Phishing within e-commerce: reducing the risk, increasing the trust
- Authors: Megaw, Gregory M
- Date: 2010
- Subjects: Phishing , Identity theft -- Prevention , Electronic commerce , Computer security , Internet -- Safety measures
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11131 , http://hdl.handle.net/10353/376 , Phishing , Identity theft -- Prevention , Electronic commerce , Computer security , Internet -- Safety measures
- Description: E-Commerce has been plagued with problems since its inception and this study examines one of these problems: The lack of user trust in E-Commerce created by the risk of phishing. Phishing has grown exponentially together with the expansion of the Internet. This growth and the advancement of technology has not only benefited honest Internet users, but has enabled criminals to increase their effectiveness which has caused considerable damage to this budding area of commerce. Moreover, it has negatively impacted both the user and online business in breaking down the trust relationship between them. In an attempt to explore this problem, the following was considered: First, E-Commerce’s vulnerability to phishing attacks. By referring to the Common Criteria Security Model, various critical security areas within E-Commerce are identified, as well as the areas of vulnerability and weakness. Second, the methods and techniques used in phishing, such as phishing e-mails, websites and addresses, distributed attacks and redirected attacks, as well as the data that phishers seek to obtain, are examined. Furthermore, the way to reduce the risk of phishing and in turn increase the trust between users and websites is identified. Here the importance of Trust and the Uncertainty Reduction Theory plus the fine balance between trust and control is explored. Finally, the study presents Critical Success Factors that aid in phishing prevention and control, these being: User Authentication, Website Authentication, E-mail Authentication, Data Cryptography, Communication, and Active Risk Mitigation.
- Full Text:
- Date Issued: 2010
- Authors: Megaw, Gregory M
- Date: 2010
- Subjects: Phishing , Identity theft -- Prevention , Electronic commerce , Computer security , Internet -- Safety measures
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11131 , http://hdl.handle.net/10353/376 , Phishing , Identity theft -- Prevention , Electronic commerce , Computer security , Internet -- Safety measures
- Description: E-Commerce has been plagued with problems since its inception and this study examines one of these problems: The lack of user trust in E-Commerce created by the risk of phishing. Phishing has grown exponentially together with the expansion of the Internet. This growth and the advancement of technology has not only benefited honest Internet users, but has enabled criminals to increase their effectiveness which has caused considerable damage to this budding area of commerce. Moreover, it has negatively impacted both the user and online business in breaking down the trust relationship between them. In an attempt to explore this problem, the following was considered: First, E-Commerce’s vulnerability to phishing attacks. By referring to the Common Criteria Security Model, various critical security areas within E-Commerce are identified, as well as the areas of vulnerability and weakness. Second, the methods and techniques used in phishing, such as phishing e-mails, websites and addresses, distributed attacks and redirected attacks, as well as the data that phishers seek to obtain, are examined. Furthermore, the way to reduce the risk of phishing and in turn increase the trust between users and websites is identified. Here the importance of Trust and the Uncertainty Reduction Theory plus the fine balance between trust and control is explored. Finally, the study presents Critical Success Factors that aid in phishing prevention and control, these being: User Authentication, Website Authentication, E-mail Authentication, Data Cryptography, Communication, and Active Risk Mitigation.
- Full Text:
- Date Issued: 2010
Small hospitality enterprises and the internet: an IT governance model for conducting business online
- Authors: Ngoqo, Bukelwa
- Date: 2010
- Subjects: Hospitality industry -- South Africa , Tourism -- South Africa , Organizational effectiveness -- South Africa , Electronic commerce , Internet , Risk management , Electronic data processing
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11133 , http://hdl.handle.net/10353/382 , Hospitality industry -- South Africa , Tourism -- South Africa , Organizational effectiveness -- South Africa , Electronic commerce , Internet , Risk management , Electronic data processing
- Description: The Internet has made a considerable impact on how business is conducted. Empowered by technology consumers are using the Internet as a tool to communicate and transact online. E-commerce (electronic commerce) presents opportunities for business to gain a competitive advantage, however it also posses certain challenges. Small and Medium Hospitality Enterprises (SMHEs) sector within the tourism industry, is one of the sectors which stands to benefit from using the Internet for business. Researchers agree that the contribution made by the tourism sector in developing economies is substantial. However, SMHEs are noted for their failure to derive optimal benefits from using the Internet for business to improve their competitiveness. This study which seeks to develop a model for use by SMHEs as a guide when making the decision to adopt technology was necessitated by the importance of SMHE’s contribution in the economy of developing countries. This model is based on the examination of existing theories and models such as; the Delone and McLean IS success model (2004), and the ITGI’s (2007) IT governance focus areas model. To elicit the desired outcomes, additional data was collected using questionnaires, interviews, and observations. The collected data was analysed and resulted in the development of a model that can be used by SMHEs in order to derive value from IT and to gain a competitive advantage.
- Full Text:
- Date Issued: 2010
- Authors: Ngoqo, Bukelwa
- Date: 2010
- Subjects: Hospitality industry -- South Africa , Tourism -- South Africa , Organizational effectiveness -- South Africa , Electronic commerce , Internet , Risk management , Electronic data processing
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11133 , http://hdl.handle.net/10353/382 , Hospitality industry -- South Africa , Tourism -- South Africa , Organizational effectiveness -- South Africa , Electronic commerce , Internet , Risk management , Electronic data processing
- Description: The Internet has made a considerable impact on how business is conducted. Empowered by technology consumers are using the Internet as a tool to communicate and transact online. E-commerce (electronic commerce) presents opportunities for business to gain a competitive advantage, however it also posses certain challenges. Small and Medium Hospitality Enterprises (SMHEs) sector within the tourism industry, is one of the sectors which stands to benefit from using the Internet for business. Researchers agree that the contribution made by the tourism sector in developing economies is substantial. However, SMHEs are noted for their failure to derive optimal benefits from using the Internet for business to improve their competitiveness. This study which seeks to develop a model for use by SMHEs as a guide when making the decision to adopt technology was necessitated by the importance of SMHE’s contribution in the economy of developing countries. This model is based on the examination of existing theories and models such as; the Delone and McLean IS success model (2004), and the ITGI’s (2007) IT governance focus areas model. To elicit the desired outcomes, additional data was collected using questionnaires, interviews, and observations. The collected data was analysed and resulted in the development of a model that can be used by SMHEs in order to derive value from IT and to gain a competitive advantage.
- Full Text:
- Date Issued: 2010
The impact of electronic service quality dimension on customer satisfaction
- Van der Merwe, Samatha Michelle
- Authors: Van der Merwe, Samatha Michelle
- Date: 2010
- Subjects: Electronic commerce , Consumer satisfaction
- Language: English
- Type: Thesis , Masters , MBA
- Identifier: vital:8652 , http://hdl.handle.net/10948/1367 , Electronic commerce , Consumer satisfaction
- Description: Online purchasing is becoming increasingly common as a purchasing mode. At the onset of e-commerce it was thought that success was guaranteed merely by being present on the internet and offering low prices. Currently customer service has proved itself to be a key element for achieving good results in a website (Zeithaml, Parasuraman & Malhotra, 2002b). In this context, the study of commercial website quality has emerged as an area of strategic importance. As in traditional stores, service quality and customer satisfaction seem to play vital roles in the success and survival of Internet sites.
- Full Text:
- Date Issued: 2010
- Authors: Van der Merwe, Samatha Michelle
- Date: 2010
- Subjects: Electronic commerce , Consumer satisfaction
- Language: English
- Type: Thesis , Masters , MBA
- Identifier: vital:8652 , http://hdl.handle.net/10948/1367 , Electronic commerce , Consumer satisfaction
- Description: Online purchasing is becoming increasingly common as a purchasing mode. At the onset of e-commerce it was thought that success was guaranteed merely by being present on the internet and offering low prices. Currently customer service has proved itself to be a key element for achieving good results in a website (Zeithaml, Parasuraman & Malhotra, 2002b). In this context, the study of commercial website quality has emerged as an area of strategic importance. As in traditional stores, service quality and customer satisfaction seem to play vital roles in the success and survival of Internet sites.
- Full Text:
- Date Issued: 2010
- «
- ‹
- 1
- ›
- »