Abstract
Looking at social commerce, a bunch of bewildering phenomena attracts the attention of social psychologists. The way customers participate today shows attitudes and ethical behavior which cannot be explained from the inherent conditions of Web 2.0 environments alone. Fraud often succeeds, when you do not expect it, and honesty can be found under circumstances that do not support honesty at all. The current situation seems to result from customers assigning experience and ethics from real world business to virtual business environments. But there are indications that this situation may change. Social commerce could suffer as soon as customers would use its inherent weaknesses to their own advantage. The following article outlines first approaches to research into this topic.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Anderson, Ross; Moore, Tyler, “The Economics of Information Security”, Science, Vol. 314, 27.10.2006, pp. 610–613
Avison, David E.; Myers, Michael D., “Information systems and anthropology: an anthropological perspective of IT and organizational culture”, Information Technology & People, Vol. 8, No. 3, 1995, pp. 43–56
Bakan, Joel, “The Corporation. The Pathological Pursuit of Profit and Power”, Free Press 2004
Fischbacher, Urs; Heusi, Franziska, (2008) “Lies in Disguise. An experimental study on cheating", Thurgau Institute of Economics, Research Paper No. 40, November 2008
Flechais, Ivan; Riegelsberger, Jens; Sasse, Angela M., „Divide and Conquer: The Role of Trust and Assurance in the Design of Secure Socio-Technical Systems“,ACM Proceedings of the 2005 workshop on New security paradigms, pp. 33 – 41
Franklin, Jason; Paxson, Vern; Perrig, Adrian; Savage, Stefan (2007), “An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants”, ACM CCS’07, October 29 – November 2, 2007
Haidt, Jonathan, “The Emotional Dog and Its Rational Tail: A Social Intuitionist Approach to Moral Judgment”, Psychological Review, 2001, Vol. 108, No. 4, pp. 814–834
Harford, Tim, “The Undercover Economist”, Abacus 2007
Kiely, Laree; Benzel, Terry V, “Systemic Security Management”, IEEE Security &Privacy, November/December 2006, pp. 74–77
Kohlberg, Lawrence; Charles Levine, Alexandra Hewer (1983). “Moral stages : a current formulation and a response to critics”. Basel, NY: Karger, 1983
Koskosas, Ioannis V; Paul, Ray J., “The Interrelationship and Effect of Culture and Risk Communica-tion in Setting Internet Banking Security Goals”, ACM ICEC’04, Sixth International Conference on Electronic Commerce, pp. 341–349
Lakoff, George; Johnson, Mark, (2003) “Metaphors We Live By”, University of Chicago Press, 2003
Langford, Duncan, Internet Ethics, Palgrave 2000
Levitt, Steven D.; Dubner, Stephen J., “Freakonomics”, HarperCollins 2006
Manske, Kurt, “An Introduction to Social Engineering”, Information Systems Security, November/December 2000, pp. 53–59
Nass, Clifford; Moon, Youngme, “Machines and Mindlessness: Social Responses to Computers”, Journal of Social Issues, Vol. 56, No. 1, 2000, pp. 81–103
Nikitkov, Alex; Bay, Darlene, “Online Action Fraud: Ethical Perspective”, Journal of Business Ethics, Vol. 79, 2008, pp. 235–244
O’Neill, John, “Bank payment systems victim of elaborate social engineering scam“, http://www.back-upanytime.com/blog/2008/08/bank-payment-systems-victim-of-elaborate-social-engineering-scam/
Odlyzko, Andrew, “Economics, Psychology, and Sociology of Security”, Financial Cryptography: 7th International Conference, FC 2003, R. N. Wright, ed., Lecture Notes in Computer Science #2742, Springer, 2003, pp. 182–189
Palfrey, John; Gasser, Urs, “Born Digital. Understanding the First Generation of Digital Natives”, Basic Books 2008
Pavlou, Paul A.; Gefen, David, (2005) “Psychological Contract Violation in Online Marketplaces: An-tecedents, Consequences, and Moderating Role“, Information Systems Research, Vol. 16, No. 4, December 2005, pp. 372–399
Ruius, Dragos, “Learning from Information Security History”, IEEE Security & Privacy, January/February 2006, pp. 77–79
Rush, Jonathan J., “The “Social Engineering” of Internet Fraud”, http://www.isoc.org/inet99/proceedings/3g/3g_2.htm
Schneier, Bruce (2004), “Secrets & Lies. Digital Security in a Networked World”, Wiley 2004
Schneier, Bruce (2007), “Security in ten years”, http://www.schneier.com/blog/archives/2007/12/secu-rity_in_ten.html, 3.12.2007
Shirky, Clay, “A Group Is Its Own Worst Enemy”, Speech a ETech, April, 2003, http://wwwshirkycom/writings/group_enemyhtml
Spinello, Richard A.; Tavani, Herman, T., “Cybertechnology, Ethical Concepts, and Methodologi-cal Frameworks: An Introduction to Cyberethics”, Richard A. Spinello and Herman T. Tavani, (eds.), “Readings in Cyberethics”, 2nd ed, Jones and Bartlett Publishers, 2004, pp. 1–12
Vaes, Jeroen; Paladino, Maria-Paola; Leyens, Jacques-Philippe, “The lost e-mail: Prosocial reactions induced by uniquely human emotions”, Britisch Journal of Social Psychology, Vol. 41, 2002, pp. 521–534
Vanderbeeken, Mark, “Taking a Broader View of the Human Experience”, Interactions, March/April 2009, pp. 54–57
Walsham, Geoff, “Ethical theory, codes of ethics and IS practice”, Information Systems Journal, Vol. 6, 1996, pp. 69-81
Whitson, Jennifer, “Identity Theft and the Challenges of Caring for your Virtual Self, Interactions, March/April 2009, pp. 41–45
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2010 Vieweg+Teubner | GWV Fachverlage GmbH
About this chapter
Cite this chapter
Degenhardt, W., Wiele, J. (2010). Social Engineering hits Social Commerce. In: Pohlmann, N., Reimer, H., Schneider, W. (eds) ISSE 2009 Securing Electronic Business Processes. Vieweg+Teubner. https://doi.org/10.1007/978-3-8348-9363-5_16
Download citation
DOI: https://doi.org/10.1007/978-3-8348-9363-5_16
Publisher Name: Vieweg+Teubner
Print ISBN: 978-3-8348-0958-2
Online ISBN: 978-3-8348-9363-5
eBook Packages: Computer ScienceComputer Science (R0)