scholarly journals Cloud-Based Global Online Marketplaces Review on Trust and Security

Author(s):  
Osman Ghazali ◽  
Chun Yang Leow ◽  
Shahzad Qaiser ◽  
Nanthini Pattabiraman ◽  
Sathiyaroobaa Vasuthevan ◽  
...  

Customer disposition to data, nature of the information on site, protection<strong> </strong>concerns, trust, security concerns, and the notoriety of organization efficaciously affect the trust of Internet shoppers in the site. Two noteworthy and basic issues for e-commerce sites and consumers are trust as well as security. A belief that someone is good and honest and will not harm you, or something is safe and reliable is called trust; while security is an attempt to safeguard the data from unauthorized access. Information security is a vital management as well as technical requirement over the internet for effective and secure payment transaction activities. The safety of e-commerce resources from use, destruction, unauthorized access and alteration is known as E-commerce security so there is an urgent need to study its dimensions such as authenticity, integrity, availability, privacy, confidentiality and non-repudiation. This paper reports a review of four popular online marketplaces which are Alibaba, Amazon, eBay andTaoBao as case study on two main criteria namely building trust among users and ensuring security on the platform. Furthermore, we discuss the methods being used by each online marketplace to build trust and their unique way ofimproving the security. Finally, different ways of building trust and technique to ensure the security is presented in a tabular form for each online marketplace.

Author(s):  
Pratap Kumar Kumar ◽  
Sashank Kumar ◽  
Biresh Kumar

E-commerce (electronic commerce) or EC is the buying and selling of goods and services, or the transmitting of funds or data, over an electronic network, primarily the internet. These business transactions occur either as b to b (business-to-business), b to c (business-to-consumer), c to c (consumer-to-consumer) or c to b (consumer-to-business).It is the trading or in products or services using computer networks like Internet or online social networks. Here the Business conducted through the use of computers, telephones, fax machines, barcode readers, credit cards, automated teller machines (ATM) or other electronic appliances without the exchange of paper-based documents or physically moving to a shopping mall. It includes activities such as procurement, order entry, transaction processing, online payment, authentication, inventory control, order fulfillment, shipment, and customer support. When a buyer pays with a bank card swiped through a magnetic-stripe-reader, he or she is participating in e-commerce. E-commerce Security is a part of the Information Security framework and is specifically applied to the components that affect e- commerce including of Data security and other wider realms of the Information Security framework. E-commerce security is the protection of e-commerce assets from unauthorized access, use, alteration, or destruction. Dimensions of e-commerce security-Integrity, Non-repudiation, Authenticity, Confidentiality, Privacy, Availability. Ecommerce offers the banking industry great opportunity, but also creates a set of new risks and vulnerability such as security threats, hackings. Therefore it is an essential management and technical requirement for any efficient and effective Payment transaction activities over the internet. Due to the constant technological and business change and requires a coordinated match of algorithm and technical solutions. In this paper we discussed with Overview of security for e- commerce, various steps to place an order, Security purpose in E-commerce, various security issues in E-commerce, guidelines for secure online shopping etc.


2013 ◽  
Vol 2013 ◽  
pp. 1-7 ◽  
Author(s):  
Seung-hwan Ju ◽  
Hee-suk Seo ◽  
Sung-hyu Han ◽  
Jae-cheol Ryou ◽  
Jin Kwak

The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the user's fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility.


2008 ◽  
Vol 17 (4) ◽  
pp. 441-452 ◽  
Author(s):  
TED COOPER ◽  
JEFF COLLMANN ◽  
HENRY NEIDERMEIER

The privacy and security rules of the Health Insurance Portability and Accountability Act (HIPAA) of 1996 emphasize taking steps for protecting protected health information from unauthorized access and modification. Nonetheless, even organizations highly skilled in data security that comply with regulations and all good practices will suffer and must respond to breaches. This paper reports on a case study in responding to an important breach of the confidentiality and integrity of identifiable patient information of the Kaiser Internet Patient Portal known as “Kaiser Permanente Online” (KP Online). From the perspective of theories about highly reliable organizations, effective health information security programs must respond resiliently to as well as prospectively anticipate security breaches.


Data Science ◽  
2021 ◽  
pp. 1-17
Author(s):  
Muhammad Ghozy Al Haqqoni ◽  
Setia Pramana

Digital Economy in recent years, especially in Southeast Asia, including Indonesia, is growing rapidly. E-commerce is one part of the Digital Economy. BPS-Statistics Indonesia as a Non-ministerial Government Agency responsible directly to the president has conducted an E-commerce Survey in 2019. From this publication, it is concluded that the interest of Indonesian traders using the internet in selling in recent years has increased. So, the urgency of using e-commerce data in its application in official Statistics is increasingly needed. Several studies have carried out the application of e-commerce data in the calculation of The Consumer Price Index (CPI). In this research, e-commerce data is applied with a case study using the data from one of online marketplaces in Indonesia in calculating CPI at city level in Java. The purpose of this study is to compare the marketplace-based CPI data and BPS-Statistics’ survey-based CPI. The data is collected through web scraping techniques and followed by preprocessing data and analyzed descriptively. Web scraper that is built can be used in obtaining data. Commodity-level CPI with marketplace data tends to have relatively large prices which result in higher CPI being compared to BPS-Statistics CPI. Meanwhile, at the expenditure group level, the CPI between the two approaches is broadly similar in general.


2018 ◽  
Author(s):  
James Grimmelmann

78 Fordham Law Review 2799 (2010)The Internet is a semicommons. Private property in servers and network links coexists with a shared communications platform. This distinctive combination both explains the Internet's enormous success and illustrates some of its recurring problems.Building on Henry Smith's theory of the semicommons in the medieval open-field system, this essay explains how the dynamic interplay between private and common uses on the Internet enables it to facilitate worldwide sharing and collaboration without collapsing under the strain of misuse. It shows that key technical features of the Internet, such as its layering of protocols and the Web's division into distinct "sites," respond to the characteristic threats of strategic behavior in a semicommons. An extended case study of the Usenet distributed messaging system shows that not all semicommons on the Internet succeed; the continued success of the Internet depends on our ability to create strong online communities that can manage and defend the infrastructure on which they rely. Private and common both have essential roles to play in that task, a lesson recognized in David Post's and Jonathan Zittrain's recent books on the Internet.


2019 ◽  
Vol 7 (4) ◽  
pp. 435-442 ◽  
Author(s):  
Katherine M. Grillo ◽  
Daniel A. Contreras

AbstractAlthough archaeology has become increasingly concerned with engaging diverse publics, and has embraced the internet as a means of facilitating such engagement, attitudes towards Wikipedia have—understandably—been more ambivalent. Nevertheless, we argue here, Wikipedia's popularity and reach mean that archaeologists should actively engage with the website by adding and improving archaeological content. One way to do this is in the classroom: this paper provides a detailed how-to for instructors interested in having students create new Wikipedia content. We provide a case study in Wikipedia engagement from an advanced undergraduate course on African Archaeology, assess a program (Wiki Education) designed to help, and suggest further avenues for future outreach. We conclude that Wikipedia's utopian mission aligns with many of the goals of public archaeology, and argue that archaeology has much to gain by engaging with—rather than ignoring or even shunning—Wikipedia.


Author(s):  
Christine E. Cooper-Vince ◽  
Tommy Chou ◽  
Jami M. Furr ◽  
Anthony C. Puliafico ◽  
Jonathan S. Comer

2021 ◽  
Vol 13 (3) ◽  
pp. 451-476 ◽  
Author(s):  
Mona Khattab

With the outbreak of the COVID-19 pandemic, misinformation and unscientific interpretations flooded the internet. Seeking credible information in Egypt was paramount at the time. An answer to this quest was ‘Ask Nameesa’, an award-winning Egyptian-focused chatbot that utilizes Facebook Messenger to communicate with social media users in an individualized response engagement. It relies on information validated by WHO and the Egyptian Ministry of Health. This article examines the structure of Ask Nameesa as an example of infobots and studies the interactive engagement it offers users to provide health information. The study analyses data gathered by interviewing the founder and CEO of DXwand, the company that developed Ask Nameesa as well as content analysis of conversations with Ask Nameesa to assess its user engagement. The study aims at understanding the potential Ask Nameesa has in providing information literacy and tackling public demand for information.


2021 ◽  
pp. 1-13
Author(s):  
Fernando Rebollar ◽  
Rocío Aldeco-Perez ◽  
Marco A. Ramos

The general population increasingly uses digital services, meaning services which are delivered over the internet or an electronic network, and events such as pandemics have accelerated the need of using new digital services. Governments have also increased their number of digital services, however, these digital services still lack of sufficient information security, particularly integrity. Blockchain uses cryptographic techniques that allow decentralization and increase the integrity of the information it handles, but it still has disadvantages in terms of efficiency, making it incapable of implementing some digital services where a high rate of transactions are required. In order to increase its efficient, a multi-layer proposal based on blockchain is presented. It has four layers, where each layer specializes in a different type of information and uses properties of public blockchain and private blockchain. An statistical analysis is performed and the proposal is modeled showing that it maintains and even increases the integrity of the information while preserving the efficiency of transactions. Besides, the proposal can be flexible and adapt to different types of digital services. It also considers that voluntary nodes participate in the decentralization of information making it more secure, verifiable, transparent and reliable.


Sign in / Sign up

Export Citation Format

Share Document