[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/1576645.1576650guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Personal information and privacy in E-commerce application

Published: 29 December 2008 Publication History

Abstract

Today, the world are moving towards e-commerce application in completing their daily jobs. An e-commerce application becomes the preferred medium to complete the day's tasks. The potential for wide-ranging surveillance of all cyber activities presents a serious threat to information privacy. It gives more bad results in personal information privacy. In any e-commerce activities, all personal information should be controlled including their disclosure in order to protect its privacy. This paper discusses how personal information is used in e-commerce application and how it should be controlled.

References

[1]
Elisa Bertino, and Ravi Sandhu, "Database Security--Concepts, Approaches, and Challenges", IEEE Transactions on Dependable and Secure Computing, Vol. 2, No. 1, January-March 2005, pp 2-19.
[2]
Sabah S. Al-Fedaghi, "Privacy as a base for Confidentiality". Presented in the Fourth Workshop on the Economics of Information Security, Harvard University, Cambridge, MA, 2005.
[3]
R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu. Hippocratic databases. In The 28th International Conference on Very Large Databases (VLDB), 2002.
[4]
Goldberg, I., Wagner, D., Brewer, E., Privacy-Enhancing Technologies for the Internet. Proceedings, IEEE COMPCON ' 97, 1997, 103-109.
[5]
R. Anderson. Security Engineering: A Guide to Building Dependable Distributed System. Wiley Computer Publishing. New York, 2001 612 pp.
[6]
Gayathry Venkiteswaran. 2007. Poor privacy protection in Malaysia, says Privacy International. Centre for Independent Journalism (CIJ). Available at http://www.bangkit.net/2008/01/17/poor-privacy-protection-in-malaysia-says-privacy-international
[7]
Al-Fedaghi, S. S. 2007. Anatomy of personal information processing: application to the EU privacy directive. Int. J. Liability and Scientific Enquiry, Vol 2. No's 1/2, pp 129-138.
[8]
P. Guarda, N. Zannone, Towards the development of privacy-aware systems. Information Software Technology (2008).
[9]
Heikinen, K., Juha E., Pekka J., and Jari, P. Personalized View of personal information. WSEAS Transactions on Information Science and Applications, vol. 2, No. 4, 2004.
[10]
Alessandro, 2004. Security of Personal Information and Privacy: Technological Solutions and Economic Incentives. In J. Camp and R. Lewis (eds), The Economics Information Security, Kluwer.
[11]
Sabah S. Al-Fedaghi, "Privacy as a base for Confidentiality". Presented in the Fourth Workshop on the Economics of Information Security, Harvard University, Cambridge, MA, 2005.
[12]
S. Warren, L. Brandeis, The Right to Privacy, Harvard Law Review 4, pp. 193-220, 1890.
[13]
Martin S Olivier, Database Privacy Balancing Confidentiality, Integrity and Availability SIGKDD Explorations. Volume 4, Issue 2 - page 26.
[14]
NETWORK WIZARDS, Internet Domain Survey, January 1997 (visited October 11, 2008) http://www.nw.com/zone/WWW/report.html
[15]
Kang, Jerry, Information Privacy in Cyberspace Transactions. Stanford Law Review, Vol. 50, p. 1193, 1998.
[16]
Skinner, G., Han, S. & Chang, E. (2006). A conceptual framework for Information Security and Privacy. Proceedings of the 5th WSEAS International Conference on Applied Computer Science, Hangzhou, China. April 16-18, 2006. pp 410-415.
[17]
Skinner, G., Han, S. & Chang, E. (2006). A conceptual framework for Information Security and Privacy. Proceedings of the 5th WSEAS International Conference on Applied Computer Science, Hangzhou, China, April 16-18, 2006. pp 981-986.
[18]
Papathanassiou, A. E., mamakou, X. E. & kardaras, D. K. (2006). Privacy Online: Research and Recommendations. Proceedings of the 5th WSEAS International Conference on Telecommunications and Informatics, Istanbul, Turkey, May 27-29, 2006 (pp 309-314).
[19]
Ali, H. (2005). Security & Trust in Agent-enabled E-commerce : Survey. Proceedings of the 4th WSEAS Int. Conf. on Information Security, Communications and Computers, Tenerife, Spain, December 16-18, 2005 (pp 1-6).

Information & Contributors

Information

Published In

cover image Guide Proceedings
ISP'08: Proceedings of the 7th WSEAS international conference on Information security and privacy
December 2008
83 pages
ISBN:9789604740482
  • Editors:
  • Azami Zaharim,
  • Nikos Mastorakis,
  • Ioannis Gonos

Publisher

World Scientific and Engineering Academy and Society (WSEAS)

Stevens Point, Wisconsin, United States

Publication History

Published: 29 December 2008

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 21 Dec 2024

Other Metrics

Citations

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media