About Us McqMate.com is an educational platform, Which is developed BY STUDENTS, FOR STUDENTS, The only objective of our platform is to assist fellow students in preparing for exams and in their Studies throughout their Academic career. Show » We provide you study material i.e. PDF's for offline use. E-commerce 2019: business. technology. society., 15e (Laudon/Traver) Chapter 5 E-commerce Security and Payment Systems 1) Confidentiality is sometimes confused with: A) privacy. B) authenticity. C) integrity. D) nonrepudiation. Answer: A Difficulty: Easy AACSB: Application of knowledge Learning Objective: 5.1: Understand the scope of e-commerce crime and security problems, the key dimensions of e-commerce security, and the tension between security and other values. 2) ________ is the ability to ensure that e-commerce participants do not deny their online actions. A) Nonrepudiation B) Authenticity C) Availability D) Integrity Answer: A Difficulty: Moderate AACSB: Information technology Learning Objective: 5.1: Understand the scope of e-commerce crime and security problems, the key dimensions of e-commerce security, and the tension between security and other values. 3) ________ is the ability to identify the person or entity with whom you are dealing on the Internet. A) Nonrepudiation B) Authenticity C) Availability D) Integrity Answer: B Difficulty: Moderate AACSB: Information technology Learning Objective: 5.1: Understand the scope of e-commerce crime and security problems, the key dimensions of e-commerce security, and the tension between security and other values. 4) Which of the following is an example of an integrity violation of e-commerce security? A) A website is not actually operated by the entity the customer believes it to be. B) A merchant uses customer information in a manner not intended by the customer. C) A customer denies that he is the person who placed the order. D) An unauthorized person intercepts an online communication and changes its contents. Answer: D Difficulty: Moderate AACSB: Analytical thinking Learning Objective: 5.1: Understand the scope of e-commerce crime and security problems, the 1 Copyright © 2020 Pearson Education, Inc.
Home My Library
Discovery
E-commerce 2016: Business. Technology. Society., 12e (Laudon) Chapter 5 E-commerce Security and Payment Systems 1) Confidentiality is sometimes confused with: A) privacy. B) authenticity. C) integrity. D) nonrepudiation. Answer: A Difficulty: Easy AACSB: Application of knowledge LO: 5.1: Understand the scope of e-commerce crime and security problems, the key dimensions of e-commerce security, and the tension between security and other values. 2) ________ refers to the ability to ensure that e-commerce participants do not deny their online actions. A) Nonrepudiation B) Authenticity C) Availability D) Integrity Answer: A Difficulty: Moderate AACSB: Information technology LO: 5.1: Understand the scope of e-commerce crime and security problems, the key dimensions of e-commerce security, and the tension between security and other values. ! 1 Copyright © 2017 Pearson Education, Inc. What is the ability to ensure that etest like questions from ecommerce 2012 8/e. Which security dimensions will be violated if the hackers break into an eExample: If a hacker breaks into the ecommerce site, they can gain access to the customer credit card details or any other customer information. This also violates information confidentiality and personal privacy.
How is Nonrepudiation used on websites quizlet?>> Nonrepudiation prevents either sender or receiver from denying a transmitted message. >> Thus, when a message is sent, the receiver can prove that the alleged sender in fact sent the message.
Which of the following is the primary communications protocols for the Internet?TCP IP. TCP is one of the primary protocols of the Internet Protocol suite. It works with and complements IP, which is why the two are often paired together as TCP IP. TCP IP is the most widely used communications protocol.
|