Ecommerce Essentials Azimuth Interactive
HomeChaptersTable of ContentsChapter 1Chapter 2Chapter 3Chapter 4Chapter 5Chapter 6Chapter 7Chapter 8Chapter 9Chapter 10Chapter 11Chapter 12Resources
Table of Contents
Chapter 1: The Revolution Is Just Beginning
Chapter 2: E-commerce Business Models and Concepts
Chapter 3: E-commerce Infrastructure: The Internet, Web, and Mobile Platform
Chapter 4: Building an E-commerce Presence: Websites, Mobile Sites, and Apps
Chapter 5: Online Security and Payment Systems
Chapter 6: E-commerce Marketing and Advertising Concepts
Chapter 7: Social, Mobile, and Local Marketing
Chapter 8: Ethical, Social, and Political Issues in E-commerce
Chapter 9: Online Retail and Services
Chapter 10: Online Content and Media
Chapter 11: Social Networks, Auctions, and Portals
Chapter 12: B2B E-commerce: Supply Chain Management and Collaborative Commerce

Chapter 5

E-commerce Security and Payment Systems

Projects and Exercises

Project 1: Is This Safe?

Visit Amazon, eBay, and Twitter and find and read the pages on each site that discuss security. Then, prepare a 2–3 page report in which you discuss the security features and policies of these websites. How difficult were the pages to find? How do they attempt to keep your personal information from being stolen? What aspects of the policies do or do not give you confidence as a consumer? What makes you wary of giving personal information such as a credit card number to an online store or service?

Project 2: Dangerous Software

The section on poorly designed server and client software on pages 282-283 of the text highlights the impact that such software has on security. The National Vulnerability Database compiles comprehensive data on software vulnerabilities it identifies. Use the Vulnerability Search Engine to search for software flaws from five vendors (such as Microsoft, Apple, Google, or another firm) during the last three months, Using this data, create a column chart using Excel or another program to illustrate the trends in software vulnerabilities identified during that time. What conclusions can you draw from this data?

Project 3: E-commerce Payment Systems

Choose a retail category (such as apparel, software, books, etc.) and visit at least five companies in that category. Prepare a table summarizing the different payment methods offered by the companies you visited.

Project 4: Using Credit Cards Online

Ellen Longbow is the chief financial officer (CFO) at a startup e-commerce firm that sells products popular with college students. She has asked you to do some Internet research on three competing companies that permit credit-card purchases at their e-commerce sites. Create a table (or spreadsheet) that summarizes how each site handles the following issues: (a) What information does each site require before permitting you to use a credit card? (b) What steps must you go through to complete a transaction? (c) What features do they incorporate to facilitate overcoming the limits of security, merchant risk, cost, etc.? (d) How do they authenticate cardholder identities?