Andreas Walther, Axel Ryding and Kasper Andersen lecturing on what is essential to known  in relation to law and security when conducting e-commerce. The e-commerce law and security is discussing News, Trends, and Legal Issues Affecting Internet Businesses. They talk about encryption software. According to Wikipedia; Encryption software is software whose main task is encryption and decryption of data, usually in the form of files on (or sectors of) hard drives and removable mediaemail messages, or in the form of packets sent over computer networks. Encryption software executes an algorithm that is designed to encrypt computer data in such a way that it cannot be recovered without access to the key. Software encryption is a fundamental part of all aspects of modern computer communication and files protection and may include features like file shredding.

The purpose of encryption is to prevent third parties from recovering the original information. This is particularly important for sensitive data like credit card numbers.


Electronic commerce

According to Wikipedia, the free encyclopedia:                                            

Electronic commerce, commonly known as e-commerce or e-comm, refers to the buying and selling of products or services over electronic systems such as the Internet and other computer networks. Electronic commerce draws on such technologies as electronic funds transfersupply chain managementInternet marketingonline transaction processingelectronic data interchange (EDI), inventory management systems, and automated data collection systems. Modern electronic commerce typically uses the World Wide Web at least at one point in the transaction’s life-cycle, although it may encompass a wider range of technologies such as e-mail, mobile devices and telephones as well.

  • Electronic commerce is generally considered to be the sales aspect of e-business. It also consists of the exchange of data to facilitate the financing and payment aspects of business transactions.

E-commerce can be divided into:

  • E-tailing or “virtual storefronts” on Web sites with online catalogs, sometimes gathered into a “virtual mall”
  • The gathering and use of demographic data through Web contacts
  • Electronic Data Interchange (EDI), the business-to-business exchange of data
  • E-mail and fax and their use as media for reaching prospects and established customers (for example, with newsletters)
  • Business-to-business buying and selling
  • The security of business transactions


Early development

Originally, electronic commerce was identified as the facilitation of commercial transactions electronically, using technology such as Electronic Data Interchange (EDI) and Electronic Funds Transfer (EFT). These were both introduced in the late 1970s, allowing businesses to send commercial documents like purchase orders or invoices electronically. The growth and acceptance of credit cards, automated teller machines (ATM) and telephone banking in the 1980s were also forms of electronic commerce. Another form of e-commerce was the airline reservation system typified by Sabre in the USA and Travicom in the UK.

Beginning in the 1990s, electronic commerce would include enterprise resource planning systems (ERP), data mining and data warehousing

In 1990, Tim Berners-Lee invented the WorldWideWeb web browser and transformed an academic telecommunication network into a worldwide everyman everyday communication system called internet/www. Commercial enterprise on the Internet was strictly prohibited by NSF until 1995. Although the Internet became popular worldwide around 1994 with the adoption of Mosaic web browser, it took about five years to introduce security protocols (i.e. SSL encryption enabled on Netscape 1.0 Browser in late 1994) and DSL allowing continual connection to the Internet. By the end of 2000, many European and American business companies offered their services through the World Wide Web. Since then people began to associate a word “ecommerce” with the ability of purchasing various goods through the Internet using secure protocols and electronic payment services.


When you are not aware about these activities you will become a victim of cyber attack and can even damage you reputation as a man. Cyber attacks are deliberate attempts to alter, disrupt, or destroy computer systems or networks or the information’s or programs that they store or transmit. Criminal hackers have assembled vast armies of hijacked computers. Imagine a platoon of expert computer criminals using the internet to operate networks of hijacked computers. This army of computers, known as botnets (robot networks), unleashes a barrage of malicious computer codes targeting a specific nation. Within minutes, that nations military, financial, and commercial web sites crash. ATM’S and phone networks fail. Airplanes are grounded, and computer and safety systems at a nuclear power plant are disrupted. Why would anyone want to launch cyber attack? People launch cyber attacks for various reasons. Terrorists or governments, for instance, may try to infiltrate the computer networks of their enemies to steal secrets or to sabotage the equipment that those computer networks control. Computer criminals use similar methods to steal intellectual properties or financial information from corporate networks and personal computers. Criminals reportedly rake billions of dollars each year by means of fraudulent network transactions. Criminal hackers have assembled vast armies of hijacked computers to carry out their online attacks. In 2009, an internet security firm uncovered a criminal gang that remotely controlled a global network of nearly two million computers, many of them owned by private citizens. The Organization for Economic Cooperation and Development (OECD) recently estimated that 1 in 3 online computers are remotely controlled by an intruder. The hackers are sometimes called silent stalkers. A criminal transmits a malicious program over the internet. When the program finds your computer, it silently probes it online defenses. When it finds an unguarded door, it burrows deep into your computer and rummages around for useful information. The malicious program may then change or delete your computer files, e-mail itself to other computers, or send passwords, financial details, or other confidential information back to the intruder. Computer criminals can even trick you into infecting your computer yourself! How? You may infect your own computer by opening an innocent-looking e-mail attachment, clicking on a web page link, downloading and installing a free computer programs, plugging an infected memory device into your computer, or simply visiting a questionable web site. Each of these actions can install malicious software on your computer and bring it under the control of a remote intruder. How can you know if your computer has been infected? It can be very difficult to detect. Your computer or internet connection may seem very slow, your applications may not run, pop-up boxes may prompt you to install certain programs, or your computer may operate in an unusual way. If you note any of these symptoms, have a reputable technician to check your computer.

As nations and individuals become more reliant on computer technology, cyber attacks will likely become more common. Accordingly, many nations are scrambling to beef up their digital defenses, and some are conducting large scale exercises to test the resilience of their computer networks to attack. Given enough time, motivation and funding, a determined adversary will always – always be able to penetrate a targeted system. What is a computer worm? Computer worms are malicious programs that automatically copy themselves from computer to computer via the internet. Like other types of malicious software, computer worms are usually assigned individual names, such as Slammer. What can you do to protect yourself online? While complete online security may not be possible, you can take practical steps to make your computer more secure. Surely wise advice when you go online!

Hacking is an illegal activity and it is also a crime in the part of the one who does it. In the Philippines, nowadays, hacking is a very trending topic. This is because of the issues where Chinese as well as Filipino hackers attack each other’s websites especially those that are run and controlled by the government. As of the writing, there are websites that still are down due to these attacks. Even if this activity is illegal it is hard to determine who the hackers are.

One of the trending product nowadays is the program that is called the anti virus software. This is sellable product because almost all companies, government and any individual are using computers. All businesses and schools and even hospitals are using computers that are why the programmers generate great income by making programs that avoid your computers from the harmful viruses. At the same time also they are the one who makes the viruses. It’s just a matter of business only when there is an illness, there is cure. This business is good because it generates a good income but in the religious aspect this is not good.

Sad to say that some are making virus just to have money but, in the hard part of this is when it made only just for fun and experiment. I remember the late “I LOVE YOU VIRUS” that was just made for fun and experiment only and the maker is not selling any cure or remedy to stop the virus. As the technology became hi tech our problems are also arising, it is because of these incidents in the internet. Some people are victims of fraud and cyber bullying. The arising of these incidents is very alarming because it can damage the identity of anyone. The pornography also is one of the sources and sometimes cause of rape. That is why this criminal act must be stopped.


  • Install antivirus, spyware-detection, and firewall software on your computer. Keep that software and your operating system updated with all security updates.
  • Think before you click on links or open attachments in e-mails or instant messages – even from friends. Be especially cautious if the mail is unsolicited and asks for personal information or passwords.
  • Never copy or run software from unknown sources.
  • Use passwords that have at least eight characters and include numbers and symbols, and change them regularly. Use different passwords for different accounts.
  • Do business online only with reputable companies that use secure connections.
  • Do not give out confidential information about yourself or your accounts when using unsecured Wi-Fi connections, such as in public places.
  • Switch your computer off when it is not in use.
  • Regularly backup your files, and store copies securely.