Commerce Done by: Sadoun AL-Suwaida Turki AL-Anazi.

Slides:



Advertisements
Similar presentations
Principles of Information Systems
Advertisements

Jennifer Perry. We help victims of e-crime and other online incidents – Web based service – Providing practical, plain language advice – No-nonsense advice.
E-Commerce and the Law Section Understanding Business and Personal Law E-Commerce and the Law Section 13.3 Contracts for the Sale of Goods Electronic.
1 Identity Theft and Phishing: What You Need to Know.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Cyber-Crime Presented by American Crime Prevention Institute.
Google AdSense Referral Partner Team Feb 1 st 2005 AdSense Partner Program Invitation Enable your bloggers to uncover the revenue potential of their blogs.
Learning Goals Be able to identify the major forces shaping the new digital age. Understand how companies have responded to the Internet with e-business.
1 Applications of Computers Lecture-3 2 E-Commerce 4 Almost all major companies have their homes on the web, mainly for advertising 4 Companies were.
1 Chapter 9 Electronic Commerce and Electronic Business.
Copyright © 2009 by Pearson Prentice Hall. All rights reserved. PowerPoint Slides to Accompany CONTEMPORARY BUSINESS AND ONLINE COMMERCE LAW 6 th Edition.
Internet Fraud By Brianna Byard. What is it? The Internet is a place where you can buy products, meet people, and socialize. But it is very easy for people.
Internet Fraud By: Noelle Woodman.
Scams Stevie's Scam School videos
9 - 1 © 2007 Prentice Hall, Business Law, sixth edition, Henry R. Cheeseman Chapter 17: E-Contracts and Licensing.
E-commerce E-commerce is defined "as the process of buying, selling, or exchanging products, services, or information via computer networks, including.
Internet Fraud By Jessica Habermehl &Ally Erwine Period 9.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Buying and Selling Items on eBay and Craig’s List Computer and Technology Group May 15, 2008.
E-Commerce and the Law Section Understanding Business and Personal Law E-Commerce and the Law Section 13.3 Contracts for the Sale of Goods What.
Electronic Commerce and Electronic Business Lecture – 12
SUCCESSFUL BUSINESS PLANNING FOR ENTREPRENEURS © South-Western Thomson Chapter 12Slide 1 CHAPTER 12 E-Entrepreneurship OBJECTIVES 12-1Explain the difference.
Topics in Business English E-Business: Doing Business Online
Cyber Crimes.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Investing 101 – Part 3 Spotting Frauds and Scams.
Amber Bennett Cybersquatting. Introduction What is cybersquatting? Cyber: Internet Squatting: to live in a building or on land without the owner’s permission.
Specification section 6.1. What do you need to learn? The effects on society and advantages/disadvantages of ICT in the design, development, marketing.
E-Commerce and the Entrepreneur
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Trust in Cyberspace Unit 10-1 Managing the Digital Enterprise By Professor Michael Rappa.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
Dangers of the Internet CEL : C O M P U T E R S I N E V E R Y D A Y L I F E CEL 1 Dangers of the Internet Name: ____________________ Class: ________________.
Chapter 17 Direct and Online Marketing: Building Direct Customer Relationships.
Chapter 17 E-Commerce and Digital Law
Domain Name Registration Sanjay Gupta August 29, 2008.
7/19: Internet & eCommerce How companies use the Internet –Collaboration (internal & external) –Communication (internal & external): , etc. –Gather.
Computer Security Management: Assessment and Forensics Session 8.
9-1 Chapter 9 The Internet.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
Electronic Marketing: Integrating Electronic Resources into the Marketing Process, 2e 11/5/2015  2004 Joel Reedy and Shauna Schullo Electronic Marketing.
Survey Scams Sam Roberts. What is a Survey Scam?  A scam where someone asks you to fill out a survey answering personal question, business questions,
Online Auction b 資管一 JOSEPHINE 周家裕. INTRODUCTION . NOWADAYS, ONLINE AUCTION IS VERY POPULAR . THE MOST FAMOUS AND LARGEST ONLINE AUCTION COMPANY.
To:Employee From: impersonated official company Message: Give us personal information here.
Essentials Of Business Law Chapter 15 Sales McGraw-Hill/Irwin Copyright © 2007 The McGraw-Hill Companies, Inc. All rights reserved.
McLean HIGHER COMPUTER NETWORKING Lesson 8 E-Commerce Explanation of ISP Description of E-commerce Description of E-sales.
Online Services. Advertising & Marketing Big supermarket companies use lots of different ways of “saving money!” Different ways includes Tesco’s Clubcard,
Chapter 11.  Electronic commerce (e-commerce)  The sale of goods and services by computer over the Internet  Internet (Net)  A collection of millions.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
The Ethics of Electronic Marketing. “ Marketers must accept responsibility for the consequences of their activities and make every effort to ensure that.
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
Adam Shields Sarah Purdy. What is PayPal? PayPal is an online payment service that allows individuals and businesses to transfer funds electronically.
1.3 Safeguarding Your Privacy Identity Theft is the illegal use of an individual’s personal information.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Cyberlaw. “The moving finger writes; and, having writ Moves on: nor all thy piety nor wit Shall lure it back to cancel half a line. Nor all thy tears.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
By: Lindsey Bryant According to the United States federal law known as the Anticybersquatting Consumer Protection Act, is registering, trafficking in,
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
How to Manage Risk. This is the process involves the process for any application from a: Individual Cardholder Company or Corporate cards Merchants Any.
By: Micah Stevens Identity Theft in the World Today.
Internet Fraud..
Chapter 15 Internet Law and E-Commerce
Marketing in the Digital Age: Making New Customer Connections
Internet Fraud By (NAMES).
Ethics Tutorial Assignment#2
Electronic Transactions
Protecting Yourself from Fraud including Identity Theft
E-COMMERCE Learning Unit 4: ADVERTISING IN E-C0MMERCE
Chapter 13 E-Commerce Contracts
Presentation transcript:

Commerce Done by: Sadoun AL-Suwaida Turki AL-Anazi

Outline Anti-Competitive Practices Online Auction Trade Payment Cyber squatting Fraud Web-ads

Anti-Competitive Practices Definition: Practice done by a leader company to hurt others Vaporware. Undercutting. Force bundling.

Online Auction Definition: bid for products and services over the Internet. No time constraints. No geographical constraints Large number of bidders. Large number of sellers.

Free Trade Definition: no restriction on international trade. Import tariffs. Export subsidies. Export controls. Supercomputers. Encryption.

Payment Definition: transfer of wealth from one party to another. Credit Card. Debit. Identity Theft.

Cyber squatting Definition: Registering, selling or using a domain name with the intent of profiting from the goodwill of someone else's trademark. One of the more notable transactions was the domain name wallstreet.com, which was registered in 1994 for $70 and sold for one million in Anti Cyber squatting In August 1999, the U.S. government passed the Anti- Cybersquatting Consumer Protection Act. which enables trademark holders to obtain civil damages up to $100,000 from cybersquatters that register their trade names or similar-sounding names as domain names.

Uniform Domain-Name Dispute- Resolution Policy (UDRP) The UDRP is a process established by the Internet Corporation for Assigned Names and Numbers (ICANN) for the resolution of disputes regarding the registration of internet domain names. The UDRP policy currently applies to all.biz,.com,.info,.name,.net, and.org

Internet Fraud Definition: Refers generally to any type of fraud scheme that uses one or more components of the Internet. such as: chat rooms, , message boards, Web sites.

Major Types of Internet Fraud Auction and Retail Schemes Online. Most frequently reported form of Internet fraud. How? Offer high-value items that are likely to attract many consumers their victims to send money for the promised items, but then deliver nothing or only an item far less valuable than what was promised

Major Types of Internet Fraud Business Opportunity/"Work-at-Home" Schemes Online. Pay anywhere from $35 to several hundred dollars or more, but fail to deliver the materials or information that would be needed to make the work-at-home opportunity a potentially viable business.

Major Types of Internet Fraud Market Manipulation Schemes. Disseminate false and fraudulent information in an effort to cause dramatic price increases in thinly traded stocks. Immediately sell off their holdings of those stocks to realize substantial profits before the stock price falls back to its usual low level.

Major Types of Internet Fraud Identity Theft and Fraud. Wrongful obtaining and using of someone else's personal data.

How to avoid Fraud Don't Judge by Initial Appearances. Be Careful About Giving Out Valuable Personal Data Online. Be Especially Careful About Online Communications With Someone Who Conceals His True Identity. Watch Out for "Advance-Fee" Demands.

Web Advertising Web Advertising: Refers generally to any type of Advertisement scheme that uses one or more components of the Internet. Online advertising has two type: legitimate illegitimate

Legitimate Web Ads. Search Engine Advertising 80% of Web search is generated through search engines. The most effective way of advertising. Banner Advertising Static banner Dynamic banner

Illegitimate Web Advertising Spamming : spam is that is not requested. Very inexpensive way to reach people. Billions of unwanted messages are transmitted daily. Spam does produce results. Suppose that out of 2,000 spam messages, one person clicks the link, and the spammer makes $1. If a million spams were sent that day, the spammer made $500.

Costs of Spam Consumption of network resources. Cost human time. It is cost United States organizations alone more than $10 billion in 2004.

CAN-SPAM (Controlling the Assault of Non-Solicited Pornography And Marketing Act of 2003). In order not to be considered spammer: The message header must have a truthful subject line. a valid return address The message must clearly state that it is an advertisement have a simple way to remove you from their list.

Sources