Skip to main content

Abstract

Looking at social commerce, a bunch of bewildering phenomena attracts the attention of social psychologists. The way customers participate today shows attitudes and ethical behavior which cannot be explained from the inherent conditions of Web 2.0 environments alone. Fraud often succeeds, when you do not expect it, and honesty can be found under circumstances that do not support honesty at all. The current situation seems to result from customers assigning experience and ethics from real world business to virtual business environments. But there are indications that this situation may change. Social commerce could suffer as soon as customers would use its inherent weaknesses to their own advantage. The following article outlines first approaches to research into this topic.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Anderson, Ross; Moore, Tyler, “The Economics of Information Security”, Science, Vol. 314, 27.10.2006, pp. 610–613

    Article  Google Scholar 

  • Avison, David E.; Myers, Michael D., “Information systems and anthropology: an anthropological perspective of IT and organizational culture”, Information Technology & People, Vol. 8, No. 3, 1995, pp. 43–56

    Article  Google Scholar 

  • Bakan, Joel, “The Corporation. The Pathological Pursuit of Profit and Power”, Free Press 2004

    Google Scholar 

  • Fischbacher, Urs; Heusi, Franziska, (2008) “Lies in Disguise. An experimental study on cheating", Thurgau Institute of Economics, Research Paper No. 40, November 2008

    Google Scholar 

  • Flechais, Ivan; Riegelsberger, Jens; Sasse, Angela M., „Divide and Conquer: The Role of Trust and Assurance in the Design of Secure Socio-Technical Systems“,ACM Proceedings of the 2005 workshop on New security paradigms, pp. 33 – 41

    Google Scholar 

  • Franklin, Jason; Paxson, Vern; Perrig, Adrian; Savage, Stefan (2007), “An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants”, ACM CCS’07, October 29 – November 2, 2007

    Google Scholar 

  • Haidt, Jonathan, “The Emotional Dog and Its Rational Tail: A Social Intuitionist Approach to Moral Judgment”, Psychological Review, 2001, Vol. 108, No. 4, pp. 814–834

    Article  Google Scholar 

  • Harford, Tim, “The Undercover Economist”, Abacus 2007

    Google Scholar 

  • Kiely, Laree; Benzel, Terry V, “Systemic Security Management”, IEEE Security &Privacy, November/December 2006, pp. 74–77

    Google Scholar 

  • Kohlberg, Lawrence; Charles Levine, Alexandra Hewer (1983). “Moral stages : a current formulation and a response to critics”. Basel, NY: Karger, 1983

    Google Scholar 

  • Koskosas, Ioannis V; Paul, Ray J., “The Interrelationship and Effect of Culture and Risk Communica-tion in Setting Internet Banking Security Goals”, ACM ICEC’04, Sixth International Conference on Electronic Commerce, pp. 341–349

    Google Scholar 

  • Lakoff, George; Johnson, Mark, (2003) “Metaphors We Live By”, University of Chicago Press, 2003

    Google Scholar 

  • Langford, Duncan, Internet Ethics, Palgrave 2000

    Google Scholar 

  • Levitt, Steven D.; Dubner, Stephen J., “Freakonomics”, HarperCollins 2006

    Google Scholar 

  • Manske, Kurt, “An Introduction to Social Engineering”, Information Systems Security, November/December 2000, pp. 53–59

    Google Scholar 

  • Nass, Clifford; Moon, Youngme, “Machines and Mindlessness: Social Responses to Computers”, Journal of Social Issues, Vol. 56, No. 1, 2000, pp. 81–103

    Article  Google Scholar 

  • Nikitkov, Alex; Bay, Darlene, “Online Action Fraud: Ethical Perspective”, Journal of Business Ethics, Vol. 79, 2008, pp. 235–244

    Article  Google Scholar 

  • O’Neill, John, “Bank payment systems victim of elaborate social engineering scam“, http://www.back-upanytime.com/blog/2008/08/bank-payment-systems-victim-of-elaborate-social-engineering-scam/

  • Odlyzko, Andrew, “Economics, Psychology, and Sociology of Security”, Financial Cryptography: 7th International Conference, FC 2003, R. N. Wright, ed., Lecture Notes in Computer Science #2742, Springer, 2003, pp. 182–189

    Google Scholar 

  • Palfrey, John; Gasser, Urs, “Born Digital. Understanding the First Generation of Digital Natives”, Basic Books 2008

    Google Scholar 

  • Pavlou, Paul A.; Gefen, David, (2005) “Psychological Contract Violation in Online Marketplaces: An-tecedents, Consequences, and Moderating Role“, Information Systems Research, Vol. 16, No. 4, December 2005, pp. 372–399

    Article  Google Scholar 

  • Ruius, Dragos, “Learning from Information Security History”, IEEE Security & Privacy, January/February 2006, pp. 77–79

    Google Scholar 

  • Rush, Jonathan J., “The “Social Engineering” of Internet Fraud”, http://www.isoc.org/inet99/proceedings/3g/3g_2.htm

  • Schneier, Bruce (2004), “Secrets & Lies. Digital Security in a Networked World”, Wiley 2004

    Google Scholar 

  • Schneier, Bruce (2007), “Security in ten years”, http://www.schneier.com/blog/archives/2007/12/secu-rity_in_ten.html, 3.12.2007

  • Shirky, Clay, “A Group Is Its Own Worst Enemy”, Speech a ETech, April, 2003, http://wwwshirkycom/writings/group_enemyhtml

  • Spinello, Richard A.; Tavani, Herman, T., “Cybertechnology, Ethical Concepts, and Methodologi-cal Frameworks: An Introduction to Cyberethics”, Richard A. Spinello and Herman T. Tavani, (eds.), “Readings in Cyberethics”, 2nd ed, Jones and Bartlett Publishers, 2004, pp. 1–12

    Google Scholar 

  • Vaes, Jeroen; Paladino, Maria-Paola; Leyens, Jacques-Philippe, “The lost e-mail: Prosocial reactions induced by uniquely human emotions”, Britisch Journal of Social Psychology, Vol. 41, 2002, pp. 521–534

    Article  Google Scholar 

  • Vanderbeeken, Mark, “Taking a Broader View of the Human Experience”, Interactions, March/April 2009, pp. 54–57

    Google Scholar 

  • Walsham, Geoff, “Ethical theory, codes of ethics and IS practice”, Information Systems Journal, Vol. 6, 1996, pp. 69-81

    Article  Google Scholar 

  • Whitson, Jennifer, “Identity Theft and the Challenges of Caring for your Virtual Self, Interactions, March/April 2009, pp. 41–45

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Norbert Pohlmann Helmut Reimer Wolfgang Schneider

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Vieweg+Teubner | GWV Fachverlage GmbH

About this chapter

Cite this chapter

Degenhardt, W., Wiele, J. (2010). Social Engineering hits Social Commerce. In: Pohlmann, N., Reimer, H., Schneider, W. (eds) ISSE 2009 Securing Electronic Business Processes. Vieweg+Teubner. https://doi.org/10.1007/978-3-8348-9363-5_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-8348-9363-5_16

  • Publisher Name: Vieweg+Teubner

  • Print ISBN: 978-3-8348-0958-2

  • Online ISBN: 978-3-8348-9363-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics