web page, which was a fake look alike to the bank’s web page. The key issue was some of the unsuspecting recipients responded to these mails and gave their login information and passwords. Later on, through net banking and by using the information collected, a large number of illegal/falsified transactions took place.…

    • 925 Words
    • 4 Pages
    Good Essays
  • Good Essays

    This assignment attempts to show the importance of awareness of the security knowledge that will make us more aware about threats like escrow services fraud, spams and spoofing. There’s statistics demonstrates the recent trends of these types of threats that people usually face in the Internet. The impacts mostly negative and sometimes there are big losses. The research studies the potential of cyberattacks to increase loss, scams and spoofing, both locally and worldwide.…

    • 933 Words
    • 3 Pages
    Good Essays