Kuruwitaarachchi et al., 2019 - Google Patents
A systematic review of security in electronic commerce-threats and frameworksKuruwitaarachchi et al., 2019
View PDF- Document ID
- 5958868277384692935
- Author
- Kuruwitaarachchi N
- Abeygunawardena P
- Rupasingha L
- Udara S
- Publication year
- Publication venue
- Global Journal of Computer Science and Technology
External Links
Snippet
There is a remarkable scope for more streamlined living through an increase of e-platforms especially e-commerce, but this coincides with an increase in security concerns since the global market place is virtual and anonymous. Therefore, users have to trust the online …
- 238000001514 detection method 0 description 11
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping
- G06Q30/0641—Shopping interfaces
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping
- G06Q30/0609—Buyer or seller confidence or verification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/02—Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/12—Payment architectures specially adapted for electronic shopping systems
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kuruwitaarachchi et al. | A systematic review of security in electronic commerce-threats and frameworks | |
Badotra et al. | A systematic review on security of E-commerce systems | |
Saini et al. | Cyber-crimes and their impacts: A review | |
Khan | Cyber security issues and challenges in E-commerce | |
Omariba et al. | Security and privacy of electronic banking | |
Sengupta et al. | e-Commerce security—A life cycle approach | |
Briones et al. | Review of the main security problems with multi-agent systems used in e-commerce applications | |
Matbouli et al. | An overview on web security threats and impact to e-commerce success | |
Bhatia et al. | Growing aspects of cyber security in e-commerce | |
Badve et al. | Reviewing the security features in contemporary security policies and models for multiple platforms | |
Sadekin et al. | Security of e-banking in Bangladesh | |
Hussain | A study of information security in e-commerce applications | |
Hutchings | Computer security threats faced by small businesses in Australia | |
Moscove | E-business security and controls | |
Kohli | E-COMMERCE: TRANSACTION SECURITY ISSUE AND CHALLENGES. | |
Reuvid | The Secure Online Business Handbook: A Practical Guide to Risk Management and Business Continuity | |
McCusker | E‐Commerce Security: The Birth of Technology, the Death of Common Sense? | |
MIRIYEVA | SECURITY IN ELECTRONIC COMMERCE AND ONLINE PAYMENTS | |
Hinde | Identity theft & fraud | |
Zhang et al. | Controlling Network Risk in E-commerce | |
Marta et al. | Risks and Vulnerabilities in Online Commerce | |
Bamrara | Cyber Crime Threats, Strategies to Overcome, and Future Trends in the Banking Industry | |
Srividhya et al. | Revolution of Digital Transformation Technology: Artificial Intelligence and Blockchain Technology in Cyber Security | |
Tamang et al. | Different Cybercrimes and their Solution for Common People | |
Purwawijaya et al. | The Significant Rise In Cybercrime Can Be Attributed To Vulnerabilities In Cybersecurity |