Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








172 Hits in 3.7 sec

Implementation Aspects of SET/EMV [chapter]

Pita Jarupunphol, Chris J. Mitchell
2003 IFIP Advances in Information and Communication Technology  
The threat of credit card fraud is arguably one of the most serious issues in e-commerce, since it makes consumers reluctant to engage in this alternative method of shopping.  ...  The aim of this paper is to evaluate the effectiveness of SETIEMV integration for fraud reduction in e-commerce. In addition, this paper also considers the implementation feasibility of SETIEMV.  ...  The intention of this paper is to evaluate the effectiveness of SET/EMV in B2C e-commerce. 2. OVERVIEW OF SET/EMV 2.1.  ... 
doi:10.1007/978-0-387-35617-4_20 fatcat:2jwkg2vt25fyhfs5d2cgibuqle

A user-centric anonymous authorisation framework in e-commerce environment

Richard Au, Harikrishna Vasanta, Kim-Kwang Raymond Choo, Mark Looi
2004 Proceedings of the 6th international conference on Electronic commerce - ICEC '04  
A novel user-centric authorisation framework suitable for e-commerce in an open environment is proposed.  ...  The concepts of One-task Authorisation Key and Binding Signature are proposed to facilitate pseudonymity in authorisation service.  ...  For B2C e-commerce and other applications on the Internet, we argue that access control systems should focus on authorisation rather than user authentication.  ... 
doi:10.1145/1052220.1052238 dblp:conf/ACMicec/AuVCL04 fatcat:po5tsze6kbaydogv3djketytwu

Risk and law in authentication

Paul R. Schapper, Mercedes Rivolta, Joao Veiga Malta
2014 Digital Evidence and Electronic Signature Law Review  
Other states subsequently adopted digital signature specific statutes or statutes like those containing presumptions RISK AND LAW IN AUTHENTICATION E-commerce rules have established, to the greatest  ...  Authentication in commerce usually derives from relationship management, and relationship management in commerce, just as in society generally, is a complex entanglement of the numerous factors that define  ...  RISK AND LAW IN AUTHENTICATION  ... 
doi:10.14296/deeslr.v3i0.1768 fatcat:ffjfs3qt55gzjb3lrg4uwnll5i

Certificate Based PKI and B2B E-Commerce: Suitable Match or Not? [chapter]

Kok Ming Ang, William J. Caelli
2001 IFIP Advances in Information and Communication Technology  
However, it is important to note that the need for security in the form of document authenticity, integrity and privacy was recognised in these EDI activities.  ...  This is markedly different to the business-to-consumer (B2C) situation involving much smaller level transactions.  ...  Recent legislation on electronic commerce such as the E-Sign Act (E-Sign Act, 2000) accord legal recognition upon electronic records and signatures.  ... 
doi:10.1007/0-306-46998-7_2 fatcat:pzffjx5g6jaorbfdzcm2diqpna

Integration of new electronic payment systems into B2C internet commerce

Refka Abdellaoui, Marc Pasquet, Olivier Berthelier
2011 2011 International Conference on Collaboration Technologies and Systems (CTS)  
E-commerce has witnessed a considerable growth during last years which has created new financial needs and new payment scenarios.  ...  In this paper we propose a new way to integrate a payment system that resolves many integration issues while guaranteeing payment system requirements.  ...  ACKNOWLEDGMENT The authors wish to thank Nicolas Benady for his valuable suggestions for this paper and Limonetik and its financial support.  ... 
doi:10.1109/cts.2011.5928727 dblp:conf/cts/AbdellaouiPB11 fatcat:qf4mmaxlrjgafftnqtostn77ay

Critical success factors influencing e-commerce adoption in SMEs: A review and model

et al. Ajmal
2017 International Journal of Advanced and Applied Sciences  
This paper will list, discuss, analyse, and evaluate these e-commerce success factors and explains how it will allow business to integrate e-commerce in their businesses.  ...  This paper attempts to identify and evaluate the success factors that influence e-commerce adoption in SMEs and develop a conceptual model based on identified factors.  ...  A lack of trust on the part of internet users and SMEs when it comes to e-commerce is often assumed to be one of the many reasons for the disappointing development of Business to Consumers (B2C) in e-commerce  ... 
doi:10.21833/ijaas.2017.07.023 fatcat:vc6lgsccyzb5zm5i5cyhrquvui

The Development of an Information Society and Electronic Commerce in the European Union in the Context of Selected Documents of the EU and International Organisations

Jacek Hibner
2012 Comparative Economic Research  
In this article  ...  Due to the rapidly growing use of the Internet, the development of electronic commerce (defined by the World Trade Organization as "the production, distribution, marketing, sale or delivery of goods and  ...  such as e-commerce, e-finance, egovernment.  ... 
doi:10.2478/v10103-012-0006-x fatcat:offhotuemrcuvd5ohipo27bsli

Authentication Re-visited: How Public Key Infrastructure Could Yet Prosper

Roger Clarke
2003 Bled eConference  
This paper examines the kinds of assertions that e-business needs to be authenticated, and evaluates conventional and alternative public key infrastructures (PKI) against those requirements.  ...  needs of e-business..  ...  Introduction Digital signatures and the public key infrastructure (PKI) that supports them were portrayed by purveyors of the dot.com myths as the means whereby trust was to be achieved in e-commerce and  ... 
dblp:conf/bled/Clarke03 fatcat:267qjfsswfbgnivdpvkwhblcx4

Building consumers' confidence in adopting e-commerce: a Malaysian case

Mohiuddin Ahmed, Ramlah Hussein, Rashidah Minakhatun, Rafikul Islam
2007 International Journal of Business and Systems Research  
to influence consumers' overall confidence in e-commerce transactions.  ...  On the basis of responses from 163 participants, it is concluded that the major concerns in e-commerce adoption are: security and privacy over online transaction process and trust and reliability of online  ...  Concerns about security, trust, authentication, fraud and risk of losing money are often cited among the significant barriers in the growth of e-commerce.  ... 
doi:10.1504/ijbsr.2007.015378 fatcat:kuymji27ijfplafmgz7p3rkgsy

REVIEW ON SMART CITY IOT SECURITY USING BLOCKCHAIN

Gurmanpreet Kaur Dhanju, Shobha Tyagi, Aditya Kumar, Ishaan Asthana, Aditya Taluja, Manav Rachna International Institute of research and studies
2022 International Journal of Engineering Applied Sciences and Technology  
This is where blockchain comes in to secure the IoT data it generates. Blockchain and smart cities are still in their infancy, thus further study is required to integrate them.  ...  Cities are becoming smarter these days thanks to IT and IoT devices, yet the data they generate is insecure due to IoT devices' limited processing capability.  ...  E-commerce is aided by electronic commerce.  ... 
doi:10.33564/ijeast.2022.v07i06.053 fatcat:tuetphq6lvbdrhneeenap5r6cq

Towards a Framework for Federated Global Identity Management

Mehrdad Naderi, Jawed I. A. Siddiqi, Babak Akhgar, Wolfgang Orth, Norbert Meyer, Miika Tuisku, Gregor Pipan
2008 International Journal of Network Security  
of the Web and the Grid and introducing the concept of what the EU IST Framework V initiative refers to as 'protected GC infrastructure'.  ...  For the disparate community of global computing stake-holders the freedom obtained through the proposed technically innovative FeGIMa framework results in the simplicity of "Single Sign on and Single Service  ...  It focuses on: research work on federated identity and specifically identification mechanisms relating authentication and authorisation for the Web and grid infrastructures.  ... 
dblp:journals/ijnsec/NaderiSAOMTP08 fatcat:r2uke4v6hzhbrh656yf4l2tuxu

Towards A Two-Sided Online Platform: The Case Of China's Largest Online Ticketing Firm

Carmen Mei Ling Leong, Shan L. Pan, Jinsong Huang
2013 European Conference on Information Systems  
Their B2C implementation strategy was supported by an online B2C portal and IT distribution system, and this strategy was critical in overcoming China's environmental and institutional adversity in the  ...  Founded in 1999 in Beijing, Damai had 8 million registered customers and 20,000 distribution agents across China.  ...  "I was running delivery services for e-commerce companies in 1998, and I saw an opportunity to go into the online ticketing business.  ... 
dblp:conf/ecis/LeongPH13 fatcat:wlijlyuauncd7bhnsrmg45xq3i

Building blocks of e-commerce

V. Rajaraman
2005 Sadhana (Bangalore)  
The services provided over the internet infrastructure, namely, e-mail, world wide web etc., are described in what is called network services layer.  ...  The major applications are customer-to-business (C2B) e-commerce, business-tobusiness (B2B) e-commerce, customer-to-consumer (C2C) e-commerce etc. We briefly explain these modes.  ...  One of the earliest B2C e-commerce application was a book shop.  ... 
doi:10.1007/bf02706240 fatcat:q62fzbvdinfwhb6zz2scvjbgje

PKI in Government Identity Management Systems

Ali M. Al Khouri
2011 International journal of network security and its applications  
It primarily shows the operational model of the PKI implementation that is indented to integrate the federal government identity management infrastructure with e-government initiatives owners in the country  ...  The study concludes that governments in the Middle East region have the trust in PKI technology to support their e-government services and expanding outreach and population trust, if of course accompanied  ...  e-government and e-commerce initiatives.  ... 
doi:10.5121/ijnsa.2011.3306 fatcat:tch5g2bdv5e43maqg2vy3gq36i

Phishing within e-commerce: A trust and confidence game

Greg Megaw, Stephen V. Flowerday
2010 2010 Information Security for South Africa  
E-Commerce has been plagued with problems since its inception and this paper examines one of these problems: The lack of user trust in E-commerce created by the risk of phishing.  ...  By referring to the Common Criteria Security Model, various critical security areas within e-commerce are identified, and with that, the areas of vulnerability and weakness.  ...  The two communicators in the online world of e-commerce are the user and the e-commerce website.  ... 
doi:10.1109/issa.2010.5588333 fatcat:leevqtryfjapja73zreka22kei
« Previous Showing results 1 — 15 out of 172 results