ITS 380 Global E- Commerce
Case Study Questions
1. Who are the three major players in the mobile payment market?
In terms of subscribers, technology companies come first such as Apple, Google, Samsung and Paypal. Second, large banks such as JPMorgan, Chase, Wells Fargo and Citi. Third, the major credit card companies such as Visa, Master Card and Discovery etc.
2. Why Venmo is considered a social-mobile payment system?
Because people can use their social network to make and receive payments. They donít necessarily need other personís bank number. All they need is, for example, their email address.
3. How does Apple Pay differ from Android Pay and Samsung Pay?
While Android pay is mostly used on smartphones, Apple pay can be used by many other forms of Apple devices, not only on iPhones. Android pay asks customers to enter PIN while Apple pay is confirmed by the customerís fingerprint. Samsung Pay stores coupons and reward cards. They are all similar in functionality.
4. How does PayPal enable mobile payments?
PayPal is currently the most successful and profitable non- traditional online payment system. It is accessible from all different types of devices. It enables mobile payments in 3 ways. First, PayPal sells a device that allows merchants to swipe credit cards using a smartphone or tablet. Second, customers use their mobile device browser on a tablet or smartphone to make a purchase or payment at a website. A third method is PayPalís updated app for iOS and Android devices.
1. Imagine you are the owner of an e-commerce website. What are some of the signs that your site has been hacked? Discuss the major types of attacks you could expect to experience and the resulting damage to your site. Prepare a brief summary presentation.
When the website is hacked, depends on what type of it, the signs can be different.† . If it is malware, PUPs, cybervandalism, pharming or spam, the look of the website could be dramatically changed from its original design. Customer complaints would increase if it is something that the server didnít know. Most common types of attacks can be credit card fraud, pharming, phising, spam, denial of service attack, data breach, malware, hacking and cybervandalism. Consequently, the site might disappear, loads extremely slow or crashes. Or it might display different websites.
2. Given the shift toward m-commerce, do a search on m-commerce (or mobile commerce) crime. Identify and discuss the security threats this type of technology creates. Prepare a presentation outlining your vision of the new opportunities for cybercrime that m-commerce may provide.
Because of increased use of mobile devices, m- commerce crimes are increasing. It is a cybercrime. Few examples I have researched:
a. Risky QR codes: this happens when mobile user scan QR codes with their devices without know where it came from. This results in automatic download of viruses or malware onto userís device.
b. Unsecured Wi- Fi Threats: by using unsecured and unknown Wi- Fi on the device can lead to information leaks and all sorts of data from the device.
c. Smishing: Smishers sens their victims text messages to their phone. They often pose as a business or marketing advertisements. Or even say that the victim has won prizes and direct them to malicious websites where they asks personal informations like bank account etc.