[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Kuruwitaarachchi et al., 2019 - Google Patents

A systematic review of security in electronic commerce-threats and frameworks

Kuruwitaarachchi et al., 2019

View PDF
Document ID
5958868277384692935
Author
Kuruwitaarachchi N
Abeygunawardena P
Rupasingha L
Udara S
Publication year
Publication venue
Global Journal of Computer Science and Technology

External Links

Snippet

There is a remarkable scope for more streamlined living through an increase of e-platforms especially e-commerce, but this coincides with an increase in security concerns since the global market place is virtual and anonymous. Therefore, users have to trust the online …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping
    • G06Q30/0641Shopping interfaces
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping
    • G06Q30/0609Buyer or seller confidence or verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/02Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/12Payment architectures specially adapted for electronic shopping systems

Similar Documents

Publication Publication Date Title
Kuruwitaarachchi et al. A systematic review of security in electronic commerce-threats and frameworks
Badotra et al. A systematic review on security of E-commerce systems
Saini et al. Cyber-crimes and their impacts: A review
Khan Cyber security issues and challenges in E-commerce
Omariba et al. Security and privacy of electronic banking
Sengupta et al. e-Commerce security—A life cycle approach
Briones et al. Review of the main security problems with multi-agent systems used in e-commerce applications
Matbouli et al. An overview on web security threats and impact to e-commerce success
Bhatia et al. Growing aspects of cyber security in e-commerce
Badve et al. Reviewing the security features in contemporary security policies and models for multiple platforms
Sadekin et al. Security of e-banking in Bangladesh
Hussain A study of information security in e-commerce applications
Hutchings Computer security threats faced by small businesses in Australia
Moscove E-business security and controls
Kohli E-COMMERCE: TRANSACTION SECURITY ISSUE AND CHALLENGES.
Reuvid The Secure Online Business Handbook: A Practical Guide to Risk Management and Business Continuity
McCusker E‐Commerce Security: The Birth of Technology, the Death of Common Sense?
MIRIYEVA SECURITY IN ELECTRONIC COMMERCE AND ONLINE PAYMENTS
Hinde Identity theft & fraud
Zhang et al. Controlling Network Risk in E-commerce
Marta et al. Risks and Vulnerabilities in Online Commerce
Bamrara Cyber Crime Threats, Strategies to Overcome, and Future Trends in the Banking Industry
Srividhya et al. Revolution of Digital Transformation Technology: Artificial Intelligence and Blockchain Technology in Cyber Security
Tamang et al. Different Cybercrimes and their Solution for Common People
Purwawijaya et al. The Significant Rise In Cybercrime Can Be Attributed To Vulnerabilities In Cybersecurity