This document discusses security in e-commerce. It outlines key security requirements like confidentiality, integrity, availability, and authenticity. It also discusses common security threats like hacking, viruses, and denial of service attacks. The document examines security protocols like SSL that provide encryption, authentication, and integrity. It explores tensions between security and other values. Finally, it analyzes technologies that can enhance e-commerce security, such as encryption, firewalls, and digital signatures.