Electronic Publishing: The Role of Carrier and Publisher

1986 ◽  
Vol 21 (1) ◽  
pp. 40-47
Author(s):  
Richard M. Neustadt

Since this is a legal seminar, I thought it would be appropriate to begin with a case. There is a person in Los Angeles who has been operating an electronic bulletin board on his personal computer. What that means is that he has memory attached to his computer, and it is possible for anyone else in the country with a computer to dial into that bulletin board and leave a message automatically in the memory. That message can then be accessed by anyone else who dials in.This person does not exercise any control over the messages that are put in. It is open to anyone who wants to put a message in there. Somebody put into that bulletin board the telephone credit card number of a rich person. Subsequently, many other people dialed into the bulletin board, got the telephone credit card number and charged phone calls to that person. No one knows where the number came from. The board operator was prosecuted under a criminal charge. The question is, is he liable?

Author(s):  
Neil C. Rowe

Deception is a frequent but under appreciated aspect of human society (Eckman, 2001). Deception in electronic goods and services is facilitated by the difficulty of verifying details in the limited information available in cyberspace (Mintz, 2002). Fear of being deceived (often unjustified) is in fact a major obstacle to wider use of e-commerce and e-government by the public. One survey reported consumers thought fraud on the Internet was 12 times more common than offline fraud, and 3 out of 5 people thought their credit card number could be stolen in most online transactions (Allen, 2001); both are overestimates. We assess here the nature of the deception threat, how deception can be detected, and what can be done about it.


2010 ◽  
pp. 834-842
Author(s):  
Chi Po Cheong

Credit card is the most popular payment method used in Internet shopping. The idea of credit card payment is to buy first and pay later. The cardholder can pay at the end of the statement cycle or they can pay interest on the outstanding balance. Therefore, there are many credit card-based electronic payment systems (EPSs) that have been developed to facilitate the purchase of goods and services over the Internet such as CyberCash (VeriSign), iKP (Bellare, Garary, Hauser, et al, 1995), SET (Visa and MasterCard, 1997), CCT (Li & Zhange, 2004), and so forth. Usually a credit card-based EPS involves five parties: cardholder, merchant, acquirer bank, issuer bank, and financial institution. Internet is an open system and the communication path between each other is insecure. All communications are potentially open for an eavesdropper to read and modify as they pass between the communicating endpoints. Therefore, the payment information transmitted between the cardholder and the merchant through Internet is dangerous without a secure path. SSL (Zeus Technology, 2000) is a good example to secure the communication channel. Besides the issue of insecure communication, there are a number of factors that each participant must consider. For example, merchant concerns about whether the credit card or the cardholder is genuine. There is no way to know the consumer is a genuine cardholder. As a result, the merchant is incurring the increase in losses due to cardholder disputes and frauds. On the other hand, cardholders are worried about the theft of the privacy or sensitive information such as the credit card number. They don’t want any unauthorized usage of their credit cards and any modification to the transaction amount by a third party. These security issues have deterred many potential consumers from purchasing online. Existing credit card-based EPSs solve the problems in many different ways. Some of them use cryptography mechanisms to protect private information. However, they are very complicated, expensive, and tedious (Xianhau, Yuen, Ling, & Lim, 2001). Some EPSs use the Certificate Authority (CA) model to fulfill the authentication, integrity, and nonrepudiation security schemes. However, each participant requires a digital certificate during the payment cycle. These certificates are issued by independent CAs but the implementation and maintenance cost of this model is very high. In addition, the validation steps of Certificate-based systems are very time-consuming processes. It requires access to an online certificate server during the payment process. Moreover, the certificate revocation list is a major disadvantage of the PKI-based certification model (The Internet Engineering Task Force). The cardholder’s certificate also includes some private information such as the cardholder’s name. The requirement of a cardholder’s certificate means software such as e-Wallet is required to be installed on the cardholder’s computer. It is the barrier for the cardholder to use Certificatebased payment systems. To solve this problem, Visa Company has developed a new payment system called Verified by Visa (VbV) (http:www/visa-asia.com/ ap/sea/merchants/productstech/vbv_implementvbv. shtml). However, sensitive information such as credit card number is still passed to the merchant. Therefore, the cardholder is not protected by the system.


2007 ◽  
Vol 54 (4) ◽  
pp. 263-279 ◽  
Author(s):  
George W. Musambira ◽  
Sally O. Hastings ◽  
Judith D. Hoover

The study investigated how two distinct perspectives apply to the role of gender in parents' memorials on The Compassionate Friends (TCF) electronic bulletin board; cyberspace as merely a mirror of societal gendered patterns of bereavement, and cyberspace as a medium or context in which societal gendered patterns of bereavement are neutralized. Data were evaluated to determine to what extent gender differences exist concerning instrumental versus intuitive styles of bereavement. Analytic categories used in assessing gender differences in parental bereavement style included the following: invoking spirituality, directing messages to the deceased, artistic expressions, and special powers accorded to the deceased. With some exceptions, the findings supported the perspective emphasizing the gender neutralizing aspects of cyberspace parental bereavement for the population studied.


2011 ◽  
pp. 84-91
Author(s):  
Neil C. Rowe

Deception is a frequent but under appreciated aspect of human society (Eckman, 2001). Deception in electronic goods and services is facilitated by the difficulty of verifying details in the limited information available in cyberspace (Mintz, 2002). Fear of being deceived (often unjustified) is in fact a major obstacle to wider use of e-commerce and e-government by the public. One survey reported consumers thought fraud on the Internet was 12 times more common than offline fraud, and 3 out of 5 people thought their credit card number could be stolen in most online transactions (Allen, 2001); both are overestimates. We assess here the nature of the deception threat, how deception can be detected, and what can be done about it.


Sign in / Sign up

Export Citation Format

Share Document