E Commerce
E Commerce
ESLC Model provides a structured framework for understanding the evolution and challenges faced by
e-commerce businesses as they navigate through different phases of growth and maturity in the online
marketplace. The E-Commerce Sales Product Life Cycle (ESLC) Model outlines six distinct stages that
an e-commerce business typically progresses through.
v
● Beacon Technology- Macy’s Beacon Program
● Self-Checkout Technology- Amazon Go, McDonalds
● Drive-in Grocery Store- Walmart Grocery Pickup
● Drone Technology for Delivery- Amazon Prime Air
C2C E-Commerce
Consumer-to-Consumer (C2C) e-commerce is a business model where consumers sell goods or
services directly to other consumers using an online platform. These platforms act as
intermediaries, facilitating transactions between individuals.
Characteristics of C2C E-Commerce
● Peer-to-Peer Transactions
● Use of Third-Party Platforms
● Auctions & Negotiation
● Lower Costs & Minimal Business Operations
● Variety of Products & Services
v ● Trust-Based Transactions
● Payment Processing & Security
● Direct Communication Between Buyers & Sellers
● Limited Customer Support & Refund Policies
● Sustainability & Second-Hand Market Growth
C2B E-Commerce
The C2B (Consumer-to-Business) model is a type of business transaction where individual consumers
offer products or services to businesses. In contrast to the more traditional B2C (Business-to-Consumer)
model, where businesses sell goods or services to consumers, C2B inverts this relationship and allows
consumers to create value for businesses..
Characteristics of C2C E-Commerce
● Consumers Provide Value to Businesses
● Platforms Facilitating the Exchange
● Flexibility and Customization
● Consumer Control Over Offerings
● Direct Interaction Between Consumers and Businesses
v ● Monetization of Consumer Contributions
● Consumer-Centric Feedback Loop
● Use of Consumer Data for Business Growth
● Peer-to-Peer Business Transactions
● Innovation Through Consumer Input
Hacking
● Hacking refers to the process of identifying and exploiting vulnerabilities in
computer systems, networks, or software to gain unauthorized access or
control.
● While often associated with cybercrime, hacking can also be ethical when used
to improve security.
● A Hacker is a person who finds and exploits the weakness in computer
systems and/or networks to gain access.
● Hackers are usually skilled computer programmers with knowledge of
v
computer security.
Types of Hackers
● White Hat Hackers (Ethical Hackers) – Kevin Mitnick
● Black Hat Hackers (Malicious Hackers) – Albert Gonzalez
● Grey Hat Hackers – Khalil Shreateh
● Script Kiddies – Mafiaboy (Michael Calce): Launched DDoS attacks on major websites like
Amazon and CNN as a teenager.
● Hacktivists – Anonymous
● State-Sponsored Hackers – Lazarus Group (North Korea)
● Cyber Terrorists – ISIS-affiliated hackers
●v Whistleblower Hackers – Edward Snowden: Exposed NSA’s global surveillance programs by
leaking classified documents.
● Green Hat Hackers – Aspiring Hackers
● Blue Hat Hackers – Microsoft BlueHat Program
Web Vandals
● The term "web vandals" can refer to individuals who engage in malicious activities on the internet,
such as hacking, spreading malware, or defacing websites.
● Web or Digital vandals can be defined as defacing the digital assets of a company or individual to
cause nuisance or permanent damage.
● Web vandalism involves unauthorized actions that disrupt, damage, or deface websites and online
platforms.
● In Web /digital vandalism rather than physically damaging technology, digital vandals hack the
v
technology to create issues within the technology itself.
● Digital vandalism can target a single computer or an entire company, creating simple pranks within
websites or altering masses of data and information.
Forms of Web Vandals
● Website Defacement
● Distributed Denial of Service (DDoS) Attacks: A DDoS attack floods an e-commerce website with
traffic, overwhelming its servers and causing the website to crash or become inaccessible.
● Credential Stuffing & Account Takeover: This happens when attackers use stolen usernames and
passwords from a data breach (e.g., from another platform) to try and log into e-commerce sites,
often with the goal of stealing customer data or making fraudulent purchases.
● Malware Injection & Script Injections: Hackers inject malicious code or scripts (such as JavaScript
v
or PHP) into e-commerce websites. This can redirect customers to phishing sites, steal sensitive
customer information, or cause damage to the site's functionality.
1. Sales Automation
v2. Marketing Automation
3. Service Automation
Analytical E-CRM
● Analytical E-CRM focuses on collecting, analyzing, and interpreting customer data to gain insights
into customer behavior, preferences, and trends.
● Analytical E-CRM enables companies to predict customer needs, segment audiences effectively,
and personalize interactions, ultimately leading to increased customer loyalty and revenue growth.
1. Multi-Channel Communication
v
2. Internal Collaboration & Data Sharing
3. Customer Self-Service Portals
4. Partner Relationship Management (PRM)
Social E-CRM
● Social E-CRM (Social Customer Relationship Management) integrates traditional CRM with social
media platforms like Facebook, Twitter, Instagram, and LinkedIn to enhance customer engagement,
brand loyalty, and business growth.
● It enables businesses to interact with customers in real-time, gather insights from social
interactions, and personalize customer experiences.
v
implement certain processes, systems, or technologies.
● Role: Protection of Unique Technologies, Encouraging Innovation, Enhancing Consumer
Confidence, Defending Market Position, Attracting Investments and Partnerships, Monetizing
Intellectual Property, Preventing Infringement and Legal Disputes
Types of Patents in E-Commerce
● Utility Patents - Amazon One-Click Ordering
● Design Patents- Apple’s iPhone
● Business Method Patents- Amazon’s Marketplace
● Software Patents- Google Search Algorithm, E-commerce Fraud Detection
● Patent for Data Protection and Security- SSL Encryption Technology, Two-Factor
Authentication
● Patent for Mobile E-Commerce Technologies-Mobile Payment Systems: Google pay and
v Apple pay
● Patent for Logistics and Delivery Innovations- Amazon’s Drone Delivery System, Ocado, a
UK-based online grocery store, patented its automated warehouse robot systems that help
process orders more efficiently.
EDI (Electronic Data Interchange)
● Electronic Data Interchange (EDI) is the electronic exchange of business documents and
data between organizations in a standardized format, replacing paper-based
communication.
● EDI allows companies to securely transmit data, such as purchase orders, invoices,
shipping notices, and payment details, directly from one computer system to another
without the need for human intervention.\
● EDI functions by electronically transmitting standardized business documents between
v
organizations through a secure, structured format.
EDI Process
Document Creation: A business creates an electronic document (e.g., purchase order) within its internal
system (e.g., ERP).
Translation: The EDI software or translator converts the document into a standardized format (e.g.,
ANSI X12 or EDIFACT).
Transmission: The document is sent over a communication network (such as a VAN or the internet) to
the trading partner's system.
Receipt & Acknowledgment: The trading partner's EDI system receives the document, processes it, and
v
acknowledges receipt. This can include verifying the document's integrity and checking for errors.
Document Integration: The trading partner’s system (e.g., ERP or accounting system) then integrates
the EDI document, updating inventory, customer orders, and other necessary business operations.
How EDI Works in E-Commerce
● EDI Data Formats and Standards:Businesses use standardized data formats like ANSI X12
(commonly used in the U.S.), EDIFACT (widely used in Europe), and XML to ensure that the data
is understandable by both sender and recipient systems.
● EDI Components: Trading Partners, EDI Translator, EDI Communication Network, EDI Software
1. VAN (Value-Added Network): A private, third-party network that facilitates the secure
exchange of EDI documents between businesses.
v2. Direct EDI: An internet-based direct communication system between trading partners, which
is faster and more cost-efficient.
3. Web EDI: A cloud-based version of EDI that allows smaller businesses to send and receive
EDI documents over the web, without the need for expensive software.
EDI and Paperless trading
● Electronic Data Interchange (EDI) plays a pivotal role in enabling paperless trading, which
refers to the exchange of business documents and transactions electronically without the need
for physical paperwork.
● EDI has made it possible for businesses to exchange various forms of data, such as purchase
orders, invoices, shipment details, and contracts, in a standardized, secure, and automated
manner.
● This shift to digital documents significantly reduces the reliance on traditional paper-based
v processes and promotes more efficient, cost-effective, and environmentally friendly business
operations.
Contributions of EDI to Paperless Trading
● Elimination of Paper Documents
● Automated Data Processing
● Improved Accuracy and Reduced Errors
● Faster Transactions
● Enhanced Security
● Cost Savings
● Lower Costs and Improved Resource Management
v● Better Visibility and Tracking
● Environmental Benefits
● Regulatory Compliance
E-Marketing
● E-Marketing, also known as digital marketing, refers to the use of online platforms and digital
technologies to promote products or services to consumers.
● It encompasses various strategies that help businesses reach a wider audience, engage customers
effectively, and drive sales.
Techniques
● Search Engine Optimization (SEO)
● Content Marketing
● Social Media Marketing
● Email Marketing
● Pay-Per-Click (PPC) Advertising
v● Affiliate Marketing
● Influencer Marketing
● Mobile Marketing
● Viral Marketing
● Reputation marketing
Role of Social Media in E-Commerce
● Brand Awareness & Visibility
● Targeted Advertising
● Influencer Marketing
● Social Commerce (Direct Selling on Social Media)
● Customer Engagement & Support
● User-Generated Content & Reviews
● Flash Sales & Promotions
v● Live Streaming & Product Demonstrations
● Data-Driven Insights & Analytics
Managing the E-Enterprise
● Business Model & Strategy
● Technology & Infrastructure
● Digital Marketing & Customer Acquisition
● E-Commerce & Payment Solutions
● Cybersecurity & Data Privacy
● Supply Chain & Logistics Management
● Customer Experience & Support
● Data Analytics & Business Intelligence
v
● Remote Workforce & Collaboration
● Innovation & Future Trends
Comparison between Conventional and E-organization
Aspect Conventional Organization E-Organization
Structure Hierarchical, rigid structure Flat, flexible, and technology-driven
Communication Face-to-face meetings, letters, phone calls Emails, video conferencing, chat apps
Work
Environment Physical office spaces Remote work, cloud-based collaboration
Customer Online chat, AI-powered bots, self-service
v Interaction In-person service, phone support portals
Market Reach Limited to local or regional markets Global reach through the internet
Sales & E-commerce, online payments, digital
Transactions Physical stores, cash transactions wallets
Comparison between Conventional and E-organization
v
Types of payment systems
● Cash Payment System – Street vendors accepting cash.
● Credit Card Payment System – Visa, MasterCard, American Express.
● Debit Card Payment System – RuPay, Maestro, Visa Debit.
● Online Banking (Net Banking) System – ICICI Net Banking, SBI Online.
● Mobile Payment Systems – Google Pay, PhonePe, Paytm.
● Digital Wallets & E-Wallets – PayPal, Amazon Pay, MobiKwik Wallet.
● UPI (Unified Payments Interface) System – BHIM UPI, Google Pay, Paytm UPI.
● Contactless Payment System (NFC-Based Payments) – Apple Pay, Visa payWave.
● Cryptocurrency Payment System – Bitcoin (BTC), Binance Pay.
v● Buy Now, Pay Later (BNPL) Payment System – Amazon Pay Later, Klarna.
● Automated Clearing House (ACH) & Electronic Fund Transfer (EFT) Systems – NACH in
India, Direct Debit.
● Point of Sale (POS) Payment System – Paytm POS, Pine Labs, Square POS
E-payment systems
● An E-Payment System (Electronic Payment System) enables online financial transactions,
allowing customers and businesses to send and receive payments digitally. It is an essential
component of e-commerce and modern business operations.
Characteristics
● Digital & Paperless Transactions
● Speed & Instant Processing
● Convenience & Accessibility
● Security & Encryption
● Multiple Payment Options
● Global Transactions & Currency Support
v● Integration with E-Commerce Platforms
● Transaction Tracking & Digital Receipts
● Cost-Effective & Reduced Handling Costs
● Contactless & Mobile Payment Support
Prepaid e-payment systems
● Prepaid e-payment services are digital financial solutions that allow users to load funds onto a card,
wallet, or account before making purchases online or in-store.
● Unlike credit or debit cards linked to bank accounts, prepaid payment methods require users to
pre-fund their accounts, ensuring controlled spending and reducing the risk of overdrafts or interest
charges.
● These services cater to a wide range of consumers, including those without traditional banking
access, making e-commerce more inclusive and accessible.
● The rise of e-commerce and digital transactions has significantly increased the demand for prepaid
v
e-payment solutions.
● They offer enhanced security by reducing the exposure of sensitive banking details during online
transactions, thereby minimizing fraud risks.
Prepaid e-payment systems
● Prepaid Cards – Visa Prepaid, PayPal Prepaid MasterCard
● E-Wallets – Google Pay, Apple Pay, Paytm
● Gift Cards & Vouchers – Amazon Gift Card, Steam Wallet Gift Card
● Prepaid Mobile & Internet Accounts – M-Pesa, Globe GCash
● Cryptocurrency-Based Prepaid Services – Binance Card, BitPay Prepaid Card
● Virtual Prepaid Cards – Revolut Virtual Card, Netspend Virtual Prepaid Card
● Merchant-Specific Prepaid Accounts – Starbucks Card, Uber Cash
v● Prepaid Travel Cards – Wise Travel Card, Travelex Money Card
● Prepaid Transit Cards – Oyster Card (London), MetroCard (New York)
● Retailer Store Cards – Walmart MoneyCard, Target RedCard Prepaid
Prepaid e-payment systems
Closed System Amazon Gift Card, Steam These instruments can only be used on the specific
Payment Wallet Gift Card, Starbucks issuer's platform and do not allow cash withdrawal
Instruments Card, Uber Cash or transfer.
Semi-Closed Paytm, Google Pay, Apple Can be used at a network of partnered merchants,
System Pay, M-Pesa, Globe GCash but do not allow cash withdrawals.
Payment
Instruments
v
Prepaid e-payment systems
Category Examples Description
Semi-Open Visa Prepaid, PayPal Prepaid Can be used at any card-accepting merchant (POS
System MasterCard, Revolut Virtual or online), but do not allow cash withdrawals.
Payment Card, Netspend Virtual
Instruments Prepaid Card
Open System Wise Travel Card, Travelex Can be used for purchases anywhere and also
Payment Money Card, Binance Card, allow cash withdrawals at ATMs.
Instruments BitPay Prepaid Card, Walmart
MoneyCard, Target RedCard
v Prepaid
Mobile Prepaid M-Pesa, Globe GCash Prepaid balances used primarily for mobile
Instruments recharges and payments, sometimes extending to
third-party services.
Postpaid e-payment systems
● Postpaid e-payment services allow consumers to make purchases online and pay for them at a later date,
usually through monthly billing or installment plans.
● These services provide flexibility by enabling users to shop without immediate payment, making them
ideal for those who prefer deferred payments or need time to manage their finances.
● Unlike prepaid services, which require an upfront deposit, postpaid payments operate on a credit-based
system, where users are given a spending limit and billed at the end of a cycle.
● The popularity of postpaid e-payment services has grown significantly with the rise of Buy Now, Pay
Later (BNPL) solutions, digital credit lines, and subscription-based billing.
v● These services improve accessibility for customers who may not have sufficient funds at the time of
purchase but can repay in installments or after a set period.
● Postpaid payments also provide businesses with increased sales opportunities, as customers are more
likely to complete purchases when given flexible payment options.
Postpaid e-payment systems
● Buy Now, Pay Later (BNPL) Services – Afterpay, Klarna, Affirm
● Credit Cards – Visa, MasterCard, American Express
● Digital Credit Lines – Amazon Pay Later, PayPal Credit
● Mobile Carrier Billing – Google Play Carrier Billing, Apple Carrier Billing
● Subscription-Based Payment Models – Netflix, Spotify, Amazon Prime
● Postpaid Wallets – Paytm Postpaid, Lazada Wallet Credit
● EMI (Equated Monthly Installments) on Debit & Credit Cards – Bajaj Finserv EMI Card,
v HDFC Bank EMI on Credit Cards
SET (Secure Electronic Transaction) Protocol for Credit Card Payment
● The Secure Electronic Transaction (SET) protocol is a security standard developed by Visa and
MasterCard in collaboration with companies like IBM, Microsoft, and Netscape to ensure safe
credit card transactions over the internet.
● SET protects sensitive credit card details by encrypting data and verifying both the buyer and the
seller.
Participants in SET :
● Cardholder – customer
v● Issuer – customer financial institution
● Merchant
● Acquirer – Merchant financial
● Certificate authority – Authority which follows certain standards and issues certificates (like
X.509V3) to all other participants.
SET (Secure Electronic Transaction) Protocol for Credit Card Payment
● Cardholder Authentication – When a customer purchases a laptop on Flipkart using a credit card,
SET verifies the customer's identity using a digital certificate or OTP-based authentication.
● Merchant Authentication – When booking a flight on MakeMyTrip, the SET protocol ensures that
MakeMyTrip is a verified merchant before processing the payment, reducing risks of phishing
scams.
● Data Confidentiality – When a user enters credit card details on Amazon, SET encrypts the data so
even Amazon cannot see the actual card number, preventing misuse.
● Transaction Integrity – When a customer buys a mobile phone from Myntra, SET ensures that the
amount debited remains exactly the same as what was displayed, preventing fraud.
● Dual Signature Mechanism – When buying shoes from Nike's official website, the merchant gets
v the order details (size, color, address), but only the payment gateway (Visa/MasterCard) sees the
credit card number.
● Secure Communication Between Parties – During an Uber ride payment, SET ensures secure
communication between Uber, the customer’s bank, and the payment gateway (e.g., Razorpay),
preventing hacking attempts.
SET (Secure Electronic Transaction) Protocol for Credit Card Payment
● Non-Repudiation – When a customer books a hotel on Booking.com, SET ensures that both the
customer and the merchant cannot deny making the transaction, as digital signatures and certificates
act as proof of transaction.
● Payment Authorization – When buying a smartphone on Croma’s website, SET ensures that the
card-issuing bank verifies and approves the payment, preventing unauthorized transactions.
● Confidential Order Information – When purchasing groceries on BigBasket, SET ensures that only
BigBasket sees the order details, while the payment gateway processes the financial transaction
securely.
● Prevention of Eavesdropping & Tampering – When a user enters credit card details on Zomato for
v
food delivery, SET prevents hackers from intercepting or modifying the payment information
during transmission.
● Interoperability – When a PayPal user pays a merchant accepting Visa/MasterCard, SET ensures
seamless communication between different payment systems, banks, and merchants, allowing
smooth transactions.
Importance of Electronic Records as Evidence
● Legally Recognized and Admissible – Apple vs. Samsung (2016) patent case
● Tamper-Resistant and Secure – Blockchain-Based Copyright Cases (China)
● Efficient and Easily Accessible – Forensic Investigations in Cybercrime Cases
● Crucial in Corporate and Financial Disputes – Enron Scandal (2001)
● Essential for Fraud and Cybercrime Investigations – WhatsApp & Telegram Chat Logs in
Financial Scams
● Used in Criminal and Civil Cases – CCTV Footage in 2011 London Riots
v● Supports Regulatory Compliance – Bernie Madoff Ponzi Scheme (2008)
Taxation Issues in E-Commerce in India
● Goods and Services Tax (GST) Compliance – Platforms like Amazon and Flipkart are required to
collect Tax Collected at Source (TCS) under GST and remit it to the government.
● Tax Collected at Source (TCS) under GST – E-commerce operators must deduct 1% TCS (0.5%
CGST + 0.5% SGST or 1% IGST) on sales made through their platforms before paying sellers,
increasing compliance burdens for small businesses.
● Place of Supply Rules & Interstate Taxation – If an online seller in Delhi ships goods to a buyer in
Mumbai, IGST (Integrated GST) applies instead of CGST and SGST, making tax liability complex.
● Equalization Levy on Foreign E-Commerce Players – A 6% equalization levy applies to digital ad
v
revenues of companies like Google and Facebook, and a 2% digital tax is imposed on e-commerce
sales by foreign players like Amazon, Alibaba, and eBay.
Taxation Issues in E-Commerce in India
● GST on Digital Services & Online Content – Streaming platforms like Netflix, Spotify, and Hotstar
must pay 18% GST under the Online Information and Database Access or Retrieval (OIDAR)
services, even if they don’t have a physical presence in India.
● Customs Duties on Cross-Border E-Commerce – Imports through e-commerce attract custom duties
and IGST, making international purchases costly, while Indian exporters face GST refund and
export documentation challenges.
● Tax Evasion & Compliance Burden – Many small sellers on platforms like Meesho and Flipkart
struggle with complex GST filings, while some unregistered sellers evade taxes, leading to revenue
v
losses for the government.
Protection of Cyber Consumers in India
● Consumer Protection Act, 2019
● Information Technology (IT) Act, 2000
● Personal Data Protection Bill (Draft)
● E-Commerce Rules, 2020
● Reserve Bank of India (RBI) Guidelines on Digital Payments
● Cyber Crime Cells & Helplines
● Right to Refund & Return Policies
v● Data Privacy & Security Measures
Problems Faced by Consumers in E-Commerce
● Fraudulent Sellers & Fake Products – Consumers on Amazon and Flipkart have reported
receiving counterfeit or inferior-quality products instead of the original ones they ordered.
● Payment Frauds & Phishing Attacks – Users of Google Pay and Paytm have fallen victim
to fake payment links and phishing scams, leading to unauthorized transactions and financial
losses.
● Delayed or Failed Deliveries – Customers on platforms like Myntra and Snapdeal often
experience delayed deliveries or orders getting lost in transit without proper resolution.
v● Misleading Advertisements & False Claims – E-commerce sites like Nykaa and Meesho
have been criticized for displaying edited product images or exaggerated claims, leading to
buyer dissatisfaction.
Problems Faced by Consumers in E-Commerce
● Privacy & Data Security Issues – Platforms like Facebook and Zomato have faced data
breaches, exposing users’ personal and payment details to hackers.
● Difficult Return & Refund Policies – Consumers on Shein and Club Factory (before their
ban in India) struggled with delayed refunds or outright refusal of returns for defective
products.
● Hidden Charges & Overpricing – Some online stores, like MakeMyTrip and Goibibo, add
hidden service fees at checkout, making purchases more expensive than advertised.
v● Lack of Customer Support & Redressal – Users of Snapdeal and Flipkart have reported
poor customer support, with unresolved complaints and no proper escalation mechanism.
Social Media Marketing
Social Media Marketing (SMM) refers to using social media platforms to:
Social
v media marketing is important because it has massive audience reach, cost-effective, it helps
in engagement & interaction, enhances brand loyalty and provides SEO Benefits
Advantages of Social Media Marketing to E-Commerce
● Increased Brand Awareness – Nike’s "You Can’t Stop Us" Campaign; Daniel Wellington’s
Influencer Marketing Strategy
● Cost-Effective Marketing Strategy – Glossier’s Community-Driven Growth; Gymshark’s Viral
Challenges
● Higher Customer Engagement & Interaction – Starbucks’ #RedCupContest; Wendy’s Twitter
Roasts
● Increased Website Traffic & Sales – Kylie Cosmetics’ Instagram Shopping Feature; Fashion
Nova’s Facebook & Instagram Ads
v
● Better Targeting & Personalization – Spotify’s Personalized Ads on Social Media; Amazon’s
Retargeting Ads
Advantages of Social Media Marketing to E-Commerce
● Improved Customer Trust & Brand Loyalty – Tesla’s Engaging Social Media Presence;
Airbnb’s User-Generated Content (UGC)
● Boosts SEO & Search Engine Rankings – HubSpot’s Blog and Social Sharing Strategy;
Sephora’s Social Media Engagement
● Opportunity for Influencer & Affiliate Marketing – Fashion Nova’s Influencer
Partnerships; Amazon Associates Program
● Real-Time Insights & Analytics – Coca-Cola’s Social Listening Strategy; Netflix’s
v Personalized Content Promotion
● Social Commerce & Direct Selling – Instagram Checkout for H&M; TikTok Shop for Small
Businesses
Types of Threats in E-Commerce- Cybersecurity Threats
● Phishing Attacks – Amazon Phishing Scams; PayPal Phishing Attack
● Malware & Ransomware Attacks – WannaCry Ransomware (2017); Maersk Ransomware Attack
(2017)
● SQL Injection Attacks – British Airways Data Breach (2018); Yahoo Data Breach (2014)
● Distributed Denial of Service (DDoS) Attacks – AWS DDoS Attack (2020); GitHub Attack (2018)
● Man-in-the-Middle (MITM) Attacks – Public Wi-Fi Eavesdropping; Vodafone Germany Hack (2013)
● Credential Stuffing – Spotify Credential Stuffing Attack (2020); Zoom Credential Leak (2020)
● Insider Threats – Tesla Insider Sabotage (2020); Shopify Insider Data Breach (2020)
v
● Zero-Day Exploits – Microsoft Exchange Hack (2021); Google Chrome Zero-Day Vulnerability
● Data Breaches & Identity Theft – Equifax Data Breach (2017); Facebook Data Leak (2019)
● IoT & Smart Device Attacks – Mirai Botnet Attack (2016); Ring Camera Hacks (2019)
Types of Threats in E-Commerce- Financial Threats
● Payment Fraud – eBay Payment Fraud (2014); Ticketmaster Credit Card Breach (2018)
● Chargeback Fraud (Friendly Fraud) – Apple App Store Chargeback Abuse; Shopify Merchant Chargebacks
● Account Takeover (ATO) Fraud – DoorDash Account Takeover (2019); PayPal Account Hacking Cases
● Cryptocurrency Scams & Fraud – OneCoin Ponzi Scheme (2016-2019); Twitter Bitcoin Scam (2020)
● Fake Online Stores & Scam Websites – LuxStyle Scam (2018); COVID-19 PPE Scams (2020)
● Money Laundering via E-Commerce – eBay & PayPal Money Laundering Cases; Crypto Wash Trading on
Binance
● Gift Card Fraud – Target Gift Card Scam (2015); Walmart Gift Card Scams
● Affiliate Marketing Fraud – Uber Affiliate Fraud (2017); Amazon Associates Click Fraud
v
● Business Email Compromise (BEC) & Invoice Fraud – Google & Facebook Invoice Scam (2013-2015); Toyota
BEC Attack (2019)
● Stock Market Manipulation & Pump-and-Dump Scams – GameStop Short Squeeze (2021); Crypto
Pump-and-Dump Scam