THI TMĐT
THI TMĐT
Learning Objectives
5.1 Understand the scope of e-commerce crime and security problems, the key dimensions
of e-commerce security, and the tension between security and other values.
5.2 Identify the key security threats in the e-commerce environment.
5.3 Describe how technology helps secure Internet communications channels and protect
networks, servers, and clients.
5.4 Appreciate the importance of policies, procedures, and laws in creating security.
5.5 Identify the major e-commerce payment systems in use today.
5.6 Describe the features and functionality of electronic billing presentment and payment
systems.
Integrity Has information I transmitted or received Has data on the site been altered without
been altered? authorization? Is data being received from customers
valid?
Nonrepudiation Can a party to an action with me later deny Can a customer deny ordering products?
taking the action?
Authenticity Who am I dealing with? How can I be What is the real identity of the customer?
assured that the person or entity is who they
claim to be?
Confidentiality Can someone other than the intended Are messages or confidential data accessible to anyone
recipient read my messages? other than those authorized to view them?
Privacy Can I control the use of information about What use, if any, can be made of personal data
myself transmitted to an collected as part of an e-commerce transaction? Is the
e-commerce merchant? personal information of customers being used in an
unauthorized manner?
Malicious Code
• Exploits and exploit kits
• Mal Advertising
• Drive-by downloads
• Viruses
• Worms
• Ransomware
• Trojan horses
• Backdoors
• Bots, botnets
Potentially Unwanted Programs
• Browser parasites
• Monitor and change user’s browser
• Adware
• Used to call pop-up ads
• Spyware
• Tracks users keystrokes, e-mails, IMs, etc.
Phishing
• Any deceptive, online attempt by a third party to obtain confidential information for financial gain
• Tactics
• Social engineering
• E-mail scams and Business Email Compromise (BEC) phishing
• Spear phishing
• Used for identity fraud and theft
Identity Fraud/Theft
• Unauthorized use of another person’s personal data for illegal financial benefit
• Social security number
• Driver’s license
• Credit card numbers
• Usernames/passwords
• 2017: Almost 17 million U.S. consumers suffered identity fraud
Insider Attacks
• Largest threat to business institutions come from insider embezzlement
• Employee access to privileged information
• Poor security procedures
• Insiders more likely to be source of cyberattacks than outsiders
Technology Solutions
• Protecting Internet communications
• Encryption
• Securing channels of communication
• SSL, TLS, VPNs, Wi-Fi
• Protecting networks
• Firewalls, proxy servers, IDS, IPS
• Protecting servers and clients
• OS security, anti-virus software
Digital Envelopes
• Address weaknesses of:
• Public key cryptography
• Computationally slow, decreased transmission speed, increased processing time
• Symmetric key cryptography
• Insecure transmission lines
• Uses symmetric key cryptography to encrypt document
• Uses public key cryptography to encrypt and send symmetric key
Limitations of PKI
• Doesn’t protect storage of private key
• PKI not effective against insiders, employees
• Protection of private keys by individuals may be haphazard
• No guarantee that verifying computer of merchant is secure
• CAs are unregulated, self-selecting organizations
Blockchain
• Blockchain
• Enables organizations to create and verify transactions nearly instantaneously using a
distributed P2P database (distributed ledger)
• Benefits:
• Reduces costs of verifying users, validating transactions, and risks of storing and processing
transaction information
• Transactions cannot be altered retroactively and therefore are more secure
• Foundation technology for cryptocurrencies and supply chain management, as well as potential
applications in financial services and healthcare industries
Cryptocurrencies
• Use blockchain technology and cryptography to create a purely digital medium of exchange
• Bitcoin the most prominent example
• Value of Bitcoins have widely fluctuated
• Major issues with theft and fraud
• Some governments have banned Bitcoin, although it is gaining acceptance in the U.S.
• Other cryptocurrencies (altcoins) include Ethereum/Ether, Ripple, Litecoin and Monero
• Initial coin offerings (I C Os) being used by some startups to raise capital
Careers in E-commerce
• Position: Cybersecurity Threat Management Team Trainee
• Qualification/Skills
• Preparing for the Interview
• Possible Interview Questions needs of other instructors who rely on these materials.
Chapter 6
E-commerce Marketing & Advertising
Learning Objectives
6.1 Understand the key features of the Internet audience, the basic concepts of consumer
behavior and purchasing, and how consumers behave online.
6.2 Identify and describe the basic digital commerce marketing and advertising strategies
and tools.
6.3 Identify and describe the main technologies that support online marketing.
6.4 Understand the costs and benefits of online marketing communications.
Display Ad Marketing (1 of 2)
• Banner ads
• Rich media ads
• Interstitial ads
• Video ads
• Far more effective than
other display formats
• Sponsorships
• Native advertising
Display Ad Marketing (2 of 2)
• Content marketing
• Advertising networks
• Ad exchanges, programmatic advertising, and real-time bidding (RTB)
• Display advertising issues
• Ad fraud
• Viewability
• Ad blocking
E-mail Marketing
• Direct e-mail marketing
• Messages sent directly to interested users
• Benefits include
• Inexpensive
• Average around 3% to 4% click-throughs
• Measuring and tracking responses
• Personalization and targeting
• Three main challenges
• Spam
• Anti-spam software
• Poorly targeted purchased e-mail lists
Spam
• Unsolicited commercial e-mail
• Around 55% of all e-mail in 2017
• Most originates from bot networks
• Efforts to control spam have largely failed:
• Government regulation (CAN - SPAM)
• State laws
• Voluntary self-regulation by industries (DMA)
• Canada’s stringent anti-spam laws
Multi-Channel Marketing
• Integration of online and offline marketing
• Increasing percentage of American media consumers use several media at
once
• Reinforce branding messages across media
• Most effective multi-channel campaigns use consistent imagery across
media
Insight on Business: Are the Very Rich Different from You and Me?
• Class Discussion
• What distinguishes luxury marketing from ordinary retail marketing?
• What challenges do luxury retailers have in translating their brands and the look and feel of luxury
shops into Web sites?
• How has social media affected luxury marketing?
• Visit the Net-a-Porter website. What do you find there?
Pricing Strategies (1 of 2)
• Pricing: integral part of marketing strategy
• Traditional pricing based on fixed costs, variable costs, demand curve
• Marginal costs
• Marginal revenue
• Piggyback strategy
• Price discrimination
Pricing Strategies (2 of 2)
• Free and freemium
• Versioning
• Bundling
• Dynamic pricing
• Auctions
• Yield management
• Surge pricing
• Flash marketing
Insight on Technology: The Long Tail: Big Hits and Big Misses
• Class Discussion
• What are recommender systems? Give an example of one you have used.
• What is the Long Tail and how do recommender systems support sales of items in the Long Tail?
• How can human editors, including consumers, make recommender systems more helpful?
Databases
• Enable profiling
• Store records and attributes
• Database management system (DBMS):
• SQL (Structured Query Language):
• Industry-standard database query and manipulation language used in a relational database
• Relational databases
Marketing Analytics
• Software that analyzes data at each stage of the customer conversion process
• Awareness
• Engagement
• Interaction
• Purchase activity
• Loyalty and post-purchase
• Helps managers
• Optimize ROI on website and marketing efforts
• Build detailed customer profiles
• Measure impact of marketing campaigns
Careers in E-commerce
• Position: Digital Marketing Assistant
• Qualification/Skills
• Preparing for the Interview
• Possible Interview Questions
Chapter 7
Social, Mobile and Local Marketing
Learning Objectives
7.1 Understand the difference between traditional online marketing and the new social-mobile-local
marketing platforms and the relationships between social, mobile, and local marketing.
7.2 Understand the social marketing process from fan acquisition to sales and the marketing
capabilities of social marketing platforms such as Facebook, Instagram, TikTok, Twitter, and
Pinterest.
7.3 Identify the key elements of a mobile marketing campaign.
7.4 Understand the capabilities of location-based local marketing.
Social Marketing
• Traditional online marketing goals
– Deliver business message to the most consumers
• Social marketing goals
– Encourage consumers to become fans and engage and enter conversations
– Strengthen brand by increasing share of online conversation
Instagram Marketing
• Visual social network focused on photos and videos
• Owned by Meta, Facebook’s parent
• Basic Instagram features
– Profile
– Feed
– Stories and Reels
– Instagram Live and Instagram Video
– Tagging and Hashtags
– Filters
– Instagram Direct
TikTok Marketing
• One of newer social networks; short videos
• Owned by Chinese company Bytedance
• Basic TikTok features
– Profile
– For You Page based on algorithm
– Tagging and Hashtags
– Filters and effects
– Stitch and Duet
Twitter Marketing
• Social network originally based on 140-character text messages
• Now allows users to send and receive 280-character messages, news articles, photos, videos
• Basic features
– Tweets, retweets, mentions, replies
– Followers
– Direct messages (DMs)
– Hashtags
– Moments tab
– Timeline
Twitter Marketing Tools
• Promoted Ads
– Variety of formats: Text Ads, Carousel Ads, Moment Ads, Video Ads
• Follower Ads
• Twitter Takeover
• Branded Notification
• Twitter Amplify
• Twitter Cards
• Twitter Live
Pinterest Marketing
• Online board to which users can “pin” photos
• Enables users to talk about brands using pictures rather than words
• Features include:
– Pins and re-pins to Boards
– Home Feed
– Hashtags and keywords
– Share
– Search
– Pinterest Lens
– Widgets and buttons
Mobile Marketing
• About 280 million Americans use a mobile device for Internet access
– Devices used multiple times per day
• In 2022, m-commerce accounts for about 40% of all retail and travel e-commerce revenues.
• Challenges
– Motivating consumers to click on mobile ads
– Pricing for mobile ads
Insight on Business: Mobile Marketing Revs Up With 3D, AR, VR and the Metaverse
• Class Discussion
– Why do mobile devices represent such a promising opportunity for marketers?
– What are the benefits and the appeal of 3D, AR, and the metaverse for mobile advertising?
– Have you ever engaged with 3D, AR, or metaverse-based mobile ads?
– What types of products are best suited for 3D, AR, or metaverse-based ads?
Figure 7.10 Measuring the Effectiveness of a Mobile and Social Marketing Branding Campaign
Careers in E-commerce
• Position: Social Media Marketing Associate
• Qualification/Skills
• Preparing for the Interview
• Possible Interview Questions
Chapter 8
Ethical, Social, and Political Issues in E-commerce
Learning Objectives
8.1 Understand why e-commerce raises ethical, social, and political
issues.
8.2 Understand basic concepts related to privacy and information rights,
the practices of e-commerce companies that threaten privacy, and the
different methods that can be used to protect online privacy.
8.3 Understand the various forms of intellectual property and the
challenges involved in protecting it.
8.4 Understand how the Internet is governed and why taxation of e-
commerce raises governance and jurisdiction issues.
8.5 Identify major public safety and welfare issues raised by e-
commerce.
Principle Description
Notice/Awareness (core Sites must disclose their information practices before collecting
principle) data. Includes identification of collector, uses of data, other
recipients of data, nature of collection (active/inactive), voluntary
or required, consequences of refusal, and steps taken to protect
confidentiality, integrity, and quality of the data.
Access/Participation Consumers should be able to review and contest the accuracy and
completeness of data collected about them in a timely,
inexpensive process.
Privacy Policies
• Website Terms of Use Notices
• Recent study showed these polices would take average reader 8 hours to read policies
• Have conflicting statements
• Little oversight and comparison between policies of different companies
Industry Self-Regulation
• Privacy seal programs
• Network Advertising Initiative (NAI)
• Ad Choices Program
• In general, self-regulation has not succeeded in reducing American fears of privacy invasion or
reducing the level of privacy invasion
Technology Solutions
• Solutions include
• Intelligent Tracking Protection (ITP)
• Differential privacy software
• Privacy default browsers
• Message encryption
• Spyware blockers
• Pop-up blockers and ad blockers
• Secure e-mail, anonymous remailers
• Cookie managers
• Public key encryption
Privacy Protection
• Privacy protection as a business
• Personal Data Economy (PDE)
• Internet of Me
• Life Management tools
• Privacy advocacy groups
Copyright
● Protects original forms of expression (not ideas) from being copied by others for a period of
time Fair use doctrine
● Digital Millennium Copyright Act of 1998
● First major effort to adjust copyright laws to Internet age
+ Implements W I P O treaty that makes it illegal to make, distribute, or use devices
that circumvent technology-based protections of copyrighted materials
+ Safe-harbor provisions
Patents
● Grant owner 20-year monopoly on ideas behind an invention
● Invention must be new, non-obvious, novel
● Encourages inventors
● Promotes dissemination of new techniques through licensing
● Stifles competition by raising barriers to entry
E-commerce Patents
• 1998 State Street Bank & Trust v. Signature Financial Group
• Business method patents
• 2014 Alice Corporation lawsuit
• Supreme Court rules that software does not make a basic business method or abstract idea
patentable
• E-commerce patents
• Amazon: One-click purchasing
• Akamai: Internet content delivery global hosting system
Trademarks
• Identify, distinguish goods, and indicate their source
• Purpose
• Ensure consumer gets what is paid for/expected to receive
• Protect owner against piracy and misappropriation
• Infringement
• Dilution
• Federal Trademark Dilution Act and Trademark Dilution Revision Act
• Uniform Rapid Suspension System (URS)
Taxation
• Non-local nature of Internet commerce complicates governance and jurisdiction issues
• Sales taxes
• Governments in Europe and U.S. rely on sales taxes
• As e-commerce grew, states began to argue their inability to tax remote e-commerce sales was
siphoning away billions of tax dollars
• Supreme Court ruled in South Dakota v Wayfair that states could tax online sales even when seller
did not have physical location in the state
• Internet Tax Freedom Act
Net Neutrality
• All Internet activities charged the same rate, regardless of bandwidth used
• Netflix and YouTube together consume about 50% of bandwidth in
United States
• Prior to 2015, ISPs could throttle high-volume users
• February 2015, FCC ruled that broadband ISPs should be viewed and regulated as public utilities
• Under Trump administration, net neutrality regulations have been repealed, but many states are
attempting to reinstate them via state laws and regulations