CAPTURING SECURITY MECHANISMS APPLIED TO ECOMMERCE: AN ANALYSIS OF TRANSACTION SECURITY

被引:1
|
作者
Canlas, Ranie B. [1 ]
机构
[1] Don Honorio Ventura State Univ, Grad Sch & Coll Comp Studies, Bacolor, Philippines
关键词
Security Mechanism; Ecommerce Security; Descriptive Research;
D O I
10.33832/ijsia.2021.15.1.01
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Electronic commerce or Ecommerce involves commercial transactions of products or services through the use of computer networks. Generally, Ecommerce may operate on different settings such as online electronic environment, offline electronic scheme, and mobile platform. In all of the mentioned settings, security is one of the most crucial considerations. It is in this context that this research study is conducted in order to look over the leading security mechanisms that are implemented on Ecommerce. Specifically, the study aims to: a) identify the primary concerns involving Ecommerce security; b) identify measures to ensure security on Ecommerce transactions; and c) identify key factors involved in developing schemes for securing Ecommerce transactions. This research utilized descriptive methodology. Secondary data from several published literatures were reviewed with emphasis on promoting secured transactions to analyze the significance of the discoveries of the investigations introduced and their influence in promoting security. Each of the reviewed tools and protocols provided strengths and limitations depending on where they were applied. Based on the findings, it was concluded that aside from strong security features, the major advantages of reviewed protocols and tools focused on lesser costs on computation and communication processes. To further strengthen the security of transactions, combinations of these protocols and schemes may be considered.
引用
收藏
页码:1 / 10
页数:10
相关论文
共 50 条
  • [41] Security Model for the MCTO Data Transaction Management
    Abdul-Mehdi, Ziyad Tariq
    Byamba, Byambasuren
    Hamarsheh, Mohammad M. N.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (06): : 140 - 149
  • [42] Transaction Costs and Security Institutions: Unravelling the ESDP
    Mayer, Sebastian
    POLITISCHE VIERTELJAHRESSCHRIFT, 2013, 54 (02) : 396 - 398
  • [43] Transaction Costs and Security Institutions: Unravelling the ESDP
    Jacobs, D.
    JCMS-JOURNAL OF COMMON MARKET STUDIES, 2012, 50 (02) : 359 - 360
  • [44] Global transaction control with multilevel security environments
    Jeong, Hyun-Cheol
    FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, PROCEEDINGS, 2006, 4223 : 660 - 663
  • [46] IIS Security Mechanisms
    Zhang Ping
    Zhang Yan
    Wu Zhengjiang
    Du Weifeng
    2010 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS (IITSI 2010), 2010, : 619 - 622
  • [47] Alternative security mechanisms
    Sahai, I.M.
    Independent Energy, 1997, 27 (05):
  • [48] An Introduction to Framework of Security Event Capturing and Tracking
    Hsin, Wei-Cheng
    Shen, Jia-Yu
    Li, Shiou-Chi
    Ke, Yu-Hao
    Huang, Jen-Wei
    2015 8TH INTERNATIONAL CONFERENCE ON UBI-MEDIA COMPUTING (UMEDIA) CONFERENCE PROCEEDINGS, 2015, : 339 - 343
  • [49] Capturing Tacit Knowledge in Security Operation Centers
    Cho, Selina Y.
    Happa, Jassim
    Creese, Sadie
    IEEE ACCESS, 2020, 8 (08): : 42021 - 42041
  • [50] Capturing semantics for information security and privacy assurance
    Chowdhury, Mohammad M. R.
    Chamizo, Javier
    Noll, Josef
    Gomez, Juan Miguel
    UBIQUITOUS INTELLIGENCE AND COMPUTING, PROCEEDINGS, 2008, 5061 : 105 - +