Author : | Jae K. Shim, Ph.D., CPA |
Course Length : | Pages: 109 ||| Word Count: 48,939 ||| Review Questions: 38 ||| Final Exam Questions: 40 |
CPE Credits : | 8.0 |
IRS Credits : | 0 |
Price : | $71.95 |
Passing Score : | 70% |
Course Type: | NASBA QAS - Text - NASBA Registry |
Technical Designation: | NonTechnical |
Primary Subject-Field Of Study: | Computer Software & Applications - Computer Software & Applications for Course Id 2228 |
Description : | Technological advances change how we live, work, and relate to one another, and continue to change the way businesses operate. With new technologies emerging, businesses of all sizes invest more resources into their online operations. E-commerce will continue to grow in popularity because it improves efficiency and allows businesses to provide value and convenience to customers. E-commerce requires businesses to keep up-to-date with changes in technology, and new and emerging trends are considered. This course focuses on the technology solutions and security strategies for a successful e-commerce business. The course begins with the basic concept of e-commerce. It discusses what e-commerce is and how it is evolving in the modern world. It also explains how the Internet and related technologies and applications have changed the way businesses are operated, and how information systems support business processes, decision-making, and competitive advantage. The ultimate survival and success of the e-commerce business often depend on its involvement with technology. Businesses must be abreast of recent developments in e-commerce. This course explains how e-commerce has benefited from cloud computing technologies and describes the innovative uses of IoT in e-commerce and the challenges of a more connected world. It explores how blockchain integration in e-commerce enhances the customer experience and revolutionizes the way financial transactions are conducted. It also explains how cryptocurrency works and its role in e-commerce, and discusses the most popular types of cryptocurrencies. E-commerce businesses, a particularly attractive target for breaches and attacks, receive and store a great amount of online transactions and data. As cybercrime continues to mature and become commercialized, you must be aware of the evolving fraud and scams to earn the trust of your customers. This e-commerce technology and security course discusses common types of cyberattacks and how to recognize them. It provides information on best practices to help individuals and organizations develop and implement tailored cybersecurity plans and processes that protect and maintain business operations. |
Usage Rank : | 13333 |
Release : | 2023 |
Version : | 1.0 |
Prerequisites : | None. |
Experience Level : | Overview |
Additional Contents : | Complete, no additional material needed. |
Additional Links : |
E-commerce Defined: Types, History, and Examples
|
Advance Preparation : | None. |
Delivery Method : | QAS Self Study |
Intended Participants : | Anyone needing Continuing Professional Education (CPE). |
Revision Date : | 16-Feb-2024 |
NASBA Course Declaration : | Participants must complete the final examination within one year of purchase and with a minimum passing grade of 70% or better to receive CPE credit unless otherwise noted on the Course History page (i.e. California Ethics must score 90% or better). After logging in click on the Course History links on your My Courses page for the Begin date and Expire date for the Final Exam. |
Approved Audience : | NASBA QAS - Text - NASBA Registry - 2228 |
Keywords : | Computer Software & Applications, E-Commerce, Technology, Security, cpe, cpa, online course |
Learning Objectives : |
Chapter 1
2. Identify need-to-know terms before entering the market 3. Recognize how technology has transformed business 4. Identify e-commerce models, benefits and limitations, and success factors 5. Recognize the technologies used in the Intranet and its benefit 6. Identify the uses of an EDI system and its benefits 7. Recognize different applications of e-commerce Chapter 2
2. Identify key metrics that measure the performance of the cloud service 3. Recognize how the integration of IoT in e-commerce improves customer experience 4. Identify IoT benefits and security risks 5. Identify the key components of blockchain technology 6. Recognize different types of blockchains 7. Identify the key aspects of cryptocurrency 8. Recognize the benefits of accepting crypto payments Chapter 3
2. Identify ways to defend your online store against card skimmers 3. Recognize DDoS protection techniques 4. Identify steps that help prevent and limit the impact of ransomware 5. Recognize security strategies counter a broad range of exploitation techniques used by cybercriminal 6. Identify PCI DSS requirements that safeguard the security of sensitive cardholder data |
Course Contents : | Chapter 1: E-Commerce Phenomenon Learning Objectives I. The Language of E-Commerce II. Internet Revolution Origins of Internet Concept of Networking Internet Expansion Process Optimization Web 2.0 III. Rise of E-Commerce Business Transformation Core Processes Success Factors Types of Business Models Advantages and Disadvantages Review Questions Section 1 IV. Innovative Solutions Intranet Essential Features Business Benefits Implementation Extended Intranet Electronic Data Interchange Essential Features Implementations Benefits and Security Risks Electronic Contracting Considerations Communication Channels Advertising Web Presentations How to Build an Online Store Successfully Storefront and Shopping Cart Other Considerations Internet Service Providers Online Analytical Processing Domain Names Trusted Certificates Review Questions Section 2 Chapter 2: Technology Advances Learning Objectives I. Evolution of Cloud Computing What is Cloud Software-as-a-Service Platform-as-a-Service Infrastructure-as-a-Service What to Consider Ready for the Cloud? What to Expect Customer Agreement Service Level Agreement Acceptable Use Policies Data Privacy Policy Review Questions Section 3 II. Impacts of Internet of Things What is IoT Why IoT Solutions What to Consider Review Questions Section 4 III. Power of Blockchain What is Blockchain Trustless System Tamper-Proof Record Cryptography What are the Main Types Public Blockchains Private Blockchains Consortium Blockchains Hybrid Blockchains What to Consider Ready for Blockchain? Review Questions Section 5 IV. Potential of Cryptocurrency What is Cryptocurrency What are the Trending Crypto Bitcoin XRP Ether What to Consider Payment Security Processing Fees Chargebacks Global Availability Tax Implications Review Questions Section 6 Chapter 3: Cyber Threats and Security Strategies Learning Objectives I. Phishing What is Phishing What are Common Tactics How to Recognize Phishing Case Study: Netflix Scam Email How to Defense Against Attacks II. E-Skimming What is E-Skimming How Does Skimming Work How to Protect Your Site III. DDoS Attacks What is DDoS What are the Proactive Steps IV. Ransomware What is Ransomware What Are the Common Attack Vectors How to Protect Your Business What to Do If Infected Review Questions Section 7 V. Cyber Defense Why Cyber Hygiene is Important How to Reduce the Risk of Cyberattacks Cybersecurity Best Practices Cybersecurity for Small Business Why PCI Compliance Matters Protection of Stored Payment Card Data Best Practices for Securing E-Commerce Review Questions Section 8 Glossary |