Security Aspects in Online Purchasing Applications

https://doi.org/10.24017/science.2017.3.9

Abstract views: 2051 / PDF downloads: 1413

Authors

  • Kanar R. Tariq IT Dept, Technical College of Informatics, Sulaimani Polytechnic University, Sulaimani, Iraq
  • Ribwar Bakhtyar IT Dept, Technical College of Informatics, Sulaimani Polytechnic University, University of Human Development
  • David I. Forsyth Light wave Communication Research Group (LCRG), Faculty of Electrical Engineering, Universiti Teknologi Malaysia
  • Riyam A. Johni Computer Science Dept, Kurdistan Technical Institute, Sulaimaniyah, KRG, Iraq.

Abstract

Motivations to engage in retail shopping comprise both utilitarian and hedonic dimensions. Business to consumer e-commerce conducted via the mechanism of web-shopping offers an expanded opportunity for companies to create a cognitively and esthetical good shopping environment in ways not readily imitable in the no electronic shopping world. In this report the details key implementation aspects of a typical online purchasing system, hypothetically labeled SYSTEM X, and describe how it works - particularly regarding security issues. The report concludes with recommendations for users of similar online buying systems.

Keywords:

e-commerce, online shopping, security in online shopping, retail shopping.

References

[1] M. Niranjanamurthy, N. Kavyashree, S. Jagannath, and D. Chahar, "Analysis of e-commerce and m-commerce: advantages, limitations and security issues," International Journal of Advanced Research in Computer and Communication Engineering, vol. 2, 2013.
[2] D. L. Hoffman, T. P. Novak, and M. A. Peralta, "Information privacy in the marketspace: Implications for the commercial uses of anonymity on the Web," The Information Society, vol. 15, pp. 129-139, 1999.
https://doi.org/10.1080/019722499128583
[3] E. Hartono, C. W. Holsapple, K.-Y. Kim, K.-S. Na, and J. T. Simpson, "Measuring perceived security in B2C electronic commerce website usage: A respecification and validation," Decision Support Systems, vol. 62, pp. 11-21, 2014.
https://doi.org/10.1016/j.dss.2014.02.006
[4] N. M. Al-Slamy, "E-Commerce security," IJCSNS, vol. 8, p. 340, 2008.
[5] P. McCole, E. Ramsey, and J. Williams, "Trust considerations on attitudes towards online purchasing: The moderating effect of privacy and security concerns," Journal of Business Research, vol. 63, pp. 1018-1024, 2010.
https://doi.org/10.1016/j.jbusres.2009.02.025
[6] A. S. Lim, "Inter-consortia battles in mobile payments standardisation," Electronic Commerce Research and Applications, vol. 7, pp. 202-213, 2008.
https://doi.org/10.1016/j.elerap.2007.05.003
[7] A. Mukherjee and P. Nath, "A model of trust in online relationship banking," International journal of bank marketing, vol. 21, pp. 5-15, 2003.
https://doi.org/10.1108/02652320310457767
[8] M. J. Cotteleer, C. A. Cotteleer, and A. Prochnow, "Cutting checks: challenges and choices in B2B e-payments," Communications of the ACM, vol. 50, pp. 56-61, 2007.
https://doi.org/10.1145/1247001.1247006

Downloads

How to Cite

[1]
K. R. Tariq, R. Bakhtyar, D. I. Forsyth, and R. A. Johni, “Security Aspects in Online Purchasing Applications”, KJAR, vol. 2, no. 3, pp. 103–105, Aug. 2017, doi: 10.24017/science.2017.3.9.

Article Metrics

Published

27-08-2017