Journal articles on the topic 'E-commerce security concerns'

To see the other types of publications on this topic, follow the link: E-commerce security concerns.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'E-commerce security concerns.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Saeed, Saqib. "A Customer-Centric View of E-Commerce Security and Privacy." Applied Sciences 13, no. 2 (January 11, 2023): 1020. http://dx.doi.org/10.3390/app13021020.

Full text
Abstract:
Business organizations have huge potential to increase their customer base by offering e-commerce services, especially in the post-pandemic era. Ensuring secure e-commerce applications plays an important role in increasing customer base. To develop appropriate policies and secure technological infrastructures, business organizations first need to establish an understanding of the reservations of their customers toward e-commerce, as well as their perception of security and privacy of e-commerce applications. In this paper, we present the results of an empirical study of e-commerce customers conducted in Pakistan to gain an insight into their mindset on using e-commerce applications. An online questionnaire was set up to collect data, which were analyzed using the partial least squares method with SmartPLS software. The empirical findings highlight that customers’ concerns about credit card usage, concerns over information security, motivational factors for shopping offered by business organizations, customer trustworthiness, and user’s feelings about the reputation of e-commerce impact their perception of security of online data and trust in an e-commerce application. The results of this study can help organizations in Pakistan to develop policies and improve technological infrastructures by adopting emerging technologies and digital forensics.
APA, Harvard, Vancouver, ISO, and other styles
2

Gurung, Anil, and M. K. Raja. "Online privacy and security concerns of consumers." Information & Computer Security 24, no. 4 (October 10, 2016): 348–71. http://dx.doi.org/10.1108/ics-05-2015-0020.

Full text
Abstract:
Purpose Privacy and security concerns of consumers have been touted as one of the hindrances to the growth of e-commerce. These concerns increase the risk perception of consumers. Understanding the consequences of privacy and security concerns and their relationship to risk perceptions may provide a solution. The relationship between privacy and security is investigated using the theory of planned behavior. The study aims to examine the relationship of trust, privacy and security concerns to the risk perception adoption of e-commerce. The results from a survey validate the model. Design/methodology/approach Data were collected using survey from undergraduate business students. The respondents were requested to select a specific product that they plan to purchase in the next six months. After selecting a product, the respondents were requested to report an online company that they have recently visited which offers the selected product. The respondents were requested to fill out the survey with regard to their selected online company. Time given was approximately 20 min. Findings The results suggest that privacy and security concerns and trust beliefs had effects on risk perception. Among these effects, trust had the largest effect followed by privacy and security concerns. Furthermore, risk perception and trust beliefs had effects on attitude. The effect of trust beliefs on attitude was larger than the effect of risk perception on attitude. Similarly, subjective norm, perceived behavioral control and attitude had a positive and direct effect on intention to be involved in e-commerce. Research limitations/implications The first limitation of this study is the use of student subjects. Because this study took place in an educational setting, its generalizability to the general population of consumers lacks to some degree. The second limitation of this study is mono-method bias. Practical implications The effect of privacy concerns on risk perception was larger than that of security concerns. Because the consumers get more experienced and sophisticated using the Web, the security concerns that they may have had at the beginning are not reflected in their risk perceptions. It is likely that they have adopted protective measures on their own to defend their privacy online. An example of such a measure would be providing false information to online companies when asked to submit personal information. Originality/value The major contributions of this study are developing and validating an integrative framework of e-commerce adoption at the individual level. The model includes privacy and security concerns, risk perception and trust beliefs. This study also highlighted the distinction of constructs of privacy and security concerns and showed their differential effects on other related constructs in the research model.
APA, Harvard, Vancouver, ISO, and other styles
3

Shaqrah, Amin A. "Antecedents of Security Pillars in E-Commerce Applications." International Journal of Business Data Communications and Networking 7, no. 1 (January 2011): 36–51. http://dx.doi.org/10.4018/jbdcn.2011010102.

Full text
Abstract:
This paper investigates the relationship between internet security and e-business competence at banking and exchange firms in Jordan. The proposed conceptual model examines the antecedents and consequences of e-business competence and tests its empirical validity. The sample of 152 banking and exchange firms tests the posited structural equation model. The results consistently support the validity of the proposed conceptual model, the results also found that organizations realize the importance of e- business and are willing to proceed further with e-business. Beyond concerns about internet security, their awareness of security hazards and internet performance is minimal. The author concludes that the public awareness of ICT in general is low. In light of the data collected, the author makes recommendations for the interested authorities to improve e-business in Jordan.
APA, Harvard, Vancouver, ISO, and other styles
4

Mukhopadhyay, Abhijit. "E-commerce Trade and Data Localization: A Developing Country Perspective." International Organisations Research Journal 15, no. 3 (November 1, 2020): 153–75. http://dx.doi.org/10.17323/1996-7845-2020-03-06.

Full text
Abstract:
This article explores the issue of data localization by capturing all relevant debates and discussion around it. It investigates issues related to data management, storage, and ownership, followed by the data safety and security concerns of developing countries in a rapidly changing digital world. Storing data locally can be an effective way to tackle these concerns. Data localization can bring the data storing market price down. It can inject sufficient incentive to spur technological innovation in the system. If workable templates of data safety and privacy frameworks can be built locally, consumers’ rights will also be protected. Data localization also has the potential to positively contribute to effective redressal of damages in developing countries related to data leakage. The COVID-19 pandemic has considerably sharpened existing conflicts in the e-commerce ecosystem. Treating this crisis as an opportunity and pushing for digital data safety and security by means of data localization is the ideal strategy for developing and emerging economies to adopt.
APA, Harvard, Vancouver, ISO, and other styles
5

Zolait, Ali Hussein Saleh, Abdul Razak Ibrahim, and Ahmad Farooq. "A Study on the Internet Security and its Implication for E-Commerce in Yemen." International Journal of Technology Diffusion 1, no. 3 (July 2010): 34–47. http://dx.doi.org/10.4018/jtd.2010070102.

Full text
Abstract:
This study examines the use of the Internet for business purposes in Yemen, where main sectors of banking and private trade organizations are observed. Through interviews, a thorough study is performed concerning the Internet facilities available in Yemen, the literacy and use of Information Communication Technology (ICT) in organizations, the level of e-commerce adopted, the main hurdles in the adoption of e-commerce, and measures required to increase the adoption of e-commerce. The study finds that both organizations realize the importance of e-commerce for their business. The main causes in the delay of e-commerce adoption by some are the discrepancies in the infrastructure, high costing of the Internet facilities, bureaucratic hurdles in obtaining the facilities, and the non-availability of a secure environment. Beyond concerns about Internet security, their awareness of security hazards and protection measures is minimal. In light of the data collected, the study has come up with certain recommendations for the interested authorities to improve e-commerce in Yemen.
APA, Harvard, Vancouver, ISO, and other styles
6

Ghazali, Osman, Chun Yang Leow, Shahzad Qaiser, Nanthini Pattabiraman, Sathiyaroobaa Vasuthevan, Eman Mohamed Abdusalam, and Mustafa M. Barakat. "Cloud-Based Global Online Marketplaces Review on Trust and Security." International Journal of Interactive Mobile Technologies (iJIM) 13, no. 04 (April 10, 2019): 96. http://dx.doi.org/10.3991/ijim.v13i04.10523.

Full text
Abstract:
Customer disposition to data, nature of the information on site, protection<strong> </strong>concerns, trust, security concerns, and the notoriety of organization efficaciously affect the trust of Internet shoppers in the site. Two noteworthy and basic issues for e-commerce sites and consumers are trust as well as security. A belief that someone is good and honest and will not harm you, or something is safe and reliable is called trust; while security is an attempt to safeguard the data from unauthorized access. Information security is a vital management as well as technical requirement over the internet for effective and secure payment transaction activities. The safety of e-commerce resources from use, destruction, unauthorized access and alteration is known as E-commerce security so there is an urgent need to study its dimensions such as authenticity, integrity, availability, privacy, confidentiality and non-repudiation. This paper reports a review of four popular online marketplaces which are Alibaba, Amazon, eBay andTaoBao as case study on two main criteria namely building trust among users and ensuring security on the platform. Furthermore, we discuss the methods being used by each online marketplace to build trust and their unique way ofimproving the security. Finally, different ways of building trust and technique to ensure the security is presented in a tabular form for each online marketplace.
APA, Harvard, Vancouver, ISO, and other styles
7

Udo, Godwin J. "Privacy and security concerns as major barriers for e‐commerce: a survey study." Information Management & Computer Security 9, no. 4 (October 2001): 165–74. http://dx.doi.org/10.1108/eum0000000005808.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Tangka, George Morris William, Ellie Ophelia Delviolin, and Hsien-Ming Chou. "ZERO-KNOWLEDGE PROOF APPLICATION IN ECOMMERCE PAYMENT." Indonesian Scholars Scientific Summit Taiwan Proceeding 4 (August 17, 2022): 69–75. http://dx.doi.org/10.52162/4.2022162.

Full text
Abstract:
E-commerce plays a significant role in a country's economic condition. Since the COVID-19 outbreak, it has become more popular, along with concerns about its ability to handle information security. The Zero-Knowledge Proof (ZKP) method could be a possible solution to the e-commerce payment security issue that hampers customer trust. This paper investigates the viability of an online payment framework based on the ZPK method. This method is an upgrade for authentication during the payment process in online shopping. Experiments on customers' perspectives of the payment framework based on the ZKP method were conducted and supported the perceived usefulness, ease of use, trust, control, satisfaction, and loyalty aspects of a better e-commerce website. It allows advantages for both customers and e-commerce and prevents fraud, which will increase the trust level for both sides. zkSNARK speeds up and lowers the cost of the process, but there is a risk of DOS. Future work needs to be done to handle DOS in this method.
APA, Harvard, Vancouver, ISO, and other styles
9

Kim, Sang Soo. "Purchase Intention in the Online Open Market: Do Concerns for E-Commerce Really Matter?" Sustainability 12, no. 3 (January 21, 2020): 773. http://dx.doi.org/10.3390/su12030773.

Full text
Abstract:
This study aims to investigate motivational factors and motivation hindering factors of online shopping via online open market platforms. For a comprehensive exploration, the response data were collected from a total of 417 Korean consumers before conducting a hierarchical regression analysis. The results showed that the effects of motivation factors on purchasing intention were all supported. As for moderating effects of concerns for e-commerce, privacy concerns by time saving, perceived ease of use, and security concerns by cost saving were found to be statistically significant. Privacy concerns by cost saving and business integrity concerns by time saving were also found to be statistically significant, but had a positive effect as opposed to an initial prediction. The finding denotes that, in order to reduce concerns for e-commerce, consumers may prefer using the online shops they can trust based on their previous shopping experience. Various concerns identified and analyzed in this study are clues to better understanding what potentially motivates or obstructs consumers to shop online, thereby helping businesses thrive in the online open market.
APA, Harvard, Vancouver, ISO, and other styles
10

Trivedi, Shrawan Kumar, and Mohit Yadav. "Predicting online repurchase intentions with e-satisfaction as mediator: a study on Gen Y." VINE Journal of Information and Knowledge Management Systems 48, no. 3 (August 13, 2018): 427–47. http://dx.doi.org/10.1108/vjikms-10-2017-0066.

Full text
Abstract:
Purpose Shopping online is a fast-growing phenomenon. A look into the rapid exponential growth of the primary players in this sector shows huge market potential for e-commerce. Given the convenience of internet shopping, e-commerce is seen as an emerging trend among consumers, specifically the younger generation (Gen Y). The popularity of e-commerce and online shopping has captured the attention of e-retailers, encouraging researchers to focus on this area. This paper aims to examine the relationship between online repurchase intention and other variables such as security, privacy concerns, trust and ease of use (EOU), mediated by e-satisfaction. Design/methodology/approach A self-administered survey method is used, and students aged between 20 and 35 years at universities in northern India are selected as subjects. To test the hypotheses of this study, an online questionnaire is distributed to participants, with 309 legitimate responses received. The data are analyzed using SPSS version 20.0 and AMOS version 20.0. Structural equation modeling is used to examine the model and to test the hypotheses. Findings The results of this study show that security, privacy concerns, trust and EOU have a positive significant relationship with repurchase intention. The findings also reveal that e-satisfaction has a full mediation effect between security and repurchase intention and also between trust and repurchase intention. In addition, a partial mediation effect of e-satisfaction is noted between EOU and repurchase intention and between privacy concerns and repurchase intention. Practical implications The results show that security, trust, EOU and privacy concerns are the factors that have most impact on consumer purchasing behavior. In terms of the repurchase intention of Gen Y consumers, what is needed are strong security features, an easy-to-use interface, a trusted privacy policy and the creation of trust. Furthermore, it may be beneficial to observe e-satisfaction as a mediator when identifying potential problems; online satisfaction is important for the group in this study, and the results show that it impacts on the relation between repurchase intention and other factors. Social implications In terms of the repurchase intention of Gen Y consumers, what is needed are strong security features, an easy-to-use interface, a trusted privacy policy and the creation of trust. Furthermore, it may be beneficial to observe e-satisfaction as a mediator when identifying potential problems; online satisfaction is important for the group in this study, and the results show that it impacts on the relation between repurchase intention and other factors. Originality/value This research determines the impact of security, privacy concerns, EOU and trust on the online repurchasing behavior of Gen Y in India. The mediation effect of e-satisfaction is also determined.
APA, Harvard, Vancouver, ISO, and other styles
11

Behera, Rajat Kumar, Abhaya Kumar Sahoo, and Ajay Jena. "A Resourceful Approach in Security Testing to Protect Electronic Payment System Against Unforeseen Attack." International Journal of Open Source Software and Processes 8, no. 3 (July 2017): 24–48. http://dx.doi.org/10.4018/ijossp.2017070102.

Full text
Abstract:
This article describes how electronic payments are financial transactions made over the internet for goods or services. In the digital era, the e-commerce industry has gone beyond the traditional in-store service due to the wide spread of internet-based shopping. Developed countries are greatly relying on e-commerce business and a sizable number of countries have shown concern in regard to the online payment cards such as credit cards, debit cards, e-cash, e-cheques, e-wallets and smart card security. The main downsides are concerns over privacy or a malicious attack and hence safeguard mechanisms are required to protect personal information from falling into the hands of intruders. Before commercializing electronic payment systems (EPS), security tests play a significant role in the software development life cycle to check whether the system is secure and it is safe to use. A resourceful approach covering security policies, secure coding, security attack prevention methodology, security testing tool, security testing metrics, security test case prioritization techniques and a model for effective project management methodology are presented in this article. Early detection and resolution of security weaknesses can be achieved with the authors' proposed approach and would certainly reduce the time, effort and cost of a project. The proposed approach is likely the best-fit implementation of the payment industry, covering channels like B2C (Business to Consumer), C2C (Consumer to Consumer), C2B (Consumer to Business), B2B (Business to Business), People to People (P2P), G2C (Government to Citizen) and C2G (Citizen to Government).
APA, Harvard, Vancouver, ISO, and other styles
12

Halaweh, Mohanad. "Users' Perception of Security for Mobile Communication Technology." International Journal of Information Security and Privacy 8, no. 3 (July 2014): 1–12. http://dx.doi.org/10.4018/ijisp.2014070101.

Full text
Abstract:
Security perception has been investigated by much research within the e-commerce and e-banking context. However, very little research has investigated this issue within the general mobile context without limiting this to particular applications such as payment, marketing, banking and commerce. Therefore, this paper aims to explore the users' perception of security towards mobile phones from a wide perspective. An interpretive-qualitative research was adopted to investigate the users' perceptions. The research results provided evidence for extending the meaning of the security perception concept to include human security as a relevant issue to mobile phone usage. It also showed that mobile phones can be used as an instrument to commit fraud and crimes. Furthermore, the results showed that the development of mobile technology raises new security and privacy concerns. For practical implications, this research provides recommendations for mobile technology designers to improve mobile usability- related issues in order to improve users' feeling of security
APA, Harvard, Vancouver, ISO, and other styles
13

Belkhamza, Zakariya, Mohd Adzwin Faris Niasin, and Sidah Idris. "The Effect of Privacy Concerns on the Purchasing Behavior among Malaysian Smartphone Users." International Journal of E-Services and Mobile Applications 8, no. 3 (July 2016): 38–52. http://dx.doi.org/10.4018/ijesma.2016070103.

Full text
Abstract:
The rise of e-commerce and m-commerce has brought the intention to the privacy concerns among mobile buyers, and studies showed that it is an important factor that affect attitude and intention to buy products or services through smartphones. The objective of this paper is to investigate the issue of privacy concerns on the attitude and purchasing intention among Malaysian smartphone users. This was performed by investigating the relationships between privacy concerns and attitude towards purchase, as well as between the privacy concerns and the intention to purchase using smartphone apps. The paper provides significant insights on the issue of privacy concerns in the usage of smartphones which can help developers such as Google and Apple to improve their apps stores to provide better protection for users' privacy and security in Malaysia.
APA, Harvard, Vancouver, ISO, and other styles
14

Miyazaki, Anthony D., and Ana Fernandez. "Internet Privacy and Security: An Examination of Online Retailer Disclosures." Journal of Public Policy & Marketing 19, no. 1 (April 2000): 54–61. http://dx.doi.org/10.1509/jppm.19.1.54.16942.

Full text
Abstract:
The Federal Trade Commission has declared the privacy and security of consumer information to be two major issues that stem from the rapid growth in e-commerce, particularly in terms of consumer-related commerce on the Internet. Although prior studies have assessed online retailer responses to privacy and security concerns with respect to retailers’ disclosure of their practices, these studies have been fairly general in their approaches and have not explored the potential for such disclosures to affect consumers. The authors examine online retailer disclosures of various privacy- and security-related practices for 17 product categories. They also compare the prevalence of disclosures to a subset of data from a consumer survey to evaluate potential relationships between online retailer practices and consumer perceptions of risk and purchase intentions across product categories.
APA, Harvard, Vancouver, ISO, and other styles
15

Muhammad, Mahmuda Mulia. "TRANSAKSI E-COMMERSE DALAM EKONOMI SYARIAH." El-Iqthisadi : Jurnal Hukum Ekonomi Syariah Fakultas Syariah dan Hukum 2, no. 1 (June 30, 2020): 76. http://dx.doi.org/10.24252/el-iqthisadi.v2i1.14021.

Full text
Abstract:
AbstractThe advancement of telecommunications, information and computer technology has led to changes in culture and the demands of everyday life, so that it has given birth to new patterns of relationships, including in the business world. One of its flagship media is through e-commerce (electronic commerce). The emergence of concerns about e-commerce transactions, especially the Islamic community in Indonesia, both from a security perspective and a sharia perspective. This paper aims to analyze e-commerce transactions in Islamic economics. The results of the analysis concluded that technically the transaction, both in the form of buying and selling services or goods, if the goods are delivered in a formidable form of non-digital, then e-commerce transactions can be analogous to the sale of al-salam, which has been prescribed from the beginning- the beginning of Islam through the Sunnah of the Holy Prophet. The use of e-commerce in Indonesia is permitted while the two parties understand each other. This article is also to provide general guidance about e-commerce users in running their business. Keywords: Bai 'as-salam, E-Commerce, Islamic Economics.AbstrakKemajuan teknologi telekomunikasi, informasi dan komputer, telah menyebabkan terjadinya perubahan kultur dan tuntutan hidup sehari-hari, sehingga telah melahirkan pola hubungan baru, di antaranya dalam dunia bisnis. Salah satu media andalannya adalah melalui e-commerce (electronic commerce). Munculnya kekhawatiran terhadap transaksi e-commerce khususnya masyarakat Islam di Indonesia, baik dari prespektif keamanan dan prespektif syariah. Tulisan ini bertujuan untuk menganalisis transaksi e-commerce dalam ekonomi syariah. Hasil analisis disimpulkan bahwa secara teknis transaksinya, baik dalam bentuk jual-beli jasa atau barang, kalau barang tersebut diserahkan secara tangguh karena berbentuk non digital, maka transaksi e-commerce dapat dianalogikan kepada jual-beli al-salam, yang telah disyariatkan semenjak awal mulanya Islam melalui Sunnah Nabi saw. Penggunaan e-commerce di Indonesia dibolehkan selagi antara kedua belah pihak saling paham. Artikel ini juga untuk memberikan panduan umum tentang pengguna e-commerce dalam menjalankan bisnisnya.Kata Kunci : Bai’ as-salam, E-Commerce, Ekonomi Syariah.
APA, Harvard, Vancouver, ISO, and other styles
16

Mubarak Alharbi, Ibraheem, Suzanne Zyngier, and Christopher Hodkinson. "Privacy by design and customers’ perceived privacy and security concerns in the success of e-commerce." Journal of Enterprise Information Management 26, no. 6 (October 14, 2013): 702–18. http://dx.doi.org/10.1108/jeim-07-2013-0039.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Becerril, Anahiby. "Cybersecurity and E-commerce in Free Trade Agreements." Mexican Law Review 13, no. 1 (July 2, 2020): 3. http://dx.doi.org/10.22201/iij.24485306e.2020.1.14808.

Full text
Abstract:
We are facing a digital age characterized by constant flows of goods and services, financial assets, people, information and communication. As a consequence, the world economy is increasingly connected, and digitalization has spread to such an extent that today’s world economy is a digital one, which has come to break down commercial barriers that the traditional economy and politics were unable to. Security and trade policy concerns are nothing new. However, given the electronic nature of commercial transactions (e-commerce), this has taken on a new and urgent importance. Cyberspace is a space of flows, a virtual space that grows every day with the transactions that take place through the use of ICT. Governments of many countries have begun to develop cybersecurity strategies, while trying to promote the benefits of a hyperconnected and cyber-enabled world. This article analyzes how e-commerce policies promote the protection of cyberspace. Specifically regarding e-commerce, care must be taken so that the cybersecurity strategy does not become an obstacle or constraint to such electronic transactions. The protection of cyberspace must be carried out with a multi-stakeholder approach. These issues are also of public interest since threats to cyberspace can affect entire countries and societies.
APA, Harvard, Vancouver, ISO, and other styles
18

Trivedi, Shrawan Kumar, and Mohit Yadav. "Repurchase intentions in Y generation: mediation of trust and e-satisfaction." Marketing Intelligence & Planning 38, no. 4 (February 21, 2020): 401–15. http://dx.doi.org/10.1108/mip-02-2019-0072.

Full text
Abstract:
PurposeResearch on online businesses has focused on the adoption of e-commerce and initial purchase behavior; repurchase intention and its antecedents remain underresearched. The present study develops an empirical model to explore the extent to which trust and e-satisfaction mediate the effect of vendor-specific attributes and customer intention to repurchase from the same online platform.Design/methodology/approachThe proposed model is tested and validated in the context of Generation Y in India. A self-administrated online survey was employed, and the students aged between 20 and 35 at universities in Northern India are selected as subject. The data is analyzed using SPSS 20.0 and AMOS 20.0, where structural equation modeling is used to examine the model and test the hypothesis.FindingsThe results of this study suggest that trust mediates fully between security concerns, privacy concerns, and repurchase intention. E-satisfaction mediates between security and ease of use (EOU).Practical implicationsThis study reveals the fact that security, EOU, and privacy concerns are the critical determinants that have the most impact on consumer's purchasing behavior. Gen Y consumers of India need some strong security features, an easy-to-use interface, a trusted privacy policy. Furthermore, it may be beneficial to observe e-satisfaction and trust as a mediator when identifying potential problems; online satisfaction is essential for the group in this study, and the results show that it impacts on the relation between repurchase intention and some determinant of repurchase intentions.Originality/valueThis research determines the impact of security, privacy concerns, EOU on the online repurchasing behavior of Gen Y in India. The mediation effect of e-satisfaction and trust has also been determined.
APA, Harvard, Vancouver, ISO, and other styles
19

Omotubora, Adekemi, and Subhajit Basu. "Regulation for E-payment Systems: Analytical Approaches Beyond Private Ordering." Journal of African Law 62, no. 2 (April 12, 2018): 281–313. http://dx.doi.org/10.1017/s0021855318000104.

Full text
Abstract:
AbstractTechnology-driven payment instruments and services are facilitating the development of e-commerce; however, security concerns beleaguer their implementation, particularly in developing countries. This article considers the limits of private ordering in the regulation of e-payment systems. It uses Nigeria to exemplify a developing country that is increasingly pushing for the adoption of a regulatory framework for e-payment systems based on private ordering. It argues that, although technical standards and self-regulation by the financial industry are important, law is an essential regulatory mechanism that is largely absent. The article proposes that law be used as a mechanism to set and compel compliance with technical and industry standards, thus building trust, catering to public interest concerns and legitimizing the regulatory process.
APA, Harvard, Vancouver, ISO, and other styles
20

Jaffar, Ako Abubakr, Mazen Ismaeel Ghareb, and Karzan Hussein Sharif. "The Challenges of Implementing E-Commerce in Kurdistan of Iraq." Journal of University of Human Development 2, no. 3 (August 31, 2016): 528. http://dx.doi.org/10.21928/juhd.v2n3y2016.pp528-533.

Full text
Abstract:
The Retailers all over the world are prospering from the burgeoning trend of online shopping. Kurdistan Regional Government is still struggling to grow its e-commerce markets. On the other hands e-commerce in Various countries in the Middle East have some of the world’s highest internet and mobile penetration rates. Alternative payments methods are quickly expanding, and having access to some of the world’s most coveted natural resources that allows countries in their region to have some of the highest GDP in the world. There are several challenges prevalent in the KRG Region market that will require international merchants to develop strategies based on innovation and vigilance. This unique region is plagued with complications many other countries have little to no experience with e-commerce, which highlights the need for retailers to have a deep understanding as to how this region operates before they can begin finding solutions. One of the biggest concerns today's consumers have is the risk of fraud when they are shopping online. With highly sophisticated malware and perceptive cybercriminals, customers' card and bank information can easily be stolen if a merchant does not take the proper security measures. In this paper we summarize all challenges need to be addressed in KRG in order to make correct steps to apply e-commerce in KRG. Finally, the recommendations and framework are proposed for e-commerce to encourage government, organizations, and people to take advantages from e-commerce.
APA, Harvard, Vancouver, ISO, and other styles
21

Ahmed Abbood, Alaa, Qahtan Makki Shallal, and Mohammed A. Fadhel. "Internet of things (IoT): a technology review, security issues, threats, and open challenges." Indonesian Journal of Electrical Engineering and Computer Science 20, no. 3 (December 1, 2020): 1685. http://dx.doi.org/10.11591/ijeecs.v20.i3.pp1685-1692.

Full text
Abstract:
<p><span>Internet of Things (IoT) devices are spread in different areas such as e-tracking, e-commerce, e-home, and e-health, etc. Thus, during the last ten years, the internet of things technology (IoT) has been a research focus. Both privacy and security are the key concerns for the applications of IoT, and still face a huge number of challenges. There are many elements used to run the IoT technology which include hardware and software such as sensors, GPS, cameras, applications, and so forth. In this paper, we have analyzed and explain the technology of IoT along with its elements, security features, security issues, and threats that attached to each layer of IoT to guide the consideration of researchers into solve and understand the most serious problems in IoT environment.</span></p>
APA, Harvard, Vancouver, ISO, and other styles
22

Burlacioiu, Cristina. "Online Commerce Pattern in European Union Countries between 2019 and 2020." Societies 13, no. 1 (December 22, 2022): 4. http://dx.doi.org/10.3390/soc13010004.

Full text
Abstract:
The development of information technology, along with the high growth and diversification of consumer needs, has revolutionized the way in which business-to-consumer transactions occur. All this progress was boosted by the COVID-19 pandemic period in a different manner in each EU country, depending on different local aspects. The main goal of this paper is to determine the key characteristics of e-commerce in European Union countries in a pandemic context, based on Eurostat Digital Economy data for 2019–2020. Therefore, for an easier visualization, based on PCA, using 27 analyzed variables, new unique dimensions were revealed: 1. heavy online purchasers, 2. triggers for embracing digital purchasing, 3. perceived barriers against buying online (privacy concerns, security, or not having a card), 4. dynamics of online interaction with public authorities, and 5. enterprise online sharing. Moreover, clustering techniques set four groups of countries with different online commerce patterns that might require attention, according to their specificities, both from a government level and from a business perspective. Special attention is paid to Romania, which has one of the biggest e-commerce industries in Southeastern Europe, but with the share of e-commerce in total retail still quite low, despite this great increase. The models of other countries could be important in helping Romania to catch up with the most successful economies in terms of e-commerce.
APA, Harvard, Vancouver, ISO, and other styles
23

RAGAVENDRAN, V. A., and Dr A. MEENAKSHI. "AN ANALYSIS OF THE LITERATURE ON SOCIETY'S CONCERNS ON INDIA'S CYBERSECURITY IN THE TWENTY-FIRST CENTURY." International Journal of Social Sciences and Management Review 06, no. 01 (2023): 103–9. http://dx.doi.org/10.37602/ijssmr.2022.6107.

Full text
Abstract:
Cyber security is concerned with matters of cyber-ethics and cyber-safety. The idea of cyber security should be introduced to and ingrained from a young age. Security countermeasures aid in preserving the confidentiality, availability, and integrity of information systems by preventing or lessening asset losses brought on by cyber security threats. An intrusion detection system (IDS) application analyses what happens during an execution and searches for indications that the computer has been mistreated. Numerous metaphors, including those relating to biological processes, healthcare, markets, three-dimensional space, and the preservation of tangible goods, were taken into account. These in turn sparked the investigation of a wide range of prospective tactics for advancing cyber security in the future. The concepts of "Heterogeneity," "Motivating Secure Behaviour," and "Cyber Wellness" were employed to define these tactics. Cyber security plays an important role in the development of information technology and Internet services. Our attention tends to gravitate toward "Cyber Security" when we hear about "Cyber Crimes." Therefore, how well our system handles "Cyber Crimes" is the first factor we take into account when talking about "National Cyber Security". This newsletter focuses on expanding trends in cyber security in light of the widespread adoption of cutting-edge technologies including mobile computing, cloud computing, e-commerce, and social networking. In the research, it is also covered how challenges are exacerbated by a lack of coordination between security organizations and crucial IT infrastructures.
APA, Harvard, Vancouver, ISO, and other styles
24

Chung, Kim Choy. "Mobile (shopping) commerce intention in central Asia." Asia-Pacific Journal of Business Administration 11, no. 3 (August 5, 2019): 251–66. http://dx.doi.org/10.1108/apjba-11-2018-0215.

Full text
Abstract:
Purpose Although East Asia and South East Asia have seen growth in mobile commerce activities, the uptake of such activities in Central Asia has been relatively low. For insight, the purpose of this paper is to investigate the impact of culture, innovation characteristics and concerns about order fulfillment on mobile commerce (shopping) intention in Central Asia. Design/methodology/approach In total, 779 questionnaires were collected (via mall-intercept method) from cities in Kazakhstan, Kyrgyzstan and Uzbekistan. The data were then subjected to two-step structural equation modeling procedures (using SPSS AMOS V.25) for hypothesis testing. Findings This study revealed that innovation characteristics, system-based trust (trust in mobile technology), and concerns about order fulfillment affected mobile commerce intention in Central Asia. The strong uncertainty avoidance characteristics of societies in the region mean potential adoptee place great emphasis on trialability and security of mobile commerce. Uncertainty avoidance correlated strongly with concerns about order fulfillment, thereby significantly impacting mobile commerce intention. Power distance and collectivism correlated with observability as factors affecting mobile commerce intention. The innovation characteristics of compatibility, complexity and relative advantage directly impact mobile commerce intention in Central Asia. Research limitations/implications There are several limitations in this paper. First, the data in this study are limited to Kazakhstan, Kyrgyzstan and Uzbekistan. This might affect the generalization of this study’s findings across the whole Central Asia region. Second, the respondents in this study are exposed to mobile shopping for less than 30 min before been asked to complete the survey. This might affect respondent’s confidence in mobile commerce. Future study might involve the rest of Central Asia (Tajikistan, Afghanistan and Turkmenistan). Future study might also want to investigate the impact of Web assurance seal on mobile commerce intention in Central Asia. Practical implications Managerial/marketing implications and recommended strategies in this study would be useful for businesses (aspirant e-vendors) in Central Asia. Originality/value There is limited study about mobile commerce in Central Asia. Furthermore, extant literature on mobile commerce in the region lacked age varieties or lacked multi-national and logistical perspective. This is important given the wide geographical spread of the region. This study addressed these gaps by collecting data from all segments of society in Kazakhstan, Kyrgyzstan and Uzbekistan to test propositions regarding innovation characteristics, culture, and concerns about order fulfillment as factors impacting mobile commerce intention in Central Asia.
APA, Harvard, Vancouver, ISO, and other styles
25

D’Adamo, Idiano, Rocío González-Sánchez, Maria Sonia Medina-Salgado, and Davide Settembre-Blundo. "Methodological Perspective for Assessing European Consumers’ Awareness of Cybersecurity and Sustainability in E-Commerce." Sustainability 13, no. 20 (October 14, 2021): 11343. http://dx.doi.org/10.3390/su132011343.

Full text
Abstract:
The increasing European consumer awareness of cybersecurity and sustainability issues in e-commerce is raising key methodological concerns. In a field like this, still unexplored by scholars, it is crucial to identify reliable data as well as to choose the modalities of combining primary and secondary data. As the robustness of the outcome of a study on a complex issue is highly sensitive to the quality of the data used, this paper is a communication that aims to complement and support previously published empirical research. This communication describes the methodological path to collect, integrate, and process data from different sources to interpret European consumers’ attitudes towards cybersecurity and sustainability during e-commerce. In fact, COVID-19 has driven many users to shop online, raising concerns especially about the security of digital transactions. Scientific studies analyzing these effects are still lacking in the literature and therefore this paper aims to fill this gap. The limits of a rigid dataset such as Eurostat’s are overcome by integrating the results of European citizens’ behavior during online purchases, with a survey that involved some experts appropriately selected by the research team. The combination of primary and secondary sources of data and the application of a hybrid methodological approach using MCDA (multi-criteria decision analysis) and a Likert scale allowed new information that fills some gaps in the literature to be extracted from the data. How European citizens correlate e-commerce with cybersecurity and sustainability emerged, thus providing important insights for decision-makers.
APA, Harvard, Vancouver, ISO, and other styles
26

Yadav, Saurabh, and Pawan Singh. "Web Application and Penetration Testing." Journal of Informatics Electrical and Electronics Engineering (JIEEE) 1, no. 2 (November 20, 2020): 1–11. http://dx.doi.org/10.54060/jieee/001.02.003.

Full text
Abstract:
In the present scenario, the usage of internet is enormous and is escalating day by day. Internet facilities are employed in almost every field of work and people are becoming depending on it, with the increasing dependency on the internet, concern regarding information security has been increased. Because most of the work, e-commerce, chatting, payment of the bill, etc. are work through over the internet. That is why security is most important for any website. Basically, such security concern is high in the field of organizations, institutions, and the financial sector. This paper aims to address the top most vulnerability concerns and how to overcome them. This paper addresses most of the popular vulnerabilities, which are amongst the top 10 according to OWASP and addresses the precautions to be taken to deal with these vulnerabilities. This paper provides a better understanding in a simple and easy way. When the entire world is behind new technologies and everything is moving towards the internet, the need for security increases. One has to be sure about the security of their website as well as the security and privacy of the end users. So, when the world is demanding for new technologies there will be an increase in demand for security testing. Every application or website is considered good only when it is secure and it can only be done by a web tester. This paper explores the vulnerabilities in a precise manner.
APA, Harvard, Vancouver, ISO, and other styles
27

Shakya, Subarna. "AN EFFICIENT SECURITY FRAMEWORK FOR DATA MIGRATION IN A CLOUD COMPUTING ENVIRONMENT." Journal of Artificial Intelligence and Capsule Networks 01, no. 01 (September 28, 2019): 45–53. http://dx.doi.org/10.36548/jaicn.2019.1.006.

Full text
Abstract:
Cloud computing is advantageous in several applications. Data migration is constantly carried out to hybrid or public cloud. Certain large enterprises will not move their business-critical data and applications to the cloud. This is due to the concerns regarding data security and privacy protection. In this paper, we provide a data security analysis and solution for privacy protection framework during data migration. A Secure Socket Layer (SSL) is established and migration tickets with minimum privilege is introduced. Further, data encryption is done using Prediction Based Encryption (PBE). This system will be of use for healthcare systems and e-commerce systems that can store data regarding credit card details. We provide a strict separation between sensitive and non-sensitive data and provide encryption for the sensitive data.
APA, Harvard, Vancouver, ISO, and other styles
28

Al-Jabri, Ibrahim M., Mustafa I. Eid, and Amer Abed. "The willingness to disclose personal information." Information & Computer Security 28, no. 2 (August 26, 2019): 161–81. http://dx.doi.org/10.1108/ics-01-2018-0012.

Full text
Abstract:
Purpose Customer privacy and security are major concerns. Online firms worldwide collect customer data for various reasons. This study aims to investigate factors that motivate and hinder a customer’s willingness to disclose personal information (WTD) to online firms on e-commerce websites. Design/methodology/approach Based on an extensive literature review, three sets of factors have been identified. These sets of factors are privacy concern, perceived disclosure benefits and privacy assurances. It is hypothesized that privacy concerns negatively affect the disclosure of personal information, while the perceived benefits of disclosure have positive effects. Privacy assurances would positively affect information disclosure and attenuate the negative effect of privacy concerns on the disclosure of personal information. The authors gathered data from 253 online customers in Saudi Arabia. Findings The results indicate that perceived disclosure benefits and privacy concerns have a significant positive and negative relationship, respectively, with WTD online. Privacy assurances had neither a direct nor a moderating effect on information disclosure. Research limitations/implications The findings will inform online firms about the factors that prevent or motivate customers to disclose personal information. Originality/value The effect of privacy concerns and benefits on personal information disclosure are not fully understood in Saudi Arabia. This study reveals more insights into the specific factors that make online customers reluctant or motivated to disclose their personal information.
APA, Harvard, Vancouver, ISO, and other styles
29

Charandabi, Sina, and Omidreza Ghanadiof. "Evaluation of Online Markets Considering Trust and Resilience: A Framework for Predicting Customer Behavior in E-Commerce." Journal of Business and Management Studies 4, no. 1 (January 18, 2022): 23–33. http://dx.doi.org/10.32996/jbms.2022.4.1.4.

Full text
Abstract:
The evolution of electronic commerce has led to expanding online markets due to convenience, online incentives, greater access to information, broader selections, competition, pricing, product quality, and lead time, i.e., the time that it takes to deliver the products after an order is placed. However, online markets have captured less attention in environments where consumers are concerned about the security and privacy of their personal data. Such concerns can be due to several reasons, from the reluctance in using electronic commerce to the lack of trust and reliability of web vendors. In this paper, we study trust and resilience engineering in such online markets and identify the most and least significant factors impacting online shopping systems. To tackle the inherent uncertainties of data used in our analysis, we propose a Fuzzy Data Envelopment Analysis (FDEA) model and validate our findings. Numerical examples show the efficiency of the proposed method in evaluating online and offline shopping systems with respect to trust and resilience.
APA, Harvard, Vancouver, ISO, and other styles
30

Zaidan, Esmat. "Analysis of ICT usage patterns, benefits and barriers in tourism SMEs in the Middle Eastern countries." Journal of Vacation Marketing 23, no. 3 (June 21, 2016): 248–63. http://dx.doi.org/10.1177/1356766716654515.

Full text
Abstract:
Information and communications technology (ICT) are widely used by enterprises to enhance their competitiveness. Travel agents (TAs) are among service providers for whom their integration of ICT and Internet technological capabilities could be the best marketing device and a potential promoter for enhancing their competitive positioning in the tourism sector. The study contextualizes ICT usage patterns in an underexplored context, the Middle East countries. This study provides an overview of the current state of affairs of the ICT adoption in small- and medium-size TAs in Dubai in United Arab Emirates. It investigates the usage patterns of the Internet by Dubai TAs, reasons for using the Internet, features of agents’ website content, and perceived significant benefits of e-commerce and barriers to adoption. It is found that the majority of TAs use the Internet for several reasons, ranging from customizing services, attracting customers, communicating with customers, gaining access to international markets, providing TAs with information and finding out about suppliers and competitors. The significant perceived benefits identified in this study are establishing a reputation in the global markets, increasing sales, revenues and profits, improving distribution channels, increasing competitive advantage and customizing services to customer needs. On the other hand, it was found that the principal barriers hindering e-commerce adoption are limited resources versus the high cost of e-commerce adoption, online security concerns, lack of skilled information technology labour, a lack of customer readiness, and a lack of advice and support. The study identified the need for more training facilities for adopting e-commerce in TAs and the need for the government to provide incentives, professional advice, and guidance regarding appropriate e-commerce products and services at an affordable cost for TAs operating in the emirate.
APA, Harvard, Vancouver, ISO, and other styles
31

Susanto, Aries, Hwansoo Lee, Hangjung Zo, and Andrew P. Ciganek. "Factors Affecting Internet Banking Success." Journal of Global Information Management 21, no. 2 (April 2013): 72–95. http://dx.doi.org/10.4018/jgim.2013040104.

Full text
Abstract:
Internet banking is a prominent example of Internet-based applications. Previous research has found that satisfaction, trust, commitment, and loyalty are important factors for Internet banking success. Resistance to adopt Internet banking is often attributed to the role of trust, security, and privacy in e-commerce systems. This study proposes a framework to examine behaviors toward Internet banking services in Indonesia and South Korea. A research model was empirically tested with data captured in a large-scale study. The results show that Indonesians’ use of Internet banking is strongly influenced by perceived security, while Koreans use of Internet banking is strongly influenced by privacy concerns. Trust and user satisfaction have a greater influence on loyalty for Indonesians while commitment has a greater influence on loyalty for Koreans. The study develops related conclusions including a discussion of the research implications.
APA, Harvard, Vancouver, ISO, and other styles
32

Sun, Jing, and Ting Chi. "Investigating the adoption of apparel m-commerce in the US market." International Journal of Clothing Science and Technology 31, no. 4 (August 5, 2019): 544–63. http://dx.doi.org/10.1108/ijcst-03-2018-0038.

Full text
Abstract:
Purpose The purpose of this paper is to empirically determine the key factors influencing the US consumers’ intentions to use apparel m-commerce. Design/methodology/approach An enhanced consumer’s apparel m-commerce adoption model was developed through integrating the existing e-commerce/m-commerce theories (i.e. theory of reasoned action, Technology acceptance model and diffusion of innovation theory). The investigated factors included nine independent variables – perceived usefulness (PU), perceived ease-of-use, subjective norm (SN), personal innovativeness traits, security and privacy concerns, compatibility, observability, trust and past non-store shopping experience (PE), and five control variables – age, gender, education level, income level and ethnicity. The dependent factor is consumer’s intention to use (IU) apparel m-commerce. The primary data were gathered by an online survey of US consumers via Amazon Mechanical Turk. In total, 317 eligible responses were received. The applied statistical techniques were factor analysis and multiple regression analysis. Findings The results show that the US consumer’s IU apparel m-commerce is significantly affected by PU, SN, compatibility and PE and education level. Overall, 67.3 percent of variation in the US consumer’s IU apparel m-commerce is explained by the developed model, which suggests a high explanatory power. Practical implications Companies should provide those functions and features on their mobile websites that enable consumers to easily find the products wanted and complete transactions efficiently. Companies should particularly target the consumers with innovativeness traits and/or those having prior non-store shopping experience. Enhancing the trust in m-commerce among the US consumers with higher education level could help companies attract more potential users. Elderly, female or lower income consumers could be the next business opportunities for apparel e-tailers. Originality/value As one of the first efforts made to understand the emerging apparel m-commerce phenomenon, this study empirically determined the key factors influencing the US consumer’s IU apparel m-commerce.
APA, Harvard, Vancouver, ISO, and other styles
33

Li, Mengxing, Quan Feng, Jian Zhao, Mei Yang, Lijun Kang, and Lili Wu. "Minutiae Matching with Privacy Protection Based on the Combination of Garbled Circuit and Homomorphic Encryption." Scientific World Journal 2014 (2014): 1–13. http://dx.doi.org/10.1155/2014/525387.

Full text
Abstract:
Biometrics plays an important role in authentication applications since they are strongly linked to holders. With an increasing growth of e-commerce and e-government, one can expect that biometric-based authentication systems are possibly deployed over the open networks in the near future. However, due to its openness, the Internet poses a great challenge to the security and privacy of biometric authentication. Biometric data cannot be revoked, so it is of paramount importance that biometric data should be handled in a secure way. In this paper we present a scheme achieving privacy-preserving fingerprint authentication between two parties, in which fingerprint minutiae matching algorithm is completed in the encrypted domain. To improve the efficiency, we exploit homomorphic encryption as well as garbled circuits to design the protocol. Our goal is to provide protection for the security of template in storage and data privacy of two parties in transaction. The experimental results show that the proposed authentication protocol runs efficiently. Therefore, the protocol can run over open networks and help to alleviate the concerns on security and privacy of biometric applications over the open networks.
APA, Harvard, Vancouver, ISO, and other styles
34

Chong, Kyung Won, Yong Seok Kim, and Jeongil Choi. "A Study of Factors Affecting Intention to Adopt a Cloud-Based Digital Signature Service." Information 12, no. 2 (January 31, 2021): 60. http://dx.doi.org/10.3390/info12020060.

Full text
Abstract:
The electronic signature service has been causing various problems due to the rapid growth of e-commerce services. Therefore, in order to create an authentication service suitable for the era of the 4th Industrial Revolution, new security authentication technologies such as the cloud must be utilized. However, there is a lack of prior management studies on the intention to accept digital signatures. Therefore, this study conducted an empirical study to identify factors affecting the intention to adopt cloud-based digital signature services. This research proposed a model based on the technology–organization–environment framework and empirically analyzed the degree of mutual causality and influence between variables using the partial least squares structural equation model. The results show that technical characteristics, organizational characteristics, and environmental characteristics significantly affected the intention to adopt. However, there are still many concerns about the security of cloud-based services. It has been confirmed that solving this problem is the key to the activation of the electronic signature service.
APA, Harvard, Vancouver, ISO, and other styles
35

Wang, Hexu, Fei Xie, Qun Duan, and Jing Li. "Federated Learning for Supply Chain Demand Forecasting." Mathematical Problems in Engineering 2022 (November 8, 2022): 1–8. http://dx.doi.org/10.1155/2022/4109070.

Full text
Abstract:
With the country’s policy support and the rapid development of Internet technology, the domestic consumption level has been escalating and the consumption structure has changed. The traditional retail industry cannot integrate all the relevant data due to data security and privacy protection concerns so that it is unable to adjust sales strategies in an accurate and timely manner. New retail has sounded the clarion call for the retail revolution. The supply chain demand forecasting is an important problem for the supply chain management. In this research, we propose a new retail supply chain commodity demand forecasting framework based on vertical federal learning, which solves the problems of data security and privacy faced by new retail theoretically and empirically. In experiments, we use datasets from different platforms (such as social platforms, e-commerce platforms, and retailers) in the same region for federated learning. The experiment results demonstrate the superiority of the proposed algorithm.
APA, Harvard, Vancouver, ISO, and other styles
36

Rahaman, Major Muhammad Masudur. "Recent Advancement of Cyber Security: Challenges and Future Trends in Bangladesh." Saudi Journal of Engineering and Technology 7, no. 6 (July 6, 2022): 278–89. http://dx.doi.org/10.36348/sjet.2022.v07i06.002.

Full text
Abstract:
The massive demand for global transformations describes the necessity of high-speed communication in the twenty-first century. Almost every facet of online networks is changing, including international relations, politics, trade, and security. However, cyber security has become a major issue all around the world. Bangladesh has recently taken the required steps to address the problem as swiftly as feasible. In order to prevent and combat cyber threats, the government of Bangladesh plans to establish a specialized computer incident response team (CIRT) for banks and financial institutions, which will serve as the national response team responsible for receiving, reviewing, and responding to computer security incidents and activities in Bangladesh. Implementing strong and multilayer authentication to better management of the data, as well as discovering and mapping out security issues, some major initiatives are required to implement cyber security. Engineers should obtain hands-on training in decoding corrupted data files during any cyber-attack in order to recover data from any lost data. In this review, cyber security challenges in smart cities and smart governance have been examined, with an emphasis on e-commerce, machine learning, industry automation, IoT, and other security elements. The main cyber security concerns are discussed in order to better comprehend almost every necessity of long-term cyber security situations. Moreover, smart industry control and its security infrastructure, problems for implementation in Bangladesh and recent security issues have been highlighted.
APA, Harvard, Vancouver, ISO, and other styles
37

Maher, Mohamed, Perseverance Munga Ngoy, Aleksandrs Rebriks, Cagri Ozcinar, Josue Cuevas, Rajasekhar Sanagavarapu, and Gholamreza Anbarjafari. "Comprehensive Empirical Evaluation of Deep Learning Approaches for Session-Based Recommendation in E-Commerce." Entropy 24, no. 11 (October 31, 2022): 1575. http://dx.doi.org/10.3390/e24111575.

Full text
Abstract:
Boosting the sales of e-commerce services is guaranteed once users find more items matching their interests in a short amount of time. Consequently, recommendation systems have become a crucial part of any successful e-commerce service. Although various recommendation techniques could be used in e-commerce, a considerable amount of attention has been drawn to session-based recommendation systems in recent years. This growing interest is due to security concerns over collecting personalized user behavior data, especially due to recent general data protection regulations. In this work, we present a comprehensive evaluation of the state-of-the-art deep learning approaches used in the session-based recommendation. In session-based recommendation, a recommendation system counts on the sequence of events made by a user within the same session to predict and endorse other items that are more likely to correlate with their preferences. Our extensive experiments investigate baseline techniques (e.g., nearest neighbors and pattern mining algorithms) and deep learning approaches (e.g., recurrent neural networks, graph neural networks, and attention-based networks). Our evaluations show that advanced neural-based models and session-based nearest neighbor algorithms outperform the baseline techniques in most scenarios. However, we found that these models suffer more in the case of long sessions when there exists drift in user interests, and when there are not enough data to correctly model different items during training. Our study suggests that using the hybrid models of different approaches combined with baseline algorithms could lead to substantial results in session-based recommendations based on dataset characteristics. We also discuss the drawbacks of current session-based recommendation algorithms and further open research directions in this field.
APA, Harvard, Vancouver, ISO, and other styles
38

Zunnuraeni, Zunnuraeni, Zainal Asikin, RR Cahyowati, and Rizky Yuniansari. "Penyuluhan Hukum Tentang Perlindungan Konsumen Terhadap Transaksi Berbasis Online Berdasarkan Ketentuan Hukum Nasional di Desa Aikmual." Unram Journal of Community Service 2, no. 3 (September 22, 2021): 57–63. http://dx.doi.org/10.29303/ujcs.v2i3.63.

Full text
Abstract:
The increasing number of online-based transactions, particularly e-commerce, has raised a variety of legal issues that can harm consumers. To regulate online-based transactions, a number of laws and regulations were established. Online transactions have also now reached the villages. As for the village of Aikmual, where devotional activities will be carried out, online transactions, especially online buying and selling, have been commonly carried out by mothers. About one-third of women in Aikmual village have become accustomed to buying and selling online through various e-commerce platforms. To avoid losses to consumers, the Extension Team of the Faculty of Law, Mataram University, will conduct legal counseling activities regarding Consumer Protection in online-based transactions in Aikmual village. This legal counseling method is carried out through lectures, namely the delivery of material by the extension team and by means of discussion with the target audience. The conclusion of this extension activity is that there are several problems related to online transactions faced by the target audience, including discrepancies between goods ordered and those received by consumers, concerns about the security and legality of online investment, and lack of public understanding about the legal mechanisms that can be taken by consumers when facing problems in online transactions
APA, Harvard, Vancouver, ISO, and other styles
39

Sanjay K. Jain and Manika Jain. "Exploring Impact of Consumer and Product Characteristics on E-Commerce Adoption: A Study of Consumers in India." Journal of Technology Management for Growing Economies 2, no. 2 (October 25, 2011): 35–64. http://dx.doi.org/10.15415/jtmge.2011.22009.

Full text
Abstract:
The paper aims at examining the impact of various consumer and product characteristics on adoption of e-commerce among consumers in India. The study is based on primary data collected through survey of consumers residing in and around Delhi. A structured non- disguised questionnaire has been employed for collecting the information from the respondents about their demographics, shopping orientations, security and privacy concerns, technological familiarity, past online shopping experiences and intentions to buy various types of products through internet in future. Past online shopping satisfaction, recreational shopping orientation, education and income emerge as significant factors affecting consumer past online purchases. In respect of future online shopping intentions, only three consumer-related factors viz., past online shopping satisfaction, past online shopping frequency and education, are found as significant predictors. Amongst product characteristics, product expensiveness is found to be negatively related to consumer future online purchase intentions. While consumers appear quite willing to buy services online that are high in their intangible value proposition, they appear somewhat ambivalent in their intentions to buy online the 'frequently purchased products'. Some of the consumer and product characteristics do influence consumer adoption of e-commerce. Study findings entail interesting implications for the marketers. They need to give adequate attention to consumer and product characteristics while designing their e-marketing strategies. As compared to goods, the surveyed respondents have expressed greater willingness to buy services online in future. Services thus appear to be more promising product category for sale through internet channel in future.
APA, Harvard, Vancouver, ISO, and other styles
40

Sahoo, Abhaya Kumar, Srishti Raj, Chittaranjan Pradhan, Bhabani Shankar Prasad Mishra, Rabindra Kumar Barik, and Ankit Vidyarthi. "Perturbation-Based Fuzzified K-Mode Clustering Method for Privacy Preserving Recommender System." International Journal of Information Security and Privacy 16, no. 1 (January 2022): 1–20. http://dx.doi.org/10.4018/ijisp.2022010115.

Full text
Abstract:
Recommender systems are extensively used today to ease out the problem of information overload and facilitate the product selection by users in e-commerce market. Both privacy and security are two major concerns of the user in these systems. For the protection of the user’s rating, there are several existing works on the basis of encryption or randomization methodologies. This paper proposes a methodology that not only protects the privacy of ratings but also provides better accuracy. After applying fuzzification on the user ratings, random rotation and perturbation methods are used before being fed to the collaborative filtering system. In this process, similar users are grouped into clusters by which recommendation is made. By considering different cluster size on four different datasets, the proposed fuzzified k-Mode clustering method provides less MAE and RMSE value as compared to other k-Means and k-Mode clustering approach and also achieves the better privacy than randomized perturbation method by obtaining IVDM value i.e. 0.67, 0.61, 0.55 and 0.7.
APA, Harvard, Vancouver, ISO, and other styles
41

Abdelkarim Almajali, Dmaithan. "Determinants of Online Behavior Among Jordanian Consumers: An Empirical Study of OpenSooq." Interdisciplinary Journal of Information, Knowledge, and Management 17 (2022): 339–59. http://dx.doi.org/10.28945/4994.

Full text
Abstract:
Aim/Purpose: This study identifies the elements that influence intentions to purchase from the most popular Arabic online classifieds platform, OpenSooq.com. Background: Online purchasing has become popular among consumers in the past two decades, with perceived risk and trust playing key roles in consumers’ intention to purchase online. Methodology: A questionnaire survey was conducted of Internet users from three Jordanian districts to investigate how they used the OpenSooq platform in their e-commerce activities. In total, 202 usable responses were collected, and the data were analyzed with PLS-SEM for hypothesis testing and model validation. Contribution: Though online trading is increasingly popular, the factors that impact the behavior of consumers when purchasing high-value products have not been adequately investigated. Therefore, this study examined the factors affecting perceived risk, and the potential impact of privacy concerns on the perceived risk of online smartphone buyers. The study framework can help explore online behavior in various situations to ascertain similarities and differences and probe other aspects of online buying. Findings: Perceived risk negatively correlates with online purchasing behavior and trust. However, privacy concern and perceived risk, transaction security and trust, and trust and online purchasing behavior exhibited positive correlations. Recommendations for Practitioners: Customers can complete and retain online purchases in a range of settings illuminated in this study’s methods and procedures. Moreover, businesses can manage their IT arrangements to make Internet shopping more convenient and build processes for online shopping that allow for engagement, training, and ease of use, thus improving their customers’ online purchasing behavior. Recommendation for Researchers: Given the insight into the understanding and integration of variables including perceived risk, privacy issues, trust, transaction security, and online purchasing behavior, academics can build on the groundwork of this research paradigm to investigate underdeveloped countries, particularly Jordan, further. Impact on Society: Understanding the characteristics that influence online purchasing behavior can help countries realize the full potential of online shopping, particularly the benefits of safe, fast, and low-cost financial transactions without the need for an intermediary. Future Research: Future research can examine the link between online purchase intent, perceived risk, privacy concerns, trust, and transaction security to see if the findings of this study in Jordan can be applied to a broader context in other countries.
APA, Harvard, Vancouver, ISO, and other styles
42

Nagaratha, Annappa. "Cybercrime Regulation through Laws and Strategies: A Glimpse into the Indian Experience." International Journal of Digital Law 1, no. 1 (April 30, 2020): 53–64. http://dx.doi.org/10.47975/digital.law.vol.1.n.1.p.53-64.

Full text
Abstract:
Cybercrimes in India is increasing at an alarming rate. Though various legal provisions under the conventional criminal laws including form the Indian Penal Code, could be used to regulate the cybercrimes, yet the changing nature of these crimes necessitated adoption of a new law framework. Thus, the Indian Information Technology Act was enacted in 2000 but seldom could regulate cybercrimes since it focused on promoting and facilitating e-commerce and e-governance. This Act underwent amendment in 2008 to accommodate provisions essential to regulate cybercrimes as well as protect data and privacy on cyber space. In addition to the law, other strategies were designed and adopted to better regulate cyber offences including announcing cyber security policies, constituting institutions to take care of certain concerns including those relating to critical infrastructure information, etc. This paper aims to provide an overview of the approach adopted in India primarily the legal approach adopted to regulate cybercrimes. Additionally, other strategies adopted by India is also reviewed in brief. Despite these, since cybercrimes are technical as well as dynamic in nature, there is a need to constantly review and revise nation’s strategies, which is also one of the objects of this paper.
APA, Harvard, Vancouver, ISO, and other styles
43

Nagarathna, Annappa. "Cybercrime Regulation through Laws and Strategies: A Glimpse into the Indian Experience." International Journal of Digital Law 1, no. 1 (April 30, 2020): 53–64. http://dx.doi.org/10.47975/ijdl/1nagarathna.

Full text
Abstract:
Cybercrimes in India is increasing at an alarming rate. Though various legal provisions under the conventional criminal laws including form the Indian Penal Code, could be used to regulate the cybercrimes, yet the changing nature of these crimes necessitated adoption of a new law framework. Thus, the Indian Information Technology Act was enacted in 2000 but seldom could regulate cybercrimes since it focused on promoting and facilitating e-commerce and e-governance. This Act underwent amendment in 2008 to accommodate provisions essential to regulate cybercrimes as well as protect data and privacy on cyber space. In addition to the law, other strategies were designed and adopted to better regulate cyber offences including announcing cyber security policies, constituting institutions to take care of certain concerns including those relating to critical infrastructure information, etc. This paper aims to provide an overview of the approach adopted in India primarily the legal approach adopted to regulate cybercrimes. Additionally, other strategies adopted by India is also reviewed in brief. Despite these, since cybercrimes are technical as well as dynamic in nature, there is a need to constantly review and revise nation’s strategies, which is also one of the objects of this paper.
APA, Harvard, Vancouver, ISO, and other styles
44

Mogire, Eric, Peter Kilbourn, and Rose Luke. "THE LAST MILE DELIVERY PROBLEM: A KENYAN RETAIL PERSPECTIVE." Acta logistica 09, no. 04 (December 31, 2022): 387–95. http://dx.doi.org/10.22306/al.v9i4.329.

Full text
Abstract:
The article aims to determine the last mile delivery challenges faced by online retailers in Kenya. This is based on the online retailing sub-sector’s contribution to the country’s economy. Despite its significant contribution to the country’s economy, little is known about the challenges facing online retailers during last mile delivery. In other countries such as China and South Africa, that are doing better in online retailing, extensive research has been done to determine unique challenges facing their online retailers during last mile delivery. It is important for the online retailers and relevant government agencies in Kenya to understand the last mile delivery factors that hinder the growth e-commerce. A qualitative research design using face-to-face interviews was used to collect data from seven online retail managers in Nairobi. The findings revealed there are a variety of last mile delivery challenges facing online retailers. These include the lack of a good national addressing system, traffic concerns, security concerns, high cost of delivery, postal service unreliability, and unconducive county government by-laws. The lack of a good national addressing system was found to be the most common last mile delivery challenge facing online retailers in Nairobi. It is recommended that retailers request their customers to share location details via online map applications such as Google Maps to overcome this challenge. The use of other delivery options, such as customer pick-up points of convenience can also be considered.
APA, Harvard, Vancouver, ISO, and other styles
45

Tashtoush, Yahya M., Aisha Zaidan, and Izzat M. Alsmadi. "Implications for Website Trust and Credibility Assessment." International Journal of E-Entrepreneurship and Innovation 3, no. 4 (October 2012): 17–33. http://dx.doi.org/10.4018/jeei.2012100102.

Full text
Abstract:
With the expansion of the Internet services provided to users to cover almost all areas that were dominated by traditional face-to-face and location based businesses, one of the major challenges for such expansion is security and its related concerns. Customers or users need to trust the websites they visit in terms of the information or content. This research proposes a new formula for evaluating the credibility (called XD TRank) metric of websites. A case study of 40 selected websites in Jordan is used to assess the proposed credibibility metric. The metrics required to assess Websites and pages credibility are collected and evaluated based on 25 existing metrics and built a model using SPSS by applying stepwise linear regression analysis to predict the XD TRank. Results showed that there is a broad range of metrics that affect the credibility of a website or a webpage and their impact on credibility may vary on their significancy or impact on the trust rank metric. For e-business in particular, trust rank metrics can be used part of quality assurance and auditing processes. Those can be important assets for users to be able to distinguish known, popular and reliable e-commerce websites from spammers or websites which try to trick novice users. Trust rank can be also used like a logo in all Website pages to alert users if they were redirected to phishing pages.
APA, Harvard, Vancouver, ISO, and other styles
46

Mohan, Akshay. "“Impact of E-Payment Systems on Customer Satisfaction”." International Journal for Research in Applied Science and Engineering Technology 9, no. 10 (October 31, 2021): 573–81. http://dx.doi.org/10.22214/ijraset.2021.38314.

Full text
Abstract:
Abstract: Everything has shifted online since the outbreak of the pandemic, from education to full-time jobs to health check-ups. What's important to remember here is that the majority of our day-to-day activities increasingly include making payments online. Although e-payment and e-banking solutions have been available for some time now, the pandemic has effectively compelled a huge portion of the urban and rural populations to use them. This research study aims to find out how widely epayment and e-banking systems are used and how they affect the user experience. Researchers have often been drawn to digital payment systems since they are a relatively new concept (the first digital payment system was only established in the 1990s). Over time, researchers have attempted to characterize the value of digital payment systems and what they represented for modern ecommerce, consumer personal finance, and economies around the world. According to the literature analyzed from many articles and research papers, digital payment is significantly more convenient than traditional paper currency. There has been a lot of studies done on the problems with digital payment systems (such as serious security issues and inaccessibility to these systems owing to low internet penetration), which pushes developers to keep working on these systems for the purpose of safer and faster transactions. According to several studies, online payment technology can cut costs, increase the number of consumers for a firm, improve customer-company interaction, and improve the company's image. This necessitates businesses providing a frictionless payment experience to their customers. In this research paper, a large amount of secondary data, as well as primary data acquired via survey, was utilized to highlight the paper's aims, type, and, most importantly, to analyze and interpret the data in order to better address the problem statement. We've come to the conclusion that electronic payment solutions have a huge impact on client satisfaction. Customers are increasingly turning to e-payment systems as a result of the pandemic's regular lockdowns, which have limited access to banks and conventional ATMs. While making online payments, consumers look for offers, rewards, discounts, and other incentives, which distinguish them from cash on delivery payments. Businesses (large and small) should make sure that their customers have a variety of ways to pay for goods and services (debit cards, credit cards, digital wallets, UPI, prepaid cards). Purpose & Summary of Study 1) Purpose ● To ascertain the extent to which e-payment systems are employed. ● To examine the impact of e-payment systems on customer satisfaction. ● To discuss issues surrounding e-payment systems. 2) Summary: The goal of this study is to find out how widely e-payment and e-banking technologies are used and how they affect the user experience. For the purposes of this study, a large amount of related literature, as well as primary data acquired by survey, was evaluated. Concerns about e-payment systems have also been raised. We noticed that the pandemic has driven a big number of people to utilize e-payment systems and that having a functional and seamless online payment experience is critical to attracting customers to all types of enterprises. Despite security concerns and a lack of access to faster internet connections, Indians are beginning to embrace online payment solutions. Keywords: E-payments, Credit Cards, Online Transactions, Cash Payment, E-Commerce, Customer Satisfaction, Debit Cards, Google-Pay, UPI Apps, Internet Banking
APA, Harvard, Vancouver, ISO, and other styles
47

Bhatnagar, Sushant, and Rajeev Kumra. "Understanding consumer motivation to share IoT products data." Journal of Indian Business Research 12, no. 1 (February 5, 2020): 5–22. http://dx.doi.org/10.1108/jibr-09-2019-0268.

Full text
Abstract:
Purpose Almost every study undertaken by academicians or practitioners on the Internet of Things (IoT) has mainly highlighted the privacy concerns and information security issues with the IoT products. On the contrary, this paper aims to explore the motivators that could encourage customers of an IoT product to share their IoT product’s data with a third-party aggregator system to facilitate computer-generated product reviews which are defined as electronic Word of Thing (eWOT) in this paper. Design/methodology/approach An experiment was conducted with customized e-commerce prototypes of eWOT. Structural equation modeling analysis was conducted to test the measurement model by using confirmatory factor analysis and thereafter a structural model to test the relationships amongst the latent variables. Findings This paper found that five consumer motivators (personal innovativeness, enjoyment of helping, anticipated extrinsic rewards, moral obligations and venting negative feelings) contribute to eWOT intention. Practical implications This research advances the understanding of human interaction with computer-generated product reviews and opens up avenues for future studies in online consumer behavior in the IoT context. Originality/value This paper presents motivators for eWOT intention to share IoT product data. This is done through a novel concept of an experimental IoT-based prototype, namely, eWOT. These eWOT reviews can be generated from the IoT products data by applying analytics and using natural language generation. To the best of the authors’ knowledge, no other study has been conducted on this subject.
APA, Harvard, Vancouver, ISO, and other styles
48

Atalay, Tugba. "E-commerce ecosystem." International Journal of Business Ecosystem & Strategy (2687-2293) 2, no. 2 (December 14, 2020): 15–24. http://dx.doi.org/10.36096/ijbes.v2i2.209.

Full text
Abstract:
Recent developments in communication and internet technologies have broader effects on supply chain activities. These developments made it mandatory to adopt technological changes and innovations in our existing understanding of electronic commerce activities. This study aims to develop a critical approach to the e-commerce ecosystem with fundamental concepts, business models, and security issues. This paper suggests companies ways of coping with adopting e-commerce activities, business models, and security issues.
APA, Harvard, Vancouver, ISO, and other styles
49

DJADI, Faiza. "CRIMES IN THE TIME OF COVID‎." RIMAK International Journal of Humanities and Social Sciences 03, no. 08 (November 1, 2021): 94–103. http://dx.doi.org/10.47832/2717-8293.8-3.8.

Full text
Abstract:
The spread of the Corona epidemic around the world has resulted in a deterioration in the economic and social situation and the imposition of restrictions on citizens, such as wandering and domestic isolation, as this epidemic has not only changed how people live, but also how crime occurs. Where it showed the spread of a new type of crime represented in domestic violence and fraud via the Internet, and a new type of theft appeared in the form of face masks, medical equipment and oxygen, which became more attractive targets for theft, and in this context the importance of the intervention of the penal legislator appears in the difficult moments that citizens are going through as a result of This is a dangerous epidemic to bring the concept of public order into the core of its primary concerns through criminalization and punishment. And when the World Health Organization announced the transformation of the Corona virus into a pandemic, the features of the criminal phenomenon changed on several levels, as traditional criminal activities became almost non-existent and new criminal activities appeared, especially at the level of electronic crimes, so the state quickly changed its legal arsenal by taking new legislative measures and approaches by reducing this phenomenon and knowing the most important causes and factors causing it, such as the increasing demand for resorting to e-commerce markets and the intense resort to digital handling of money and financial and banking balances, which contributed to the spread of fraud and fraud, in addition to the spread of anxiety, fear and isolation among people, which led to easy Their exploitation and exposure to fraud and fraud, all these factors led to the difficulties faced by the security services, forcing them to re-equip themselves to face a new security policy in order to reduce crime‎‎. Keywords: Coronavirus, Crime, Theft, Health Law, Penal Code.
APA, Harvard, Vancouver, ISO, and other styles
50

Yeo, Sook Fern, Cheng Ling Tan, and Kah Boon Lim. "Effects of Web-Based Shopping on Consumers' Buying Behaviour: A Consumer Perspective." 12th GLOBAL CONFERENCE ON BUSINESS AND SOCIAL SCIENCES 12, no. 1 (October 8, 2021): 59. http://dx.doi.org/10.35609/gcbssproceeding.2021.12(59).

Full text
Abstract:
Online shopping has become a popular trend nowadays because more and more people are buying products online due to the continuous development of technology. People's increasing concerns about online shopping have become the key element for changing their consumer buying behaviour. Due to the current situation of COVID19 and the changes of the era, many people buying products through online shopping. People think that buying products or services through online shopping can bring them convenience. Many companies move their business to online business because online business can help companies earn more sales and promote their products and services online to attract more new customers. Therefore, online shopping has become a popular trend nowadays, and more people are concern about online shopping. This is because consumers might consider the security of the websites, the usefulness, price, service quality of the products or services before they purchase through online shopping. With the rise of e-commerce, the number of online buyers is also increasing along with it. In 2020, the number of online buyers worldwide is expected to be 2.05 billion (Mohsin, 2020). Besides, a report shows the ranking of the mobile shopping apps in Southeast Asia. Lazada apps was the highest ranking in Malaysia, Singapore, Thailand and Philippines in 2019. For Vietnam, Shoppe apps was the highest ranking (Moey, 2019). According to Statista (2020), the report shows that in 2021 and 2022 the number of online shoppers in Malaysia is expected to reach 2.2 million and 2.53 million respectively. So, this research aims to make a clear understanding of consumer buying behaviour towards online shopping. The factors that have been shown in this research are trust, perceived risk, perceived ease of use, service quality and information. This research has discussed the fundamental research and clearly understand consumer buying behaviour and those factors that affect consumer buying behaviour towards online shopping. Keywords: Buying Behaviour, Trust, Perceived Risk, Perceived Ease Of Use, Service Quality
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography