Question. 1 Marks
10
You must visit
each of the websites below and place them into one of the four E-commerce business model (s)
according to their primary focus:
Website |
E-commerce business model |
www.tradekey.com |
B2B (Business-to-Business) |
www.airbnb.com |
P2P (Peer-to-Peer) |
www.nike.com |
B2C (Business-to-Consumer) |
www.apple.com |
B2C (Business-to-Consumer) |
www.olx.com |
C2C
(Consumer-to-Consumer) |
Question.
2 Marks
05
Zarkam is a social media user who notices that a
stranger has been commenting on all of her posts and sending him private
messages, despite the fact that he doesn't know the person. At first, the
comments are harmless, but they gradually become more personal and threatening,
with the stranger making explicit references to Zarkam’s home, workplace, and
other personal details. Zarkam becomes increasingly frightened and feels like
he is being watched all the time.
Now
keeping in view, the above scenario, answer the following questions:
1. Mention the cyber-crime type(s), which are occurring
in the scenario.
2. Mention the category of cyber-crime.
3. Mention
any 2 possible prevention measures for such type of cyber-crimes.
Answer:
1.
The cyber-crime type(s)
occurring in the scenario are cyberstalking and online harassment.
2.
The category of cyber-crime is online harassment.
3.
Possible prevention measures for such types of
cyber-crimes are:
·
Limiting the personal information shared on social
media platforms: To avoid giving any unnecessary details about personal life,
one should limit the information shared on social media platforms and only
connect with people they know in real life.
·
Reporting and blocking the user: If someone is
making unwanted and threatening comments or messages, it is important to block
and report them to the social media platform's support team. This helps in
preventing further communication from the harasser.