Activity

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 14

E-COMMERCE

1. What is E-commerce?

According to the Merriam-Webster dictionary, e-commerce is defined as commerce


conducted via the Internet. This concept applies to the practice of buying and selling goods
and services online, whether between businesses and consumers or between both. What
paved its way dates back to the 1960s-1980s, when the introduction of Electronic Funds
Transfer (EFT) enabled the electronic transfer of money. This may shed light on the origin of
the name "e-commerce" or electronic commerce. In the early 2000s, the rise of mobile
devices and smartphones led to the development of mobile commerce, or m-commerce,
which allows people to shop and make transactions using their mobile devices.

E-commerce comes in various forms, such as online marketplaces, retailers, and auctions,
and it includes digital fund transfers and electronic data interchange (EDI) to help streamline
business operations and transactions. When it comes to bringing people and companies
together, it also follows different types of e-commerce models. Some types include Business
to Consumer, Business to Business, Consumer to Consumer, Business-to-Government, and
more.

Nowadays, e-commerce has become a crucial aspect of modern business as it


continuously adapts to new technological advancements in every era. E-commerce has
definitely revolutionized the process of buying and selling goods and services, rendering it
more efficient, quick, and convenient than it ever was before.

2. Features of E-commerce.

1. User-friendly access and customizable/improvable customer experience.

2. Payment gateway. E-commerce sites include multiple payment options to facilitate


electronic payment processing, enabling customers to pay securely with credit or debit
cards, PayPal, or other electronic payment methods.

3. Online storefront and shopping cart. E-commerce websites typically have an online
storefront that displays products or services for sale, including extensive product
information such as prices, and images, along with a shopping cart feature that allows
customers to add items to a virtual cart and make multiple purchases in a single
transaction.

4. User reviews and ratings. E-commerce websites may feature reviews and ratings from
customers, which is essential considering that your buyers will not be able examine a
product in person and will most likely rely on previous customer reviews.

5. Security and privacy: To guard against fraud and theft, e-commerce websites must
guarantee the security of consumer data, including payment and personal information.
6. To analyze user behavior, uncover patterns, and enhance the user experience, e-commerce
websites use analytics technologies.

3. What is the difference between traditional commerce and e-commerce?


The main difference in both commerce is that in traditional commerce, goods and
services are exchanged through physical channels like face-to-face interactions or brick-and-
mortar storefronts. E-commerce, in contrast, is the exchange of products and services over
electronic platforms, primarily the Internet.
E-commerce offers advantages such as convenience, broader reach, lower overhead costs,
and the ability to personalize marketing efforts. In contrast, traditional commerce has the
advantage of offering a tangible shopping experience and the ability to inspect products
before purchase. Additionally, traditional commerce can be limited by geographical
boundaries, while e-commerce can reach customers globally.
Other differences are shown in a comparison table below:
Traditional Commerce E-commerce
Accessibility
Limited Any time
Scope
Restricted to a specific location Wider scope, across the globe
Business Relationship
Linear End-to-end
Marketing
One way One to one
Payment
Cash, Debit or Credit card, cheque, etc., Debit or Credit card, NEFT or Cash on
Delivery (COD) etc.,
Delivery of Products
In an instant Takes weeks or months depending on
location, weather, and other factors that affect
online delivery

4. What are the advantages of e-commerce?


E-commerce enables businesses to reach a wider audience. The number of customers who
can enter physical stores at one time as well as their geographic location put restrictions on
them. On the other hand, e-commerce platforms are accessible from anywhere in the world,
at any hour of the day or night. It now offers greater convenience for both businesses and
customers. Instead of physically visiting a business, customers may shop online, compare
prices, and make purchases from the comfort of their homes. As a result, companies greatly
benefit by reaching a wider customer base with boosted sales and profits. Businesses may not
need to maintain physical storefronts or hire as many staff, which can result in cost savings
for them. Overall, e-commerce transformed the way society shopped and did business by
enhancing the convenience, affordability, and accessibility of buying while also generating
new business and employment prospects.

5. What are the disadvantages of e-commerce?

E-commerce has become increasingly popular in recent years, but it also comes with
some disadvantages. The loss of direct communication between the consumer and seller is
one example. Customers only have access to product descriptions and photographs using e-
commerce, which may not adequately depict the goods. Issues with delivery and shipping,
such as delays or lost deliveries could also be experienced by customers, which is irritating
and inconvenient. Additionally, some goods, such as fragile or perishable items, might not be
accepted for shipment, which restricts the kinds of goods that can be offered through e-
commerce platforms. There are also concerns about online security and privacy of not just
consumers but also business owners. E-commerce's biggest drawback in our society is the
possible loss of jobs, especially in the retail industry. Salespeople, cashiers, and other retail
workers may lose their jobs when traditional brick-and-mortar stores close as more
people shop online.

6. What are the e-commerce business models?

 Business-to-Consumer (B2C): This strategy involves selling products or services directly


to individual consumers via the Internet.

 Business-to-Business (B2B): This concept involves firms selling items or services to one
another over the Internet.

 Consumer-to-Consumer (C2C): In this approach, individuals buy and sell items or


services to one another over an internet platform, with the platform typically taking a
commission fee.

 Consumer-to-Business (C2B): In this model, individuals sell their goods or services to


businesses, such as through freelancing employment or influencer marketing.

 Business-to-Government (B2G): This approach involves businesses selling items or


services to government entities via Internet portals or marketplaces.

 Government-to-Business (G2B): This approach involves government agencies selling


items or services to businesses via Internet portals or marketplaces.

 Government-to-Consumer (G2C): This concept involves government entities directly


delivering services or selling items to individual consumers via internet portals or
marketplaces.
7. What are the e-commerce payments systems?

 Credit and debit cards are the most commonly used payment methods in e-commerce.
Customers enter their credit card information on the merchant's website, and the payment
is processed via a payment gateway.

 Digital wallets are online accounts that store payment information for customers.
Customers can utilize digital wallets such as PayPal, Google Wallet, or Apple Pay to
make purchases without having to enter their credit card information every time.

 Customers can use their cellphones to make payments through mobile payment
programs such as Google Wallet, Apple Pay, or Samsung Pay, Gcash, and more.

 Customers can use online banking services to transfer funds straight from their bank
account to the merchant's account.

 Customers pay for their purchases in cash when the goods are delivered to them via cash
on delivery (COD).

 Cryptocurrencies are digital currencies that utilize encryption techniques to control the
production of currency units and to verify the transfer of payments. Some popular
cryptocurrencies are Bitcoin and Ethereum.

 Payment gateways are services that help with online payments by encrypting sensitive
information such as credit card numbers and bank account information. PayPal, Stripe,
and Authorize.net are examples of payment gateways.
INTERNET
1. Define the following:
• Internet
The Internet is a global network of interconnected computer networks that use
defined communication protocols to communicate with one another, which allows for the
transfer of information and communication between individuals and organizations around
the world. It consists of billions of devices, including servers, routers, computers, and
mobile devices, all connected through a variety of wired and wireless communication
technologies. It is a decentralized network that allows computers and gadgets to
communicate and share information regardless of where they are physically located.
Websites, email, social networking, online shopping, and cloud computing are just a few
of the services available via the internet.
It's no brainer that the internet has transformed how we live, work, and
communicate. It has enabled people from all over the world to communicate with one
another, as well as new chances for businesses to reach clients and expand their markets.
Individuals can now easily access information and resources, ranging from educational
materials to entertainment content, thanks to the internet. The internet has also evolved
into a formidable e-commerce platform, allowing firms to offer goods and services to
people all over the world. Online marketplaces and payment systems have made it easier
for enterprises of all kinds to participate in the global economy, as well as for consumers
to access a greater variety of goods and services than ever before.

• Evolution of the internet


Since its creation, the internet has come a long way. It all started in the 1960s to
allow researchers and scientists to share knowledge and communicate with one another.
The US Department of Defense supported this early version of the internet, known as
ARPANET (Advanced Research Projects Agency Network).
The Internet began to extend outside the academic and research sectors in the
1980s, and the World Wide Web was created. The web enabled the development of
graphical user interfaces, which made it easier for users to access and explore online
material. This marked a watershed moment in the evolution of the internet, making it
more accessible to the general population.
The internet boomed in the 1990s, as did the creation of new technologies such as
email, instant messaging, and online commerce. With the advent of broadband internet, it
became possible to connect to high-speed internet connections, and the first social
networking sites were developed. The World Wide Web was introduced in 1991, and its
popularity skyrocketed in the following years. Many people started accessing the internet
from home, and internet cafes and other public access points became more common.
Mosaic, the first web browser, was also developed in 1993, which was an important
milestone. Users were able to traverse the web and access information more easily as a
result of this. In the late 1990s, the development of search engines such as Yahoo! and
Google made it even easier to discover information on the internet. This era also saw the
emergence of social media, with the launch of the first social networking site, Six
Degrees, in 1997. Instant messaging and email became popular modes of communication,
and online forums and chat rooms were utilized to facilitate social engagement.
The 2000s were a time of significant growth and transformation for the internet.
The dot-com bubble burst in the early 2000s, leading to a temporary slowdown in
internet-related businesses. The rise of mobile devices and smartphones in this era altered
how people accessed the internet. Mobile internet usage has exceeded desktop internet
usage, and the internet has become more intertwined with our daily life. Online shopping
became more popular and convenient, with e-commerce companies such as Amazon and
eBay experiencing significant growth in the 2000s. Google emerged as the dominant
search engine, transforming the way people found information online and shaping the
development of the internet in numerous ways.
Today, the Internet is a massive and sophisticated global network of
interconnected devices and systems. It is utilized for a variety of purposes ranging from
communication and entertainment to commerce and education. The rise of social media
has also transformed the way people interact and share information online, with platforms
like Facebook, Twitter, and Instagram becoming household names. It has also given rise
to new technologies such as cloud computing, big data, and artificial intelligence, which
have revolutionized company operations and expanded the opportunities for innovation.
The internet continues to evolve and adapt to the changing requirements and
wants of its users, making future predictions problematic. One thing is certain: the
internet has transformed the way we live, work, and communicate with one another.

• Advantages and disadvantages of internet.


The internet has become an indispensable component of modern life, affecting
how we live and work. While having access to the internet offers many advantages, it
also has some disadvantages.
Access to information is one of the most important advantages of the Internet. The
internet offers a wealth of knowledge on a wide range of topics that may be accessed
from anywhere in the world.
Another benefit involves the way we communicate with one another. Through
email, social media, and other messaging apps, the Internet has made communication
faster and more comfortable. During the pandemic, the traditional mode of learning
turned into online education, and we have the internet to thank for making it possible. But
even before COVID-19 happened, the internet has been providing access to online
courses and educational resources which made education more accessible and affordable
for people worldwide.
In the field of e-commerce, it opened up new potential for enterprises in the area
of e-commerce to grow their clientele and boost revenue. Online shopping has grown in
popularity and convenience, enabling consumers to make purchases from the comfort of
their homes.
The internet has also transformed the entertainment industry, allowing people to
access movies, TV shows, and music from anywhere in the world.
Moving on to some of its disadvantages, the proliferation of incorrect information
is one of the internet's most serious drawbacks. With so much information available
online, it can be difficult to separate fact from fiction. Misinformation spreads quickly,
causing confusion and injury. This is especially true in the age of social media, where
unsubstantiated news can be rapidly disseminated, thus provoking panic and anxiety.
Cyberbullying is another downside of the internet. Because the internet provides
anonymity, some people feel empowered to abuse others online.
Privacy is another major concern with the internet. Since there is so much
personal information available online, there is always the possibility that it will be
obtained and utilized by malicious individuals. Identity theft, financial fraud, and other
major crimes can emerge from this.
The internet can also be addictive, resulting in issues such as procrastination and
decreased productivity. Some people may find it difficult to focus on work or other
critical tasks due to the easy availability of entertainment and social media.
To summarize, while the Internet offers numerous advantages, it also has several
substantial downsides.

• Difference between intranet and extranet


Intranet and extranet are two types of computer networks that are used for distinct
purposes by companies. An intranet is a private network that a business uses internally
where employees can communicate and collaborate to establish the company culture.
Extranet, on the other hand, is an extension of the intranet that approved external users,
such as customers, business partners, or others outside the company can have access.
Another distinction is that the intranet hosts content relevant to the organization's
internal operations, such as company policies, employee directories, and training
materials, whereas the extranet hosts content relevant to external users, such as product
details, tracking of orders, and assistance for consumers.
In terms of security, intranet is more secure than extranet because it is a closed
network that only those within the organization can access. Meanwhile extranets are more
prone to security breaches since they are available to external users who may not have the
same level of security in place.
• Benefits of intranet and extranet
Intranet
 Intranets enable personnel to readily communicate with one another, even if they
are in separate places. They can share files, communications, and project or
corporate news updates.

 Intranets can provide consolidated access to critical company papers, regulations,


and procedures for employees. This can save time and lessen the possibility of
errors due to obsolete or missing information.

 Teams can work more efficiently together both within and beyond departments.
They can collaborate on projects, exchange ideas, and gain feedback from their
peers.

 By giving workers the resources that they need to do their jobs well, intranets can
help boost productivity. Without wasting time looking for it, they can swiftly and
simply obtain resources, data, and other information.

Extranet
 Since they offer a safe platform for communication between a business and its
external partners, such as suppliers, customers, and distributors, extranets enhance
collaboration. All parties involved may benefit from increased communication
and collaboration as a result.

 Extranets can help to streamline processes by allowing external partners to


directly access information and resources without requiring manual involvement
or conversation. This can save time and lessen the likelihood of errors caused by
misunderstanding.

 Extranets can be used to provide self-service alternatives to customers, such as the


ability to track orders or access account information. This can boost customer
satisfaction while also reducing the workload of customer service representatives.

 By eliminating the need for travel and in-person meetings with partners outside
the company, extranets can help businesses save money. Additionally, they can aid
in lowering the expenses related to paper-based procedures, such as printing and
mailing paperwork.
COMPUTER ETHICS
1. What is computer ethics?

The moral ideas, values, and standards of conduct that regulate the behavior of persons
and organizations in regard to technology and digital information are referred to as computer
ethics. It entails studying and evaluating emerging technologies' social and ethical
ramifications, as well as setting ethical rules and standards to ensure that computers are used
responsibly and accountable. It also covers a wide range of concerns concerning the usage,
development, and distribution of computer technology, such as privacy, intellectual property,
cybercrime, information access, and the impact of technology on society. Computer ethics is
concerned with promoting ethical behavior and responsible decision-making when using
technology, as well as identifying and addressing ethical quandaries that emerge in the
context of computer technology.

2. History of computer ethics.

Computer ethics is a relatively new discipline that arose in the 1970s. The phrase
"computer ethics" was coined in 1979, and the first conference on the subject was held in
1976. The rising use of computers in society in the 1980s enhanced the importance of
computer ethics. The Computer Ethics Institute was founded in 1983 to encourage ethical
computing practices. This was a period of rapid expansion and invention in the computing
industry, with an increasing understanding of the importance of ethical considerations in
computer use. As technology grew, so did the ethical dilemmas that accompanied it. Efforts
to govern computer use began during this time period, with the introduction of ethical codes
and guidelines for computer professionals. Overall, the 1980s were an important time in the
evolution of computer ethics as a distinct field of study.

With the rise of the internet in the 1990s, computer ethics emerged to address issues such
as privacy, intellectual property rights, and freedom of speech online. Cybercrime has
become a rising issue, prompting the creation of new ethical rules and legislation for online
behavior. Furthermore, arguments concerning the digital divide arose, with concerns about
unequal access to technology and its potential societal consequences. With the advent of e-
commerce and internet firms came ethical concerns about consumer privacy and data
security. In response to the expanding influence of technology in society, the 1990s marked
the continued progress and increasing importance of computer ethics. The 10 commandments
of computer ethics were first introduced by computer science professor Ramon C. Barquin in
1992. The commandments were created to encourage responsible and ethical technology use,
as well as to prevent unethical and damaging behaviors such as hacking, cyberbullying, and
copyright infringement. These commandments provide a framework for individuals and
organizations to follow in order to guarantee that technology is used responsibly, ethically,
and in the best interests of society as a whole.

Computer ethics is still important today, as new technology presents new ethical
concerns.
3. List down the 10 commandments of computer ethics.

1. Thou shalt not use a computer to harm other people.


2. Thou shalt not interfere with other people's computer work.
3. Thou shalt not snoop around in other people's computer files.
4. Thou shalt not use a computer to steal.
5. Thou shalt not use a computer to bear false witness.
6. Thou shalt not copy or use proprietary software for which you have not paid.
7. Thou shalt not use other people's computer resources without authorization or proper
compensation.
8. Thou shalt not appropriate other people's intellectual output.
9. Thou shalt think about the social consequences of the program you write or the system
you design.
10. Thou shalt always use a computer in ways that ensure consideration and respect for your
fellow humans.

4. Define what is computer crimes?

Computer crimes, often known as cybercrime, e-crime, electronic crime, or hi-tech crime,
are any illegal conduct involving the use of a computer or computer network. This includes
hacking, the distribution of viruses or malware, phishing scams, identity theft, illegal access
to sensitive information, cyberstalking, cyberbullying, and a variety of other activities.
Sometimes, a person or group of individuals may be malicious and destroy or otherwise
corrupt the computer or data files. Individuals, corporations, and even governments can
suffer enormous financial losses, reputational damage, and breaches of privacy and security
as a result of computer crimes. As technology advances, computer crimes become more
complex, necessitating new techniques to prevent and prosecute these offenses.

5. Why do people commit computer crimes?


In most cases, someone commits a computer crime for financial gain, as many computer
crimes are committed for the purpose of stealing money or valuable information. Greed and
desperation are major motivators for some people to attempt computer theft. Some people
may also commit a computer crime because they are pressured, or forced, to do so by another
person. There are also cases when they do it out of boredom or simply to have some kind of
fun.
Some people commit computer crimes as a means of revenge or to cause harm to others.
These individuals, often known as black hat hackers, enjoy wreaking havoc on other people
and businesses.
Furthermore, certain computer crimes may be the consequence of employee negligence
or a lack of sufficient training while handling sensitive information.
6. Examples of computer crimes.

 Click fraud - Fraudulent clicks on Internet ads.


 Copyright violation - Theft or unauthorized use of another person's copyrighted
content.
 Cyber terrorism - Hacking, threats, and blackmailing towards a business or person.
 Cyberbully or Cyberstalking - Harassment of others via the internet.
 Cybersquatting - Registering another person's or company's domain with the sole goal
of selling it to them later at a profit.
 Creating Malware - Writing, creating, or distributing malware (e.g., viruses and
spyware.)
 Data diddling - A type of computer fraud that involves the intentional manipulation of
numbers in data entering.
 Data theft - Stealing others' personal or confidential information.
 Doxing - Releasing another person's personal information without their permission.
 Espionage - Spying on a person or business.
 Fake - Products or services that are not real or counterfeit.
 Fraud - Manipulating data, e.g., changing banking records to transfer money to an
account or participating in credit card fraud.
 Harvesting - Collecting other people's accounts or account-related information.
 Human trafficking - Participating in the illegal act of buying or selling other humans.
 Identity theft - Act of pretending to be someone you are not.
 Illegal sales - Buying or selling illicit goods online, including drugs, guns, and
psychotropic substances.
 Intellectual property theft - Stealing practical or conceptual information developed by
another person or company.
 Phishing or vishing - Deceiving people in order to obtain private or personal
information about them.
 Ransomware - Infecting a computer or network with ransomware that holds data
hostage until a ransom is paid.
 Scam - Causing people into believing something that is not true.
 Sextortion - Extortion where a victim's private data of a sexual nature is acquired
illegally by another person.
 Slander - Publishing libel or slander against another person or company.
 Software piracy - Copying, distributing, or using software not purchased by the
software user.
 Spamming - Distributed unsolicited e-mails to dozens or hundreds of different
addresses.
 Spoofing - Deception of a system into believing you are someone you are not.
 Theft - Stealing or taking anything that does not belong to you (e.g., hardware,
software, or information) that doesn't belong to you.
 Typo squatting - Setting up a domain that is a misspelling of another domain.
 Unauthorized access - Gaining access to systems you do not have authority to use.
 Vandalism - Damaging any hardware, software, website, or other objects.
 Wiretapping - Connecting a device to a phone line to listen to conversations.
HACKING
1. Define what is a hacker?
A hacker is a person who utilizes their expertise in the use of computers and technology
to obtain unauthorized access to computer networks, systems, or websites. Typically, they do
this with the intention of stealing, deleting, or modifying data, and causing other types of
harm. In order to gain access to computer systems or to take control of them without the
knowledge or permission of the individual or company that they are trying to break through,
hackers may also install and spread dangerous software (malware) to the computers.
However, not all hackers take part in illegal activity. To help avoid security breaches and
defend against cyberattacks, some ethical hackers try to find weaknesses in computer
systems.

2. What are the different types of hackers? Define per type.

 Black Hat Hackers: Most common type of hackers. Hackers who use black hat
techniques are the most well-known. Black hat hackers are those who break into
computer networks or systems with the intention of causing harm to the system. They are
frequently connected to illegal and cybercriminal activity.

 White Hat Hackers: Also referred to as ethical hackers, these individuals seek to
identify and repair security holes in computer networks and systems rather than exploit
them for their own advantage. White hat hackers frequently test security protocols and
ensure organizations are safeguarded from cyberattacks.

 Grey Hat Hackers: A mix of both black hat and white hat hackers. They’re not
malicious but they’re also not ethical. They break into computers without permission;
however, they do not do any kind of harm. These hackers enter into a system to find
flaws and alert the owner, frequently in return for payment.

 Green Hat Hackers: Green hat hackers are "green" in the sense that implies that they are
novices or learners in the hacking community. They are inexperienced individuals who
lack the technical expertise of more established hackers. Phishing and other social
engineering strategies may be used by green hats to get around security measures.

 Blue Hat Hackers: Individuals who belong to the white hat hacking community but are
employed by organizations to conduct penetration tests and identify vulnerabilities to
help improve their cybersecurity defenses.

 Red Hat Hackers: Often referred to as vigilante hackers. They are driven by a desire to
retaliate against black hat hackers by infiltrating the dark web and the communities of
black hat hackers and launching hacking attacks on their networks and devices. In other
words, they are hackers who engage in illegal activities to combat other illegal activities.
 Hacktivists: Hacktivists are individuals who employ their hacking abilities to advance
social or political agendas, typically by altering the content of websites or exfiltrating and
publishing sensitive information. They may target government agencies, corporations, or
individuals whom they hold accountable for social or environmental harm.

3. Give popular hackers in the world.

 Kevin Mitnick
 Holds the title as the world's most famous hacker ever. He rose to notoriety in the
1980s after hacking into the North American Defense Command (NORAD).
These events inspired the film War Games.

 Julian Assange
 Having been on Interpol's most wanted list, many would immediately recognize
Assange as one of the world's biggest hackers, especially given the impact
revelations his organization, Wikileaks, has published to the globe.

 Gary McKinnon
 Perpetrated the “biggest military computer hack of all time.”

 Gummo
 Black-hat hacker turned good. He recently gained more publicity after
announcing that he holds nearly $7 billion dollars in Bitcoin.

4. What are the ways to protect yourself from hackers?


There are various measures you can take to safeguard yourself against hackers:
1. Use strong and unique passwords, and change them regularly.
2. Be cautious when clicking on links or downloading attachments from unknown
sources.
3. Install and keep antivirus software up-to-date.
4. Avoid using public Wi-Fi for sensitive activities.
5. Report any suspicious activities to the relevant authorities.
6. Keep all software updated with the latest security patches.
7. Secure your data if your mobile device is lost or stolen.
References:
Admin. (2019, May 13). Top 7 Difference Between Traditional Commerce and Ecommerce.
BYJUS; BYJU’S. https://byjus.com/commerce/difference-between-traditional-commerce-and-
ecommerce/#:~:text=Traditional%20Commerce%20comprises%20to%20be,of%20data%2C
%20on%20the%20internet.
Basheer, M. (2023, February 25). What Are The 7 Features Of E-Commerce? Vakilsearch | Blog.
https://vakilsearch.com/blog/what-are-the-seven-features-of-e-commerce/
Berman, S. J., & Hagan, K. (2000). Your extranet: Leveraging the web to build value. Journal of
Business Strategy, 21(5), 32-37. doi:10.1108/eb040208
Buxton, O. (2022, October 12). Hacker Types: Black Hat, White Hat, and Gray Hat Hackers.
Hacker Types: Black Hat, White Hat, and Gray Hat Hackers. https://www.avast.com/c-hacker-
types#:~:text=White%20hat%20hackers%20probe%20cybersecurity
Computer ethics. (n.d.). In Techopedia. Retrieved April 28, 2023, from
https://www.techopedia.com/definition/401/computer-ethics

‌Computer Hope. (2023). Computerhope.com.


https://www.computerhope.com/jargon/c/compcrim.htm

Fox, J. (2021, January 5). Top 10 Famous Hackers | Cobalt. Cobalt.io; Cobalt.
https://www.cobalt.io/blog/top-ten-famous-hackers#:~:text=Kevin%20Mitnick%20holds%20the
%20title,hacking%20at%20an%20early%20age.
Investopedia. (2021, March 24). E-commerce business models.
https://www.investopedia.com/terms/e/ecommerce-business-models.asp
Layton, J. (2019). Computer Crime: Definition, Types and Examples. Investopedia. Retrieved
from https://www.investopedia.com/terms/c/computer-crime.asp
Smith, T. (2021, September 10). E-commerce payment systems: Types, advantages, and
disadvantages. FinancesOnline.com. https://financesonline.com/e-commerce-payment-systems/


You might also like