Shaye Trenda

ITS 380

Submitted on 2/2/18

Chapter 5 E-commerce Security and Payment Systems: The Mobile Payment Marketplace

C A S E    S T U D Y    Q U E S T I O N S

1.     Who are the three major players in the mobile payment market?

1.       Technology companies like Apple, Google, Samsung, and PayPal.

2.      Large national merchants like Visa, MasterCard, Discover, and American Express.

3.      Money center banks like JP Morgan Chase, Wells Fargo, Citi, etc.

2.    Why is Venmo considered a social-mobile payment system?

Venmo is considered a social-mobile payment system because there is a social aspect of Venmo that allows users to share their purchase events. They have the option to keep all purchases private, as well.

3.    How does Apple Pay differ from Android Pay and Samsung Pay?

Apple Pay differs from Android and Samsung Pay because it can be used by any consumer that has a credit card from a major issuer bank. Apply Pay is also free to consumers and it does not store any user fund and it is solely a technology-based intermediary between consumers and banks. Apple Pay is also not subject to federal banking regulations (unlike Android Pay and Samsung Pay).

4.    How does PayPal enable mobile payments?

PayPal enables mobile payments in 3 ways: selling a device that allows merchants to swipe credit cards using a smartphone or tablet, when consumers use their mobile device to make purchases using the PayPal account (the most common way), and the last way is when consumers go to and then make their purchase in stores while on their web browser (which isnít very fast or convenient for fast-paced stores).


1.     Imagine you are the owner of an e-commerce Web site. What are some of the signs that your site has been hacked? Discuss the major types of attacks you could expect to experience and the resulting damage to your site. Prepare a brief summary presentation.

The owner of an e-commerce web site can observe some relevant signs to determine if he/she was hacked. If the number of new users increases dramatically, if the location of the users of the Website is unusual if some content is missing or the URLs do not work, if the information of the products or service that are being sold is modified, or if the customers are not able to finalize the payment.

The major types of attack that my website could receive are viruses, Trojans, and other forms of malware. This malware can delete data from the Web site, crash the Web site, modify files, steal relevant information, create spam, make fraudulent purchases, and obtain userís information. The consequences are terrible for the company since it would affect the relation with the customers, and it would affect our reliability.

2.    Given the shift toward m-commerce, do a search on m-commerce (or mobile commerce) crime. Identify and discuss the security threats this type of technology creates.

An increase in online shopping via various mobile applications and payment gateways, crime through mobile apps have increased drastically. Some serious security threats have been created due to emergence of m-commerce culture. For example, PC-based applications can be secured using strong authentication and encryption while developers must work with somewhat limited memory capabilities of wireless devices. This makes the use of strong authentication and encryption difficult. Another threat is that wireless devices such as cell phones are easily and frequently stolen. This means user authentication is critical for secure m-commerce. Unfortunately, experts say many current wireless protocols come up short on authentication. Below are things to watch out for while on your mobile device.