Academic literature on the topic 'E-commerce security concerns'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'E-commerce security concerns.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "E-commerce security concerns"

1

Saeed, Saqib. "A Customer-Centric View of E-Commerce Security and Privacy." Applied Sciences 13, no. 2 (January 11, 2023): 1020. http://dx.doi.org/10.3390/app13021020.

Full text
Abstract:
Business organizations have huge potential to increase their customer base by offering e-commerce services, especially in the post-pandemic era. Ensuring secure e-commerce applications plays an important role in increasing customer base. To develop appropriate policies and secure technological infrastructures, business organizations first need to establish an understanding of the reservations of their customers toward e-commerce, as well as their perception of security and privacy of e-commerce applications. In this paper, we present the results of an empirical study of e-commerce customers conducted in Pakistan to gain an insight into their mindset on using e-commerce applications. An online questionnaire was set up to collect data, which were analyzed using the partial least squares method with SmartPLS software. The empirical findings highlight that customers’ concerns about credit card usage, concerns over information security, motivational factors for shopping offered by business organizations, customer trustworthiness, and user’s feelings about the reputation of e-commerce impact their perception of security of online data and trust in an e-commerce application. The results of this study can help organizations in Pakistan to develop policies and improve technological infrastructures by adopting emerging technologies and digital forensics.
APA, Harvard, Vancouver, ISO, and other styles
2

Gurung, Anil, and M. K. Raja. "Online privacy and security concerns of consumers." Information & Computer Security 24, no. 4 (October 10, 2016): 348–71. http://dx.doi.org/10.1108/ics-05-2015-0020.

Full text
Abstract:
Purpose Privacy and security concerns of consumers have been touted as one of the hindrances to the growth of e-commerce. These concerns increase the risk perception of consumers. Understanding the consequences of privacy and security concerns and their relationship to risk perceptions may provide a solution. The relationship between privacy and security is investigated using the theory of planned behavior. The study aims to examine the relationship of trust, privacy and security concerns to the risk perception adoption of e-commerce. The results from a survey validate the model. Design/methodology/approach Data were collected using survey from undergraduate business students. The respondents were requested to select a specific product that they plan to purchase in the next six months. After selecting a product, the respondents were requested to report an online company that they have recently visited which offers the selected product. The respondents were requested to fill out the survey with regard to their selected online company. Time given was approximately 20 min. Findings The results suggest that privacy and security concerns and trust beliefs had effects on risk perception. Among these effects, trust had the largest effect followed by privacy and security concerns. Furthermore, risk perception and trust beliefs had effects on attitude. The effect of trust beliefs on attitude was larger than the effect of risk perception on attitude. Similarly, subjective norm, perceived behavioral control and attitude had a positive and direct effect on intention to be involved in e-commerce. Research limitations/implications The first limitation of this study is the use of student subjects. Because this study took place in an educational setting, its generalizability to the general population of consumers lacks to some degree. The second limitation of this study is mono-method bias. Practical implications The effect of privacy concerns on risk perception was larger than that of security concerns. Because the consumers get more experienced and sophisticated using the Web, the security concerns that they may have had at the beginning are not reflected in their risk perceptions. It is likely that they have adopted protective measures on their own to defend their privacy online. An example of such a measure would be providing false information to online companies when asked to submit personal information. Originality/value The major contributions of this study are developing and validating an integrative framework of e-commerce adoption at the individual level. The model includes privacy and security concerns, risk perception and trust beliefs. This study also highlighted the distinction of constructs of privacy and security concerns and showed their differential effects on other related constructs in the research model.
APA, Harvard, Vancouver, ISO, and other styles
3

Shaqrah, Amin A. "Antecedents of Security Pillars in E-Commerce Applications." International Journal of Business Data Communications and Networking 7, no. 1 (January 2011): 36–51. http://dx.doi.org/10.4018/jbdcn.2011010102.

Full text
Abstract:
This paper investigates the relationship between internet security and e-business competence at banking and exchange firms in Jordan. The proposed conceptual model examines the antecedents and consequences of e-business competence and tests its empirical validity. The sample of 152 banking and exchange firms tests the posited structural equation model. The results consistently support the validity of the proposed conceptual model, the results also found that organizations realize the importance of e- business and are willing to proceed further with e-business. Beyond concerns about internet security, their awareness of security hazards and internet performance is minimal. The author concludes that the public awareness of ICT in general is low. In light of the data collected, the author makes recommendations for the interested authorities to improve e-business in Jordan.
APA, Harvard, Vancouver, ISO, and other styles
4

Mukhopadhyay, Abhijit. "E-commerce Trade and Data Localization: A Developing Country Perspective." International Organisations Research Journal 15, no. 3 (November 1, 2020): 153–75. http://dx.doi.org/10.17323/1996-7845-2020-03-06.

Full text
Abstract:
This article explores the issue of data localization by capturing all relevant debates and discussion around it. It investigates issues related to data management, storage, and ownership, followed by the data safety and security concerns of developing countries in a rapidly changing digital world. Storing data locally can be an effective way to tackle these concerns. Data localization can bring the data storing market price down. It can inject sufficient incentive to spur technological innovation in the system. If workable templates of data safety and privacy frameworks can be built locally, consumers’ rights will also be protected. Data localization also has the potential to positively contribute to effective redressal of damages in developing countries related to data leakage. The COVID-19 pandemic has considerably sharpened existing conflicts in the e-commerce ecosystem. Treating this crisis as an opportunity and pushing for digital data safety and security by means of data localization is the ideal strategy for developing and emerging economies to adopt.
APA, Harvard, Vancouver, ISO, and other styles
5

Zolait, Ali Hussein Saleh, Abdul Razak Ibrahim, and Ahmad Farooq. "A Study on the Internet Security and its Implication for E-Commerce in Yemen." International Journal of Technology Diffusion 1, no. 3 (July 2010): 34–47. http://dx.doi.org/10.4018/jtd.2010070102.

Full text
Abstract:
This study examines the use of the Internet for business purposes in Yemen, where main sectors of banking and private trade organizations are observed. Through interviews, a thorough study is performed concerning the Internet facilities available in Yemen, the literacy and use of Information Communication Technology (ICT) in organizations, the level of e-commerce adopted, the main hurdles in the adoption of e-commerce, and measures required to increase the adoption of e-commerce. The study finds that both organizations realize the importance of e-commerce for their business. The main causes in the delay of e-commerce adoption by some are the discrepancies in the infrastructure, high costing of the Internet facilities, bureaucratic hurdles in obtaining the facilities, and the non-availability of a secure environment. Beyond concerns about Internet security, their awareness of security hazards and protection measures is minimal. In light of the data collected, the study has come up with certain recommendations for the interested authorities to improve e-commerce in Yemen.
APA, Harvard, Vancouver, ISO, and other styles
6

Ghazali, Osman, Chun Yang Leow, Shahzad Qaiser, Nanthini Pattabiraman, Sathiyaroobaa Vasuthevan, Eman Mohamed Abdusalam, and Mustafa M. Barakat. "Cloud-Based Global Online Marketplaces Review on Trust and Security." International Journal of Interactive Mobile Technologies (iJIM) 13, no. 04 (April 10, 2019): 96. http://dx.doi.org/10.3991/ijim.v13i04.10523.

Full text
Abstract:
Customer disposition to data, nature of the information on site, protection<strong> </strong>concerns, trust, security concerns, and the notoriety of organization efficaciously affect the trust of Internet shoppers in the site. Two noteworthy and basic issues for e-commerce sites and consumers are trust as well as security. A belief that someone is good and honest and will not harm you, or something is safe and reliable is called trust; while security is an attempt to safeguard the data from unauthorized access. Information security is a vital management as well as technical requirement over the internet for effective and secure payment transaction activities. The safety of e-commerce resources from use, destruction, unauthorized access and alteration is known as E-commerce security so there is an urgent need to study its dimensions such as authenticity, integrity, availability, privacy, confidentiality and non-repudiation. This paper reports a review of four popular online marketplaces which are Alibaba, Amazon, eBay andTaoBao as case study on two main criteria namely building trust among users and ensuring security on the platform. Furthermore, we discuss the methods being used by each online marketplace to build trust and their unique way ofimproving the security. Finally, different ways of building trust and technique to ensure the security is presented in a tabular form for each online marketplace.
APA, Harvard, Vancouver, ISO, and other styles
7

Udo, Godwin J. "Privacy and security concerns as major barriers for e‐commerce: a survey study." Information Management & Computer Security 9, no. 4 (October 2001): 165–74. http://dx.doi.org/10.1108/eum0000000005808.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Tangka, George Morris William, Ellie Ophelia Delviolin, and Hsien-Ming Chou. "ZERO-KNOWLEDGE PROOF APPLICATION IN ECOMMERCE PAYMENT." Indonesian Scholars Scientific Summit Taiwan Proceeding 4 (August 17, 2022): 69–75. http://dx.doi.org/10.52162/4.2022162.

Full text
Abstract:
E-commerce plays a significant role in a country's economic condition. Since the COVID-19 outbreak, it has become more popular, along with concerns about its ability to handle information security. The Zero-Knowledge Proof (ZKP) method could be a possible solution to the e-commerce payment security issue that hampers customer trust. This paper investigates the viability of an online payment framework based on the ZPK method. This method is an upgrade for authentication during the payment process in online shopping. Experiments on customers' perspectives of the payment framework based on the ZKP method were conducted and supported the perceived usefulness, ease of use, trust, control, satisfaction, and loyalty aspects of a better e-commerce website. It allows advantages for both customers and e-commerce and prevents fraud, which will increase the trust level for both sides. zkSNARK speeds up and lowers the cost of the process, but there is a risk of DOS. Future work needs to be done to handle DOS in this method.
APA, Harvard, Vancouver, ISO, and other styles
9

Kim, Sang Soo. "Purchase Intention in the Online Open Market: Do Concerns for E-Commerce Really Matter?" Sustainability 12, no. 3 (January 21, 2020): 773. http://dx.doi.org/10.3390/su12030773.

Full text
Abstract:
This study aims to investigate motivational factors and motivation hindering factors of online shopping via online open market platforms. For a comprehensive exploration, the response data were collected from a total of 417 Korean consumers before conducting a hierarchical regression analysis. The results showed that the effects of motivation factors on purchasing intention were all supported. As for moderating effects of concerns for e-commerce, privacy concerns by time saving, perceived ease of use, and security concerns by cost saving were found to be statistically significant. Privacy concerns by cost saving and business integrity concerns by time saving were also found to be statistically significant, but had a positive effect as opposed to an initial prediction. The finding denotes that, in order to reduce concerns for e-commerce, consumers may prefer using the online shops they can trust based on their previous shopping experience. Various concerns identified and analyzed in this study are clues to better understanding what potentially motivates or obstructs consumers to shop online, thereby helping businesses thrive in the online open market.
APA, Harvard, Vancouver, ISO, and other styles
10

Trivedi, Shrawan Kumar, and Mohit Yadav. "Predicting online repurchase intentions with e-satisfaction as mediator: a study on Gen Y." VINE Journal of Information and Knowledge Management Systems 48, no. 3 (August 13, 2018): 427–47. http://dx.doi.org/10.1108/vjikms-10-2017-0066.

Full text
Abstract:
Purpose Shopping online is a fast-growing phenomenon. A look into the rapid exponential growth of the primary players in this sector shows huge market potential for e-commerce. Given the convenience of internet shopping, e-commerce is seen as an emerging trend among consumers, specifically the younger generation (Gen Y). The popularity of e-commerce and online shopping has captured the attention of e-retailers, encouraging researchers to focus on this area. This paper aims to examine the relationship between online repurchase intention and other variables such as security, privacy concerns, trust and ease of use (EOU), mediated by e-satisfaction. Design/methodology/approach A self-administered survey method is used, and students aged between 20 and 35 years at universities in northern India are selected as subjects. To test the hypotheses of this study, an online questionnaire is distributed to participants, with 309 legitimate responses received. The data are analyzed using SPSS version 20.0 and AMOS version 20.0. Structural equation modeling is used to examine the model and to test the hypotheses. Findings The results of this study show that security, privacy concerns, trust and EOU have a positive significant relationship with repurchase intention. The findings also reveal that e-satisfaction has a full mediation effect between security and repurchase intention and also between trust and repurchase intention. In addition, a partial mediation effect of e-satisfaction is noted between EOU and repurchase intention and between privacy concerns and repurchase intention. Practical implications The results show that security, trust, EOU and privacy concerns are the factors that have most impact on consumer purchasing behavior. In terms of the repurchase intention of Gen Y consumers, what is needed are strong security features, an easy-to-use interface, a trusted privacy policy and the creation of trust. Furthermore, it may be beneficial to observe e-satisfaction as a mediator when identifying potential problems; online satisfaction is important for the group in this study, and the results show that it impacts on the relation between repurchase intention and other factors. Social implications In terms of the repurchase intention of Gen Y consumers, what is needed are strong security features, an easy-to-use interface, a trusted privacy policy and the creation of trust. Furthermore, it may be beneficial to observe e-satisfaction as a mediator when identifying potential problems; online satisfaction is important for the group in this study, and the results show that it impacts on the relation between repurchase intention and other factors. Originality/value This research determines the impact of security, privacy concerns, EOU and trust on the online repurchasing behavior of Gen Y in India. The mediation effect of e-satisfaction is also determined.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "E-commerce security concerns"

1

Vasileiadis, Alexios. "Security concerns and trust in the adoption of m-commerce." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2014. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2014~D_20140113_131752-55666.

Full text
Abstract:
This work is of theoretical and practical importance, that is, generation of new knowledge associated with mobile commerce adoption in terms of security concerns and trust which will help not only future researchers but also e-businesses. Despite the fact researchers have examined the adoption of m-commerce in a holistic way, the author found there was no research focusing solely and in-depth on the determinants of trust and perceived risk. The problem was to examine how the above determinants affect the intention to adopt m-commerce. The objects are mobile commerce, security concerns and trust. The purpose of this study is twofold, namely, empirical and explanatory. As for the objectives, it was necessary to review the literature, propose a research model, analyze the results, and verify or reject the proposed hypotheses. When it comes to the hypotheses, there was a test on whether trust, perceived risk, perceived usefulness, and perceived ease of use negatively or positively affect the constructs of the proposed model. The author used theoretical and empirical collection methods. As for the theoretical ones, analogy, generalization and modeling methods were used. Concerning the empirical ones, due to the fact that quantitative approach was chosen, a survey instrument, that is, questionnaire was used. After the results had been collected, SPSS 22 was used to perform descriptive data analysis of Likert summative scales. At last, the results along with the research limitations... [to full text]
Šio darbo teorinė ir praktinė svarba yra naujų žinių, susijusių su saugumo ir pasitikėjimo problemų sprendimais mobilios komercijos kontekste, kūrimas kuris pasitarnaus ne tik mokslinei bendruomenei, bet ir e-verslui. Nepaisant to, jog mobilios komercijos įsisavinimas plačiai analizuotas holistiniu požiūriu, magistrinio darbo autorius nerado atliktų išsamių tyrimų išsamiau aptariančių pasitikėjimo ir saugumo veiksnių poveikio mobilios komercijos kontekste. Darbo problema formuluojama, kaip patikimumo ir saugumo veiksniai daro įtaką mobilios komercijos įsisavinimui. Tiriamieji objektai yra mobili komercija, saugumas ir patikimumas. Šio tyrimo tikslas yra dvejopas: empirinis ir aiškinamasis. Siekiant tyrimo tikslo, buvo išstudijuota literatūra, pasiūlytas mokslinio tyrimo modelis, išanalizuoti rezultatai ir įvertintos suformuluotos hipotezės. Mokslinio tyrimo eigoje autorius panaudojo teorinius ir empirinius duomenų analizės ir rinkimo metodus. Teorinėje dalyje buvo panaudoti panašumo, apibendrinimo ir modeliavimo metodai. Empirinėje dalyje įgyvendintas kiekybinis tyrimas, duomenys renkami apklausos būdu struktūruoto klausimyno pagalba. Surinkti duomenys apdoroti SPSS aplinkoje atliekant aprašomųjų duomenų analizę pagal Likerto suminių vertinimo skales. Galutinis šio tyrimo tikslas buvo patikrinti suformuluotas hipotezes. Kalbant apie išvadas, privatumo rizikos suvokimas, mobilių mokėjimų, mobilios komercijos įstatymų ir gaunamų produktų kokybė turėjo neigiamą įtaką mobilios... [toliau žr. visą tekstą]
APA, Harvard, Vancouver, ISO, and other styles
2

(14009941), Wanpiti Fangrith. "Development of e-commerce strategies derived from a responsive security confidence to optimize online trading activity in Thailand." Thesis, 2011. https://figshare.com/articles/thesis/Development_of_e-commerce_strategies_derived_from_a_responsive_security_confidence_to_optimize_online_trading_activity_in_Thailand/21397632.

Full text
Abstract:

Security of online transactions is a key factor that affects a potential buyer's decision to make purchases online. In Thailand, security has been identified as the main reason for consumers' reluctance in purchasing products online. E-commerce rates in Thailand are considerably lower than those of other countries in the same region. However, this could be interpreted as a potential for e-commerce growth in Thailand. This study aims to identify the main factors affecting the low rates of e-commerce activity in Thailand and explores the social and cultural aspects of online shoppers here. Through a survey of Thais who shop online, this research aims to understand consumers' behaviours and their opinions relevant to security of online transactions. The research employs a qualitative approach and a questionnaire survey to collect pertinent data.

Results show a strong association between confidence in online security and the number of potential online buyers. E-commerce in Thailand can grow fully when appropriate security strategies have been developed. This can make potential buyers more confident about making online purchases. This finding has been confirmed using knowledge from across disciplines. Mathematical equations (adding test value, recalculating and mathematically reconstructing the data structure) and the laws of physics have been used to help explain this social behaviour as a conceptual idea of Mode-2 society. Following an in depth, trans-disciplinary analysis of the research data, some recommendations for the online industry and government entities have also been presented. The findings of the study and its recommendations focus on online trading activity can help in reducing fear or reluctance associated with online transactions among Internet users in Thailand and possibly leads to an increase in revenues from online shopping for the country.

APA, Harvard, Vancouver, ISO, and other styles
3

Abedi, Fahimeh. "Universal standards for the concepts of fairness, trust and security in online dispute resolution in B2C e-disputes." Thesis, 2017. https://vuir.vu.edu.au/35013/.

Full text
Abstract:
The Internet has created a global marketplace, where consumers can purchase goods and services. For online purchases, disputes can occur and are called electronic commerce disputes (e-disputes). The need for an appropriate jurisdiction for e-disputes has resulted in the development of Online Dispute Resolution (ODR), a mechanism for resolving these disputes through the internet. Currently, there is no universal agreement about the concepts of procedural fairness, trust and security in ODR systems, although these issues have been widely discussed in the field of Alternative Dispute Resolution (ADR). This research aimed to develop a set of standards, so that e-commerce users have faith in the fairness, security, and trust of ODR systems.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "E-commerce security concerns"

1

Svantesson, Dan Jerker B. Solving the Internet Jurisdiction Puzzle. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198795674.001.0001.

Full text
Abstract:
Internet jurisdiction has emerged as one of the greatest and most urgent challenges online, severely affecting areas as diverse as e-commerce, data privacy, law enforcement, content take-downs, cloud computing, e-health, Cyber security, intellectual property, freedom of speech, and Cyberwar. In this innovative book, Professor Svantesson presents a vision for a new approach to Internet jurisdiction––for both private international law and public international law––based on sixteen years of research dedicated specifically to the topic. The book demonstrates that our current paradigm remains attached to a territorial thinking that is out of sync with our modern world, especially, but not only, online. Having made the claim that our adherence to the territoriality principle is based more on habit than on any clear and universally accepted legal principles, Professor Svantesson advances a new jurisprudential framework for how we approach jurisdiction. He also proposes several other reform initiatives such as the concept of ‘investigative jurisdiction’ and an approach to geo-blocking, aimed at equipping us to solve the Internet jurisdiction puzzle. In addition, the book provides a history of Internet jurisdiction, and challenges our traditional categorisation of different types of jurisdiction. It places Internet jurisdiction in a broader context and outlines methods for how properly to understand and work with rules of Internet jurisdiction. While Solving the Internet Puzzle paints a clear picture of the concerns involved and the problems that needs to be overcome, this book is distinctly aimed at finding practical solutions anchored in a solid theoretical framework.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "E-commerce security concerns"

1

Donmaz, Ayşegül. "Privacy Policy and Security Issues in E-Commerce for Eliminating the Ethical Concerns." In Accounting, Finance, Sustainability, Governance & Fraud: Theory and Application, 153–64. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8062-3_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Karson, Eric J. "Exploring a Valid and Reliable Scale of Consumer Privacy and Security Concerns on the Internet and their Implications for E-Commerce." In Developments in Marketing Science: Proceedings of the Academy of Marketing Science, 104–9. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-11882-6_36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Durowoju, Olatunde Amoo. "Rationalising the Security Concern of Cloud Enabled E-commerce in the Supply Chain Context." In E-commerce Platform Acceptance, 41–57. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-06121-4_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Malik, Shah Rukh, Mujahid Rafiq, and Muhammad Ahmad Kahloon. "Cloud Security in E-Commerce Applications." In Research Anthology on E-Commerce Adoption, Models, and Applications for Modern Business, 1720–32. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-8957-1.ch085.

Full text
Abstract:
In this chapter, the authors focus on the most fundamental barrier in the e-commerce application's adoption: security. The most significant or important aspect to explore in cloud computing is how to keep the data secure in the most efficient way with cutting-edge technologies. Cloud computing has taken its place by providing its convenient services like on-demand service, pay-per-use, rapid elasticity, resource pooling, and other lucrative facilities. In this chapter, the authors will firstly describe the introduction related to cloud computing, major characteristics, types, and a few security concerns and issues in cloud computing. Furthermore, they discuss the introduction of e-commerce applications, how it is interlinked with cloud computing, and what the possible threats are. Moreover, what the possible solutions could be are discussed, so that we can secure data on both user side as well as on the server side. The authors suggest some existing solutions at the end of the chapter.
APA, Harvard, Vancouver, ISO, and other styles
5

Malik, Shah Rukh, Mujahid Rafiq, and Muhammad Ahmad Kahloon. "Cloud Security in E-Commerce Applications." In Cloud Computing Applications and Techniques for E-Commerce, 50–67. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-1294-4.ch003.

Full text
Abstract:
In this chapter, the authors focus on the most fundamental barrier in the e-commerce application's adoption: security. The most significant or important aspect to explore in cloud computing is how to keep the data secure in the most efficient way with cutting-edge technologies. Cloud computing has taken its place by providing its convenient services like on-demand service, pay-per-use, rapid elasticity, resource pooling, and other lucrative facilities. In this chapter, the authors will firstly describe the introduction related to cloud computing, major characteristics, types, and a few security concerns and issues in cloud computing. Furthermore, they discuss the introduction of e-commerce applications, how it is interlinked with cloud computing, and what the possible threats are. Moreover, what the possible solutions could be are discussed, so that we can secure data on both user side as well as on the server side. The authors suggest some existing solutions at the end of the chapter.
APA, Harvard, Vancouver, ISO, and other styles
6

Kaushik, Shweta, and Charu Gandhi. "Security for the Cloud." In Cloud Computing Applications and Techniques for E-Commerce, 68–83. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-1294-4.ch004.

Full text
Abstract:
Today's people are moving towards the internet services through cloud computing to acquire their required service, but they have less confidence about cloud computing because all the tasks are handled by the service provider. Cloud system provides features to the owner to store their data on some remote locations and allow only authorized users to access their data according to their access capability. Data security becomes particularly serious in the cloud computing environment because data are scattered in different machines and storage devices including servers, PCs, and various mobile devices such as smart phones. To make the cloud computing be adopted by enterprise, the security concerns of users should be rectified first to make cloud environment trustworthy. The trustworthy environment is the basic prerequisite to win the confidence of users to adopt this technology. However, there are various security concerns that need to be taken care of regarding the trust maintenance between various parties, authorized access of confidential data, data storage privacy, and integrity.
APA, Harvard, Vancouver, ISO, and other styles
7

Smith, Alan D., and Allen R. Lias. "Identity Theft and E-Fraud as Critical CRM Concerns." In Information Security and Ethics, 3094–111. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-937-3.ch207.

Full text
Abstract:
Fraud and identity theft have been increasing with the use of e-commerce. In the U.S. alone, it has been estimated that victims may spend on average $1,500 in out-of-pocket expenses and an average of 175 hours in order to resolve the many problems caused by such identity thieves. Organizations that engage in e-commerce as a large part of their business need to protect their customers against these crimes. An empirical study of 75 managerial employees and/or knowledge workers in five large organizations in Pittsburgh, Pennsylvania, revealed a number of interesting facts about how much information they share with others, what the likelihood is that they will conduct business online, and whether or not they take steps to protect their personal identity and credit. Model construction and implications were generated concerning steps that employees and customers may take to avoid identity theft.
APA, Harvard, Vancouver, ISO, and other styles
8

Rahman, Mohammad Mahfuzur, and Karim Mohammed Rezaul. "Information Security Management." In Threats, Countermeasures, and Advances in Applied Information Security, 66–90. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0978-5.ch004.

Full text
Abstract:
The expansion of electronic commerce (E-commerce) has become an increasing reality due to Internet’s rapid growth during the last few years. E-commerce is growing at an exceptional rate with more organizations offering their goods and services online every day. Importantly, this growth is being matched by the number of people gaining access to the Internet in a variety of ways. E-commerce offers opportunities as well as threats. Information is crucial for any organization, especially in the e-market. The lack of an effective and trusted payment system that can be used in combination with online shopping has been limiting factor in the growth of Internet sales. Consumers are hesitant to provide personal information, including credit card details, over the Internet because of high perception of risk and concerns with privacy. Establishment of Information Security System can minimize the threats and risks. Technology can play an important role in intensifying trust in the information society and securing consumer rights. E-commerce will not be successful without protecting the consumers’ rights, especially in the area of information security. The research highlights the relevant theories of information security within the e-commerce sectors, including identifying and investigating the problems.
APA, Harvard, Vancouver, ISO, and other styles
9

Shaqrah, Amin A. "Antecedents of Security Pillars in E-Commerce Applications." In Web-Based Multimedia Advancements in Data Communications and Networking Technologies, 36–51. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2026-1.ch002.

Full text
Abstract:
This paper investigates the relationship between internet security and e-business competence at banking and exchange firms in Jordan. The proposed conceptual model examines the antecedents and consequences of e-business competence and tests its empirical validity. The sample of 152 banking and exchange firms tests the posited structural equation model. The results consistently support the validity of the proposed conceptual model, the results also found that organizations realize the importance of e- business and are willing to proceed further with e-business. Beyond concerns about internet security, their awareness of security hazards and internet performance is minimal. The author concludes that the public awareness of ICT in general is low. In light of the data collected, the author makes recommendations for the interested authorities to improve e-business in Jordan.
APA, Harvard, Vancouver, ISO, and other styles
10

Panko, Raymond R. "Security." In Managing Internet and Intranet Technologies in Organizations, 165–86. IGI Global, 2001. http://dx.doi.org/10.4018/978-1-878289-95-7.ch010.

Full text
Abstract:
Security is one of the fastest-growing concerns in e-commerce and intranets. This chapter describes a number of attacks that hackers may attempt against companies and the methods used to combat each attack. The chapter also describes integrated security systems (ISSs), which automatically secure communication between two parties, protecting them from a variety of network attacks. Finally, the chapter describes potential risks from lawsuits if a company fails to adequately secure its systems and losses result.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "E-commerce security concerns"

1

Neama, Ghadeer, Rana Alaskar, and Mohammad Alkandari. "Privacy, security, risk, and trust concerns in e-commerce." In ICDCN '16: 17th International Conference on Distributed Computing and Networking. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2833312.2850445.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Yang, Chunhua, and Jiancheng Wan. "An Approach to Separating Security Concerns in E-Commerce Systems at the Architecture Level." In 2008 International Symposium on Electronic Commerce and Security. IEEE, 2008. http://dx.doi.org/10.1109/isecs.2008.59.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mohajerani, Somayeh, Sharareh Zarean Shahrekordi, and Mitra Azarlo. "The impact of privacy and security concerns, trust in technology and information quality on trust in e -government and intention to use e-government." In 2015 9th International Conference on e-Commerce in Developing Countries: With focus on e-Business (ECDC). IEEE, 2015. http://dx.doi.org/10.1109/ecdc.2015.7156332.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Marino, Sonia, and Gabriella Duca. "User-Centred Design for QR Store: a Case Study." In Applied Human Factors and Ergonomics Conference. AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1001311.

Full text
Abstract:
This work describes the user centred design process of one of the first QR stores in Italy. Users related concerns in QR use and m-shopping experience have been surveyed, eliciting users’ expectations and needs for the effective and satisfactory use of the QR store to be designed. This has been achieved combining human factors reference data with studies on consumers behaviour buying in shopping malls and in m-commerce stores. Being the QR shopping a consumer experience happening in a multidimensional environment, multiple aspects of physical shops and environment, as well as of QR store app have been addressed during the design stage of the project, aiming at delivering: a) mobile interface of e-commerce service able to support effective and satisfactory buying tasks in public/crowded spaces, b) exhibition paths that match requirements of safety, security and trust in the m-commerce service and that, at the same time, represent an attraction element in environment, c) billboards for goods displaying, supporting ease of vision and information usability by both generic pedestrian flows and motivated customers. The paper also discusses the usability test in real environment to be conducted once the installation will be completed.
APA, Harvard, Vancouver, ISO, and other styles
5

Meinert, David, Dane Peterson, John Criswell, and Martin Crossland. "Would Regulation of Web Site Privacy Policy Statements Increase Consumer Trust?" In InSITE 2006: Informing Science + IT Education Conference. Informing Science Institute, 2006. http://dx.doi.org/10.28945/2952.

Full text
Abstract:
Proponents of e-commerce have known for some time that limited participation by consumers partially reflects their concern over the privacy of personal information. To address consumer concerns, web site operators have employed security mechanisms, including privacy policy statements to increase their perceived trustworthiness. While empirical evidence is limited, there is some question regarding the ability of privacy policy statements to engender significantly greater levels of trust. The limited effectiveness of such statements may reflect their voluntary implementation, self-enforcement, and\or significant variance (protection and enforcement) from one web site to another. One possible remedy would be the imposition of legally mandated statements. This study examined the efficacy of legally mandated privacy policies vis-a-vis both voluntary statements of varying degrees of protection and the absence of any such statement. The results were mixed, as legally mandated privacy policy statements were found to be comparable to strong voluntary statements, but superior to none, weak or moderate policies. Perhaps more important, the nature of the privacy policy statement interacted with type of information requested.
APA, Harvard, Vancouver, ISO, and other styles
6

Caftori, Netiva, and Steve Teicher. "Information Privacy Issues in the Information Age." In 2002 Informing Science + IT Education Conference. Informing Science Institute, 2002. http://dx.doi.org/10.28945/2452.

Full text
Abstract:
Information privacy is the primary issue discussed in the majority of papers about e-commerce security. We observed and confirmed from literature that while privacy is a voiced concern of consumers, it is not the insurmountable barrier to doing business. There are other information accuracy and operational issues that add or detract from consumer experience. We will discuss these using real-life anecdotes.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography