Security Aspects in Online Purchasing Applications

Abstract views: 2030 / PDF downloads: 1384


  • Kanar R. Tariq IT Dept, Technical College of Informatics, Sulaimani Polytechnic University, Sulaimani, Iraq
  • Ribwar Bakhtyar IT Dept, Technical College of Informatics, Sulaimani Polytechnic University, University of Human Development
  • David I. Forsyth Light wave Communication Research Group (LCRG), Faculty of Electrical Engineering, Universiti Teknologi Malaysia
  • Riyam A. Johni Computer Science Dept, Kurdistan Technical Institute, Sulaimaniyah, KRG, Iraq.


Motivations to engage in retail shopping comprise both utilitarian and hedonic dimensions. Business to consumer e-commerce conducted via the mechanism of web-shopping offers an expanded opportunity for companies to create a cognitively and esthetical good shopping environment in ways not readily imitable in the no electronic shopping world. In this report the details key implementation aspects of a typical online purchasing system, hypothetically labeled SYSTEM X, and describe how it works - particularly regarding security issues. The report concludes with recommendations for users of similar online buying systems.


e-commerce, online shopping, security in online shopping, retail shopping.


[1] M. Niranjanamurthy, N. Kavyashree, S. Jagannath, and D. Chahar, "Analysis of e-commerce and m-commerce: advantages, limitations and security issues," International Journal of Advanced Research in Computer and Communication Engineering, vol. 2, 2013.
[2] D. L. Hoffman, T. P. Novak, and M. A. Peralta, "Information privacy in the marketspace: Implications for the commercial uses of anonymity on the Web," The Information Society, vol. 15, pp. 129-139, 1999.
[3] E. Hartono, C. W. Holsapple, K.-Y. Kim, K.-S. Na, and J. T. Simpson, "Measuring perceived security in B2C electronic commerce website usage: A respecification and validation," Decision Support Systems, vol. 62, pp. 11-21, 2014.
[4] N. M. Al-Slamy, "E-Commerce security," IJCSNS, vol. 8, p. 340, 2008.
[5] P. McCole, E. Ramsey, and J. Williams, "Trust considerations on attitudes towards online purchasing: The moderating effect of privacy and security concerns," Journal of Business Research, vol. 63, pp. 1018-1024, 2010.
[6] A. S. Lim, "Inter-consortia battles in mobile payments standardisation," Electronic Commerce Research and Applications, vol. 7, pp. 202-213, 2008.
[7] A. Mukherjee and P. Nath, "A model of trust in online relationship banking," International journal of bank marketing, vol. 21, pp. 5-15, 2003.
[8] M. J. Cotteleer, C. A. Cotteleer, and A. Prochnow, "Cutting checks: challenges and choices in B2B e-payments," Communications of the ACM, vol. 50, pp. 56-61, 2007.


How to Cite

K. R. Tariq, R. Bakhtyar, D. I. Forsyth, and R. A. Johni, “Security Aspects in Online Purchasing Applications”, KJAR, vol. 2, no. 3, pp. 103–105, Aug. 2017, doi: 10.24017/science.2017.3.9.

Article Metrics





Pure and Applied Science