A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Implementation Aspects of SET/EMV
[chapter]
2003
IFIP Advances in Information and Communication Technology
The threat of credit card fraud is arguably one of the most serious issues in e-commerce, since it makes consumers reluctant to engage in this alternative method of shopping. ...
The aim of this paper is to evaluate the effectiveness of SETIEMV integration for fraud reduction in e-commerce. In addition, this paper also considers the implementation feasibility of SETIEMV. ...
The intention of this paper is to evaluate the effectiveness of SET/EMV in B2C e-commerce.
2. OVERVIEW OF SET/EMV 2.1. ...
doi:10.1007/978-0-387-35617-4_20
fatcat:2jwkg2vt25fyhfs5d2cgibuqle
A user-centric anonymous authorisation framework in e-commerce environment
2004
Proceedings of the 6th international conference on Electronic commerce - ICEC '04
A novel user-centric authorisation framework suitable for e-commerce in an open environment is proposed. ...
The concepts of One-task Authorisation Key and Binding Signature are proposed to facilitate pseudonymity in authorisation service. ...
For B2C e-commerce and other applications on the Internet, we argue that access control systems should focus on authorisation rather than user authentication. ...
doi:10.1145/1052220.1052238
dblp:conf/ACMicec/AuVCL04
fatcat:po5tsze6kbaydogv3djketytwu
Risk and law in authentication
2014
Digital Evidence and Electronic Signature Law Review
Other states subsequently adopted digital signature specific statutes or statutes like those containing presumptions
RISK AND LAW IN AUTHENTICATION E-commerce rules have established, to the greatest ...
Authentication in commerce usually derives from relationship management, and relationship management in commerce, just as in society generally, is a complex entanglement of the numerous factors that define ...
RISK AND LAW IN AUTHENTICATION ...
doi:10.14296/deeslr.v3i0.1768
fatcat:ffjfs3qt55gzjb3lrg4uwnll5i
Certificate Based PKI and B2B E-Commerce: Suitable Match or Not?
[chapter]
2001
IFIP Advances in Information and Communication Technology
However, it is important to note that the need for security in the form of document authenticity, integrity and privacy was recognised in these EDI activities. ...
This is markedly different to the business-to-consumer (B2C) situation involving much smaller level transactions. ...
Recent legislation on electronic commerce such as the E-Sign Act (E-Sign Act, 2000) accord legal recognition upon electronic records and signatures. ...
doi:10.1007/0-306-46998-7_2
fatcat:pzffjx5g6jaorbfdzcm2diqpna
Integration of new electronic payment systems into B2C internet commerce
2011
2011 International Conference on Collaboration Technologies and Systems (CTS)
E-commerce has witnessed a considerable growth during last years which has created new financial needs and new payment scenarios. ...
In this paper we propose a new way to integrate a payment system that resolves many integration issues while guaranteeing payment system requirements. ...
ACKNOWLEDGMENT The authors wish to thank Nicolas Benady for his valuable suggestions for this paper and Limonetik and its financial support. ...
doi:10.1109/cts.2011.5928727
dblp:conf/cts/AbdellaouiPB11
fatcat:qf4mmaxlrjgafftnqtostn77ay
Critical success factors influencing e-commerce adoption in SMEs: A review and model
2017
International Journal of Advanced and Applied Sciences
This paper will list, discuss, analyse, and evaluate these e-commerce success factors and explains how it will allow business to integrate e-commerce in their businesses. ...
This paper attempts to identify and evaluate the success factors that influence e-commerce adoption in SMEs and develop a conceptual model based on identified factors. ...
A lack of trust on the part of internet users and SMEs when it comes to e-commerce is often assumed to be one of the many reasons for the disappointing development of Business to Consumers (B2C) in e-commerce ...
doi:10.21833/ijaas.2017.07.023
fatcat:vc6lgsccyzb5zm5i5cyhrquvui
The Development of an Information Society and Electronic Commerce in the European Union in the Context of Selected Documents of the EU and International Organisations
2012
Comparative Economic Research
In this article ...
Due to the rapidly growing use of the Internet, the development of electronic commerce (defined by the World Trade Organization as "the production, distribution, marketing, sale or delivery of goods and ...
such as e-commerce, e-finance, egovernment. ...
doi:10.2478/v10103-012-0006-x
fatcat:offhotuemrcuvd5ohipo27bsli
Authentication Re-visited: How Public Key Infrastructure Could Yet Prosper
2003
Bled eConference
This paper examines the kinds of assertions that e-business needs to be authenticated, and evaluates conventional and alternative public key infrastructures (PKI) against those requirements. ...
needs of e-business.. ...
Introduction Digital signatures and the public key infrastructure (PKI) that supports them were portrayed by purveyors of the dot.com myths as the means whereby trust was to be achieved in e-commerce and ...
dblp:conf/bled/Clarke03
fatcat:267qjfsswfbgnivdpvkwhblcx4
Building consumers' confidence in adopting e-commerce: a Malaysian case
2007
International Journal of Business and Systems Research
to influence consumers' overall confidence in e-commerce transactions. ...
On the basis of responses from 163 participants, it is concluded that the major concerns in e-commerce adoption are: security and privacy over online transaction process and trust and reliability of online ...
Concerns about security, trust, authentication, fraud and risk of losing money are often cited among the significant barriers in the growth of e-commerce. ...
doi:10.1504/ijbsr.2007.015378
fatcat:kuymji27ijfplafmgz7p3rkgsy
REVIEW ON SMART CITY IOT SECURITY USING BLOCKCHAIN
2022
International Journal of Engineering Applied Sciences and Technology
This is where blockchain comes in to secure the IoT data it generates. Blockchain and smart cities are still in their infancy, thus further study is required to integrate them. ...
Cities are becoming smarter these days thanks to IT and IoT devices, yet the data they generate is insecure due to IoT devices' limited processing capability. ...
E-commerce is aided by electronic commerce. ...
doi:10.33564/ijeast.2022.v07i06.053
fatcat:tuetphq6lvbdrhneeenap5r6cq
Towards a Framework for Federated Global Identity Management
2008
International Journal of Network Security
of the Web and the Grid and introducing the concept of what the EU IST Framework V initiative refers to as 'protected GC infrastructure'. ...
For the disparate community of global computing stake-holders the freedom obtained through the proposed technically innovative FeGIMa framework results in the simplicity of "Single Sign on and Single Service ...
It focuses on: research work on federated identity and specifically identification mechanisms relating authentication and authorisation for the Web and grid infrastructures. ...
dblp:journals/ijnsec/NaderiSAOMTP08
fatcat:r2uke4v6hzhbrh656yf4l2tuxu
Towards A Two-Sided Online Platform: The Case Of China's Largest Online Ticketing Firm
2013
European Conference on Information Systems
Their B2C implementation strategy was supported by an online B2C portal and IT distribution system, and this strategy was critical in overcoming China's environmental and institutional adversity in the ...
Founded in 1999 in Beijing, Damai had 8 million registered customers and 20,000 distribution agents across China. ...
"I was running delivery services for e-commerce companies in 1998, and I saw an opportunity to go into the online ticketing business. ...
dblp:conf/ecis/LeongPH13
fatcat:wlijlyuauncd7bhnsrmg45xq3i
Building blocks of e-commerce
2005
Sadhana (Bangalore)
The services provided over the internet infrastructure, namely, e-mail, world wide web etc., are described in what is called network services layer. ...
The major applications are customer-to-business (C2B) e-commerce, business-tobusiness (B2B) e-commerce, customer-to-consumer (C2C) e-commerce etc. We briefly explain these modes. ...
One of the earliest B2C e-commerce application was a book shop. ...
doi:10.1007/bf02706240
fatcat:q62fzbvdinfwhb6zz2scvjbgje
PKI in Government Identity Management Systems
2011
International journal of network security and its applications
It primarily shows the operational model of the PKI implementation that is indented to integrate the federal government identity management infrastructure with e-government initiatives owners in the country ...
The study concludes that governments in the Middle East region have the trust in PKI technology to support their e-government services and expanding outreach and population trust, if of course accompanied ...
e-government and e-commerce initiatives. ...
doi:10.5121/ijnsa.2011.3306
fatcat:tch5g2bdv5e43maqg2vy3gq36i
Phishing within e-commerce: A trust and confidence game
2010
2010 Information Security for South Africa
E-Commerce has been plagued with problems since its inception and this paper examines one of these problems: The lack of user trust in E-commerce created by the risk of phishing. ...
By referring to the Common Criteria Security Model, various critical security areas within e-commerce are identified, and with that, the areas of vulnerability and weakness. ...
The two communicators in the online world of e-commerce are the user and the e-commerce website. ...
doi:10.1109/issa.2010.5588333
fatcat:leevqtryfjapja73zreka22kei
« Previous
Showing results 1 — 15 out of 172 results