Academic literature on the topic 'E-commerce security concerns'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'E-commerce security concerns.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "E-commerce security concerns"

1

Akinola, O., and O. Asaolu. "A trust, privacy and security model for e-commerce in Nigeria." Nigerian Journal of Technology 42, no. 1 (2023): 152–59. http://dx.doi.org/10.4314/njt.v42i1.19.

Full text
Abstract:
Today, digital technologies has permeated every sector of human life from communication to medicine to education to transportation and most recently shopping.. The mode of buying and selling by Nigerians have moved from traditional to digital, whereby consumers buy and sell goods online. The online presence of commerce is known as Electronic commerce or E-commerce and it is an initiative amongst other emerging digital sectors in Nigeria that has witnessed substantive growth recently. However, the issues of security, privacy of data and the trust endeared by users on the initiative remains a ch
APA, Harvard, Vancouver, ISO, and other styles
2

Saeed, Saqib. "A Customer-Centric View of E-Commerce Security and Privacy." Applied Sciences 13, no. 2 (2023): 1020. http://dx.doi.org/10.3390/app13021020.

Full text
Abstract:
Business organizations have huge potential to increase their customer base by offering e-commerce services, especially in the post-pandemic era. Ensuring secure e-commerce applications plays an important role in increasing customer base. To develop appropriate policies and secure technological infrastructures, business organizations first need to establish an understanding of the reservations of their customers toward e-commerce, as well as their perception of security and privacy of e-commerce applications. In this paper, we present the results of an empirical study of e-commerce customers co
APA, Harvard, Vancouver, ISO, and other styles
3

Picoto, Winnie Ng, Joana Carlota Abreu, and Patricia Martins. "Integrating the Internet of Things Into E-Commerce." International Journal of E-Business Research 19, no. 1 (2023): 1–18. http://dx.doi.org/10.4018/ijebr.321647.

Full text
Abstract:
The emergence of the internet of things (IoT) is changing the behavior of people, companies, and their businesses. The IoT can enhance e-commerce by reducing the gaps between the virtual and physical worlds. Although the integration of the IoT into e-commerce has several positive effects, security concerns are greater in the IoT context than in traditional e-commerce settings. The proposed research model is based on the unified theory of acceptance and use of technology 2 (UTAUT2) along with trust, privacy, and confidential data concerns to explain the intention to use the IoT in e-commerce. T
APA, Harvard, Vancouver, ISO, and other styles
4

Gurung, Anil, and M. K. Raja. "Online privacy and security concerns of consumers." Information & Computer Security 24, no. 4 (2016): 348–71. http://dx.doi.org/10.1108/ics-05-2015-0020.

Full text
Abstract:
Purpose Privacy and security concerns of consumers have been touted as one of the hindrances to the growth of e-commerce. These concerns increase the risk perception of consumers. Understanding the consequences of privacy and security concerns and their relationship to risk perceptions may provide a solution. The relationship between privacy and security is investigated using the theory of planned behavior. The study aims to examine the relationship of trust, privacy and security concerns to the risk perception adoption of e-commerce. The results from a survey validate the model. Design/method
APA, Harvard, Vancouver, ISO, and other styles
5

Oreoluwa Omoike. "Designing a secure and high-performing e-commerce platform for public cloud." International Journal of Science and Research Archive 9, no. 2 (2023): 1008–13. http://dx.doi.org/10.30574/ijsra.2023.9.2.0525.

Full text
Abstract:
This study explores the design and implementation of a secure and high-performing e-commerce platform using public cloud infrastructure. The rising popularity of e-commerce has emphasized the need for scalable, cost-efficient, and secure platforms that can meet the dynamic needs of users. Cloud computing provides the necessary resources for building such platforms, but security and performance remain critical concerns. This paper examines strategies for securing an e-commerce platform hosted on a public cloud while optimizing for performance. Data collection, instrumentations, and analysis wer
APA, Harvard, Vancouver, ISO, and other styles
6

Arora, Dhruv. "DATA PRIVACY ISSUES WITH E-COMMERCE." International Journal of Social Science & Economic Research 08, no. 05 (2023): 1167–74. http://dx.doi.org/10.46609/ijsser.2023.v08i05.020.

Full text
Abstract:
This paper focuses on the data privacy issues that arise with the utilization of e-commerce platforms, focusing on the challenges and ability to protect a consumer’s data in an online transaction. As the popularity of e-commerce continues to grow and new platforms tend to rise, security and privacy concerns of personal information become supreme. This paper explores aspects of data privacy and multiple criteria of concerns that come along with it. It also discusses note-able privacy breaching incidents in this industry and how one can be safe within such digital bubble. Additionally, this pape
APA, Harvard, Vancouver, ISO, and other styles
7

Shaqrah, Amin A. "Antecedents of Security Pillars in E-Commerce Applications." International Journal of Business Data Communications and Networking 7, no. 1 (2011): 36–51. http://dx.doi.org/10.4018/jbdcn.2011010102.

Full text
Abstract:
This paper investigates the relationship between internet security and e-business competence at banking and exchange firms in Jordan. The proposed conceptual model examines the antecedents and consequences of e-business competence and tests its empirical validity. The sample of 152 banking and exchange firms tests the posited structural equation model. The results consistently support the validity of the proposed conceptual model, the results also found that organizations realize the importance of e- business and are willing to proceed further with e-business. Beyond concerns about internet se
APA, Harvard, Vancouver, ISO, and other styles
8

Fang, Ruian. "China’s Concerns on the Core Issues of Digital Trade." Advances in Economics and Management Research 4, no. 1 (2023): 59. http://dx.doi.org/10.56028/aemr.4.1.59.2023.

Full text
Abstract:
In the current era of digital trade, more and more regional free trade agreements regulate e-commerce or cross-border flows of data, and the WTO has started plurilateral e-commerce negotiations as well. With the gradual emergence of China’s industrial advantages in the field of cross-border e-commerce, it has increasingly expressed its point of views on digital trade rules on various occasions. China is currently in RCEP and may soon join CPTPP and DEPA. Moreover, China has already put forward its claims in the WTO. However, although China has introduced a lot of laws and regulations in the fi
APA, Harvard, Vancouver, ISO, and other styles
9

Arif, Zainal, Zulfitria, Oneng Nurul Bariyah, Sopa, Asep Supyadillah, and Dina Febriani Darmansyah. "Blockchain as a Facilitator For Secure Migration: A Case Study of E-Commerce in Indonesia." Revista de Gestão Social e Ambiental 18, no. 2 (2024): e06342. http://dx.doi.org/10.24857/rgsa.v18n2-164.

Full text
Abstract:
Objective: The objective of this study is to investigate the role of blockchain technology as a facilitator for secure data migration in the Indonesian e-commerce sector, with the aim of Amidst the growing concerns over data security and privacy in online transactions, blockchain emerges as a potential solution due to its inherent characteristics of decentralization, transparency, and immutability. Theoretical Framework: In this topic, the main concepts and theories that underpin the research are presented. this study delves into the multifaceted role of blockchain technology in e-commerce, pa
APA, Harvard, Vancouver, ISO, and other styles
10

D. Sandhya rani, Dr.T. Vara Lakshmi, and K. Triveni. "Mobile E-Commerce Evolution an Overview of Online Shopping Trends." International Research Journal on Advanced Engineering and Management (IRJAEM) 2, no. 05 (2024): 1592–95. http://dx.doi.org/10.47392/irjaem.2024.0218.

Full text
Abstract:
E-commerce is a huge component of the digital economy as the business market landscape is now based on digital competition. E-commerce contributes to national growth by generating jobs and levying import taxes. However, because of internet-related difficulties, concerns about online payment security, and trust issues, developing nations are trailing behind in the adoption of e-commerce. Not with standing these obstacles, the goal of this research was to comprehend the variables affecting the uptake of e-commerce in emerging nations. The advantages and difficulties of adoption serve as the foun
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "E-commerce security concerns"

1

Vasileiadis, Alexios. "Security concerns and trust in the adoption of m-commerce." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2014. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2014~D_20140113_131752-55666.

Full text
Abstract:
This work is of theoretical and practical importance, that is, generation of new knowledge associated with mobile commerce adoption in terms of security concerns and trust which will help not only future researchers but also e-businesses. Despite the fact researchers have examined the adoption of m-commerce in a holistic way, the author found there was no research focusing solely and in-depth on the determinants of trust and perceived risk. The problem was to examine how the above determinants affect the intention to adopt m-commerce. The objects are mobile commerce, security concerns and trus
APA, Harvard, Vancouver, ISO, and other styles
2

(14009941), Wanpiti Fangrith. "Development of e-commerce strategies derived from a responsive security confidence to optimize online trading activity in Thailand." Thesis, 2011. https://figshare.com/articles/thesis/Development_of_e-commerce_strategies_derived_from_a_responsive_security_confidence_to_optimize_online_trading_activity_in_Thailand/21397632.

Full text
Abstract:
<p>Security of online transactions is a key factor that affects a potential buyer's decision to make purchases online. In Thailand, security has been identified as the main reason for consumers' reluctance in purchasing products online. E-commerce rates in Thailand are considerably lower than those of other countries in the same region. However, this could be interpreted as a potential for e-commerce growth in Thailand. This study aims to identify the main factors affecting the low rates of e-commerce activity in Thailand and explores the social and cultural aspects of online shoppers here. Th
APA, Harvard, Vancouver, ISO, and other styles
3

Abedi, Fahimeh. "Universal standards for the concepts of fairness, trust and security in online dispute resolution in B2C e-disputes." Thesis, 2017. https://vuir.vu.edu.au/35013/.

Full text
Abstract:
The Internet has created a global marketplace, where consumers can purchase goods and services. For online purchases, disputes can occur and are called electronic commerce disputes (e-disputes). The need for an appropriate jurisdiction for e-disputes has resulted in the development of Online Dispute Resolution (ODR), a mechanism for resolving these disputes through the internet. Currently, there is no universal agreement about the concepts of procedural fairness, trust and security in ODR systems, although these issues have been widely discussed in the field of Alternative Dispute Resolution (
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "E-commerce security concerns"

1

Svantesson, Dan Jerker B. Solving the Internet Jurisdiction Puzzle. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198795674.001.0001.

Full text
Abstract:
Internet jurisdiction has emerged as one of the greatest and most urgent challenges online, severely affecting areas as diverse as e-commerce, data privacy, law enforcement, content take-downs, cloud computing, e-health, Cyber security, intellectual property, freedom of speech, and Cyberwar. In this innovative book, Professor Svantesson presents a vision for a new approach to Internet jurisdiction––for both private international law and public international law––based on sixteen years of research dedicated specifically to the topic. The book demonstrates that our current paradigm remains attac
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "E-commerce security concerns"

1

Donmaz, Ayşegül. "Privacy Policy and Security Issues in E-Commerce for Eliminating the Ethical Concerns." In Accounting, Finance, Sustainability, Governance & Fraud: Theory and Application. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8062-3_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Karson, Eric J. "Exploring a Valid and Reliable Scale of Consumer Privacy and Security Concerns on the Internet and their Implications for E-Commerce." In Developments in Marketing Science: Proceedings of the Academy of Marketing Science. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-11882-6_36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Durowoju, Olatunde Amoo. "Rationalising the Security Concern of Cloud Enabled E-commerce in the Supply Chain Context." In E-commerce Platform Acceptance. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-06121-4_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Serazzi, Giuseppe. "Reference Models." In Performance Engineering. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-36763-2_6.

Full text
Abstract:
AbstractThis chapter describes four case studies of varying difficulty that are simplified versions of complex projects used to study real world problems. Despite their simplicity, the implemented models are still able to capture the key aspects of the phenomena analyzed. Initially, the capacity planning of a facial recognition surveillance system based on edge computing architecture is described. Next, the design of a digital infrastructure that dynamically scales the computational capacity to handle workload fluctuations is presented. The implemented multi-formalism model consists of both Queueing Networks and Petri Nets components. The problem of performance forecast of a web app is tackled by simulating a concise version of the workflow of an e-commerce app. The impact of different authentication protocols for payment security is also considered. The last case study concerns the modelling of a platform for crowd computing. The originality of this model lies in the fact that its customers that flows in and out are the computational nodes, which are added and removed from the crowd platform. The resources that resides inside a Finite Capacity Region of the model manage the computational servers that may or may not be available to users.
APA, Harvard, Vancouver, ISO, and other styles
5

Khatri, Bhanupriya, Sourabh Sharma, Charu Saxena, and Megha Sharma. "Impact of Web Assurance Mechanism on Purchase Intention of Products on E-commerce Websites: Mediating Role of Trust and Customer Security Concern." In Palgrave Studies in Democracy, Innovation, and Entrepreneurship for Growth. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-71667-6_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Malik, Shah Rukh, Mujahid Rafiq, and Muhammad Ahmad Kahloon. "Cloud Security in E-Commerce Applications." In Research Anthology on E-Commerce Adoption, Models, and Applications for Modern Business. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-8957-1.ch085.

Full text
Abstract:
In this chapter, the authors focus on the most fundamental barrier in the e-commerce application's adoption: security. The most significant or important aspect to explore in cloud computing is how to keep the data secure in the most efficient way with cutting-edge technologies. Cloud computing has taken its place by providing its convenient services like on-demand service, pay-per-use, rapid elasticity, resource pooling, and other lucrative facilities. In this chapter, the authors will firstly describe the introduction related to cloud computing, major characteristics, types, and a few security concerns and issues in cloud computing. Furthermore, they discuss the introduction of e-commerce applications, how it is interlinked with cloud computing, and what the possible threats are. Moreover, what the possible solutions could be are discussed, so that we can secure data on both user side as well as on the server side. The authors suggest some existing solutions at the end of the chapter.
APA, Harvard, Vancouver, ISO, and other styles
7

Malik, Shah Rukh, Mujahid Rafiq, and Muhammad Ahmad Kahloon. "Cloud Security in E-Commerce Applications." In Cloud Computing Applications and Techniques for E-Commerce. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-1294-4.ch003.

Full text
Abstract:
In this chapter, the authors focus on the most fundamental barrier in the e-commerce application's adoption: security. The most significant or important aspect to explore in cloud computing is how to keep the data secure in the most efficient way with cutting-edge technologies. Cloud computing has taken its place by providing its convenient services like on-demand service, pay-per-use, rapid elasticity, resource pooling, and other lucrative facilities. In this chapter, the authors will firstly describe the introduction related to cloud computing, major characteristics, types, and a few security concerns and issues in cloud computing. Furthermore, they discuss the introduction of e-commerce applications, how it is interlinked with cloud computing, and what the possible threats are. Moreover, what the possible solutions could be are discussed, so that we can secure data on both user side as well as on the server side. The authors suggest some existing solutions at the end of the chapter.
APA, Harvard, Vancouver, ISO, and other styles
8

Smith, Alan D., and Allen R. Lias. "Identity Theft and E-Fraud as Critical CRM Concerns." In Information Security and Ethics. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-937-3.ch207.

Full text
Abstract:
Fraud and identity theft have been increasing with the use of e-commerce. In the U.S. alone, it has been estimated that victims may spend on average $1,500 in out-of-pocket expenses and an average of 175 hours in order to resolve the many problems caused by such identity thieves. Organizations that engage in e-commerce as a large part of their business need to protect their customers against these crimes. An empirical study of 75 managerial employees and/or knowledge workers in five large organizations in Pittsburgh, Pennsylvania, revealed a number of interesting facts about how much information they share with others, what the likelihood is that they will conduct business online, and whether or not they take steps to protect their personal identity and credit. Model construction and implications were generated concerning steps that employees and customers may take to avoid identity theft.
APA, Harvard, Vancouver, ISO, and other styles
9

Kaushik, Shweta, and Charu Gandhi. "Security for the Cloud." In Cloud Computing Applications and Techniques for E-Commerce. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-1294-4.ch004.

Full text
Abstract:
Today's people are moving towards the internet services through cloud computing to acquire their required service, but they have less confidence about cloud computing because all the tasks are handled by the service provider. Cloud system provides features to the owner to store their data on some remote locations and allow only authorized users to access their data according to their access capability. Data security becomes particularly serious in the cloud computing environment because data are scattered in different machines and storage devices including servers, PCs, and various mobile devices such as smart phones. To make the cloud computing be adopted by enterprise, the security concerns of users should be rectified first to make cloud environment trustworthy. The trustworthy environment is the basic prerequisite to win the confidence of users to adopt this technology. However, there are various security concerns that need to be taken care of regarding the trust maintenance between various parties, authorized access of confidential data, data storage privacy, and integrity.
APA, Harvard, Vancouver, ISO, and other styles
10

Rahman, Mohammad Mahfuzur, and Karim Mohammed Rezaul. "Information Security Management." In Threats, Countermeasures, and Advances in Applied Information Security. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0978-5.ch004.

Full text
Abstract:
The expansion of electronic commerce (E-commerce) has become an increasing reality due to Internet’s rapid growth during the last few years. E-commerce is growing at an exceptional rate with more organizations offering their goods and services online every day. Importantly, this growth is being matched by the number of people gaining access to the Internet in a variety of ways. E-commerce offers opportunities as well as threats. Information is crucial for any organization, especially in the e-market. The lack of an effective and trusted payment system that can be used in combination with online shopping has been limiting factor in the growth of Internet sales. Consumers are hesitant to provide personal information, including credit card details, over the Internet because of high perception of risk and concerns with privacy. Establishment of Information Security System can minimize the threats and risks. Technology can play an important role in intensifying trust in the information society and securing consumer rights. E-commerce will not be successful without protecting the consumers’ rights, especially in the area of information security. The research highlights the relevant theories of information security within the e-commerce sectors, including identifying and investigating the problems.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "E-commerce security concerns"

1

Neama, Ghadeer, Rana Alaskar, and Mohammad Alkandari. "Privacy, security, risk, and trust concerns in e-commerce." In ICDCN '16: 17th International Conference on Distributed Computing and Networking. ACM, 2016. http://dx.doi.org/10.1145/2833312.2850445.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rashminda, Lakshan, and Yehemini Jayatissa. "Payment and Security Concerns in Sri Lankan E-Commerce Web Sites." In 2024 International Research Conference on Smart Computing and Systems Engineering (SCSE). IEEE, 2024. http://dx.doi.org/10.1109/scse61872.2024.10550871.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yang, Chunhua, and Jiancheng Wan. "An Approach to Separating Security Concerns in E-Commerce Systems at the Architecture Level." In 2008 International Symposium on Electronic Commerce and Security. IEEE, 2008. http://dx.doi.org/10.1109/isecs.2008.59.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mohajerani, Somayeh, Sharareh Zarean Shahrekordi, and Mitra Azarlo. "The impact of privacy and security concerns, trust in technology and information quality on trust in e -government and intention to use e-government." In 2015 9th International Conference on e-Commerce in Developing Countries: With focus on e-Business (ECDC). IEEE, 2015. http://dx.doi.org/10.1109/ecdc.2015.7156332.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chowdhury, S. A., and M. S. S. B. Jabber. "Adverse impact of internet shutdown on e-commerce and social media marketing in Bangladesh." In International Conference on Business Research. Business Research Unit (BRU), 2024. https://doi.org/10.31705/icbr.2024.16.

Full text
Abstract:
The rise of e-commerce and social media marketing in Bangladesh has been a significant driver of economic growth, fostering entrepreneurship and expanding market accessibility. However, the frequent shutdowns of internet services, often due to political or security concerns, have posed substantial challenges to the e-commerce sector. Very recently Bangladesh has experienced internet shutdowns for prolonged periods that have had profound implications for e-commerce and social media marketing endeavors. This study examines the ramifications of this shutdown on the digital economy, focusing on th
APA, Harvard, Vancouver, ISO, and other styles
6

Dilshan, A., J. Wijayanayake, D. Asanka, and C. Karunarathna. "Adoption success of using Generative AI apps for the ECommerce Platforms in Sri Lanka." In Proceedings of the 3rd International Conference on Sustainable & Digital Business. SLIIT Business School, 2024. https://doi.org/10.54389/burh1886.

Full text
Abstract:
The digital landscape has witnessed the widespread influence of e-commerce, with the Information Technology industry embracing generative AI applications. This research aims to investigate the adoption success of existing e-commerce platforms in Sri Lanka in incorporating generative AI technologies. A systematic literature review using the PRISMA framework identified how generative AI is used in various industries, its Future Directions, Ethical Concerns, Security, and Privacy Considerations, and the most widely used and accepted models for understanding technology adoption. The Technology Acc
APA, Harvard, Vancouver, ISO, and other styles
7

Marino, Sonia, and Gabriella Duca. "User-Centred Design for QR Store: a Case Study." In Applied Human Factors and Ergonomics Conference. AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1001311.

Full text
Abstract:
This work describes the user centred design process of one of the first QR stores in Italy. Users related concerns in QR use and m-shopping experience have been surveyed, eliciting users’ expectations and needs for the effective and satisfactory use of the QR store to be designed. This has been achieved combining human factors reference data with studies on consumers behaviour buying in shopping malls and in m-commerce stores. Being the QR shopping a consumer experience happening in a multidimensional environment, multiple aspects of physical shops and environment, as well as of QR store app h
APA, Harvard, Vancouver, ISO, and other styles
8

Bagavathi, K., and T. I. Priya. "Enhancing Customer Experience and Service Management through AI in Online Shopping." In International Conference on Artificial Intelligence in Commerce and Management. Shanlax Publications, 2025. https://doi.org/10.34293/icaicm-25.ch025.

Full text
Abstract:
This study explores the enhancing customer experience and service management through AI in online shopping. The research aims to identify the key factors influencing customer experience, such as convenience, security, and user experience. A survey was conducted with a sample of 50 AI online shopping users across different age groups, income levels, and professions. Data collected through structured questionnaire and the study is descriptive and an analytical type of research in nature and is based on both Primary and Secondary Data. Simple Random Sampling Technique has been adopted to select t
APA, Harvard, Vancouver, ISO, and other styles
9

Meinert, David, Dane Peterson, John Criswell, and Martin Crossland. "Would Regulation of Web Site Privacy Policy Statements Increase Consumer Trust?" In InSITE 2006: Informing Science + IT Education Conference. Informing Science Institute, 2006. http://dx.doi.org/10.28945/2952.

Full text
Abstract:
Proponents of e-commerce have known for some time that limited participation by consumers partially reflects their concern over the privacy of personal information. To address consumer concerns, web site operators have employed security mechanisms, including privacy policy statements to increase their perceived trustworthiness. While empirical evidence is limited, there is some question regarding the ability of privacy policy statements to engender significantly greater levels of trust. The limited effectiveness of such statements may reflect their voluntary implementation, self-enforcement, a
APA, Harvard, Vancouver, ISO, and other styles
10

Shah, Hardik. "Harnessing Customized Built-in Elements: Empowering Component-Based Software Engineering and Design Systems with HTML5 Web Components." In 13th International Conference on Artificial Intelligence, Soft Computing and Applications. Academy & Industry Research Collaboration Center, 2023. http://dx.doi.org/10.5121/csit.2023.132219.

Full text
Abstract:
Customized built-in elements in HTML5 significantly transform web development. These elements enable developers to create unique HTML components tailored with specific design and purpose. Customized built-in elements enable developers to address the unique needs of web applications more quickly, supporting consistent user interfaces and experiences across diverse digital platforms. This study investigates the role of these features in Component-Based Software Engineering (CBSE) and Design Systems, emphasizing the benefits of code modularity, reusability, and scalability in web development. Cus
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!