To see the other types of publications on this topic, follow the link: Secure e-commerce.

Journal articles on the topic 'Secure e-commerce'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Secure e-commerce.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Cebeci, Sena Efsun, Kubra Nari, and Enver Ozdemir. "Secure E-Commerce Scheme." IEEE Access 10 (2022): 10359–70. http://dx.doi.org/10.1109/access.2022.3145030.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Masadeh, Shadi R., Shadi Aljawarneh, Ashraf Odeh, and Abdullah Alhaj. "Secure Communication." International Journal of Information Security and Privacy 7, no. 4 (2013): 1–10. http://dx.doi.org/10.4018/ijisp.2013100101.

Full text
Abstract:
The idea of e-Commerce is to take advantage of all the possibilities offered by information technology (such as digital communications, multimedia, internet, cell phones, teleconferences, etc.) and to improve the security of various organizations. In the article, the authors focus on securing all the contents of e-Commerce by proposing a public key watermarking algorithm for web content integrity verification. The main purpose of this article is to present a new security system that enables e-Commerce to exchange data more securely and by altering the file content structure, detecting illegal
APA, Harvard, Vancouver, ISO, and other styles
3

S, Bala Musa, Norita Md Norwawi, and Mohd Hasan Selamat. "Secure E-commerce Web Development Framework." Information Technology Journal 10, no. 4 (2011): 769–78. http://dx.doi.org/10.3923/itj.2011.769.778.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dr. B. Veera Jyothi et al.,, Dr B. Veera Jyothi et al ,. "Smart E-Commerce Application with Secure Blockchain." International Journal of Mechanical and Production Engineering Research and Development 10, no. 3 (2020): 7209–20. http://dx.doi.org/10.24247/ijmperdjun2020682.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Aljifri, H., and A. P. Pons. "Reducing Overhead of Secure E-Commerce Transactions." International Journal of Computers and Applications 26, no. 4 (2004): 1–6. http://dx.doi.org/10.1080/1206212x.2004.11441746.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Abbott, Shawn. "The Debate for Secure E[lectronic]Commerce." EDPACS 27, no. 1 (1999): 17–19. http://dx.doi.org/10.1201/1079/43247.27.1.19990701/30254.7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Guan, Sheng-Uei, and Yang Yang. "SAFE: secure agent roaming for e-commerce." Computers & Industrial Engineering 42, no. 2-4 (2002): 481–93. http://dx.doi.org/10.1016/s0360-8352(02)00042-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zhou, Gui Xian, and Ding Yi Zhang. "Trusted Operating Systems for Manufacturing E-Commerce System Secure." Advanced Materials Research 811 (September 2013): 608–12. http://dx.doi.org/10.4028/www.scientific.net/amr.811.608.

Full text
Abstract:
manufacturing e-commerce systems are considered as the backbone of the manufacturing industry in China, Vulnerabilities in web applications continue to be the most frequently discovered security problem. This article illustrates a trusted operating systems how to provide a flexible solution to the problem of application for e-commerce. With the help of Chinese Wall, web services are becoming popular in Web applications. In the end, we present strategies for e-commerce application: trusted e-commerce module.
APA, Harvard, Vancouver, ISO, and other styles
9

Farah, Tawfiq Abdul Hussien, Monem S. Rahma Abdul, and Bahjat Abdul Wahab Hala. "Design and implement a new secure prototype structure of e-commerce system." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 1 (2022): 560–71. https://doi.org/10.11591/ijece.v12i1.pp560-571.

Full text
Abstract:
The huge development of internet technologies and the widespread of modern and advanced devices lead to an increase in the size and diversity of e-commerce system development. These developments lead to an increase in the number of people that navigate these sites asking for their services and products. Which leads to increased competition in this field. Moreover, the expansion in the size of currency traded makes transaction protection an essential issue in this field. Providing security for each online client especially for a huge number of clients at the same time, causing an overload on th
APA, Harvard, Vancouver, ISO, and other styles
10

Andeh, Chioma P. R. "Designing A New Framework for Securing Electronic Commerce Systems at Design Phase: With A Special Reference to an Emerging Economy." International Journal of Advances in Scientific Research and Engineering (ijasre) 5, no. 9 (2019): 92–106. https://doi.org/10.31695/IJASRE.2019.33501.

Full text
Abstract:
 In an emerging economy like Nigeria, internet-based businesses are growing at an exponential rate but this growth is highly threatened by many instances of fraud and e-systems’ compromise. While a lot of research work has been done on how to secure e-commerce transaction protocols, improve cryptographic schemes and amend the technical and business issues in e-commerce, the area of mitigating security challenges by incorporating security modules at design time has not been thoroughly explored. Hence, in this paper we present a framework for e-commerce security with a focus on four s
APA, Harvard, Vancouver, ISO, and other styles
11

Ding, Xia Jun, Xiao Dan Jiang, and Yue Zhai Zheng. "The Research and Implementation of E-Commerce Secure Payment Protocol." Advanced Materials Research 267 (June 2011): 74–79. http://dx.doi.org/10.4028/www.scientific.net/amr.267.74.

Full text
Abstract:
To implement e-commerce, the key issue is to ensure that the security of system on entire business process, primarily through encryption, security, security agreement to guarantee the e-commerce network security. The security protocol mainly used Secure Sockets Layer Protocol and Secure Electronic Transaction. In this paper, after analysis two kinds of protocol and the security technology used in the protocol, put forward a small scale enterprise e-commerce transaction system design of network security protocols, which play a reference role to small and medium enterprises engaged in electronic
APA, Harvard, Vancouver, ISO, and other styles
12

Kumbhakar, Dulal. "A Secure and Efficient Authentication in E-Commerce." Bioscience Biotechnology Research Communications 14, no. 5 (2021): 93–99. http://dx.doi.org/10.21786/bbrc/14.5/19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

L. Mlelwa, Kenneth. "A Novel Framework for Secure E-Commerce Transactions." International Journal of Cyber-Security and Digital Forensics 6, no. 2 (2017): 92–100. http://dx.doi.org/10.17781/p002273.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Nabi, Faisal. "Secure business application logic for e-commerce systems." Computers & Security 24, no. 3 (2005): 208–17. http://dx.doi.org/10.1016/j.cose.2004.08.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Prabakar, Ms Sini. "E-COMMERCE WEBSITE USING NEXT.JS." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem46353.

Full text
Abstract:
ABSTRACT This project presents the development of a full-stack e-commerce web application utilizing Next.js, a React-based framework renowned for its server-side rendering and static site generation capabilities. The primary objective is to create a scalable, high-performance online store that offers seamless user experiences across various devices.​The application encompasses essential e-commerce functionalities, including dynamic product listings, detailed product pages, a shopping cart system, user authentication, and a secure checkout process. Integration with MongoDB facilitates efficient
APA, Harvard, Vancouver, ISO, and other styles
16

Hassan, Md Arif, Zarina Shukur, and Mohammad Kamrul Hasan. "An Efficient Secure Electronic Payment System for E-Commerce." Computers 9, no. 3 (2020): 66. http://dx.doi.org/10.3390/computers9030066.

Full text
Abstract:
E-commerce implies an electronic purchasing and marketing process online by using typical Web browsers. As e-commerce is quickly developing on the planet, particularly in recent years, many areas of life are affected, particularly the improvement in how individuals regulate themselves non-financially and financially in different transactions. In electronic payment or e-commerce payment, the gateway is a major component of the structure to assure that such exchanges occur without disputes, while maintaining the common security over such systems. Most Internet payment gateways in e-commerce prov
APA, Harvard, Vancouver, ISO, and other styles
17

S, Janani. "Secure Online Seller Registration System." International Journal for Research in Applied Science and Engineering Technology 13, no. 5 (2025): 4696–700. https://doi.org/10.22214/ijraset.2025.71282.

Full text
Abstract:
The rapid growth of e-commerce has led to an increase in counterfeit products and fraudulent sellers, causing financial losses to buyers and reducing trust in online marketplaces. Traditional verification systems are inadequate in detecting fraud, necessitating the implementation of advanced AI-driven solutions. This paper proposes an AI-powered marketplace that integrates Aadhaar-based seller verification, sentiment analysis for fraud detection, and multi-factor authentication (MFA) to ensure a secure and trustworthy e-commerce platform. Our system employs AI, natural language processing (NLP
APA, Harvard, Vancouver, ISO, and other styles
18

Xu, Hong Feng, and Gui Xian Zhou. "Study on the Trusted Operating Technology for Mobile E-Commerce System Secure." Applied Mechanics and Materials 519-520 (February 2014): 416–21. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.416.

Full text
Abstract:
Mobile e-commerce systems are the big trend of international economy and social development now days, and also the key process of industry upgrade, industrialization and modernization in our country. Mobile e-commerce systems are considered as the backbone of the manufacturing industry in China, Vulnerabilities in web applications continue to be the most frequently discovered security problem. This article illustrates a trusted operating systems how to provide a flexible solution to the problem of application for e-commerce. With the help of Chinese Wall, web services are becoming popular in W
APA, Harvard, Vancouver, ISO, and other styles
19

Sona Josh, Sreelakshmi V, Hajira Hazeena, and Binny S. "E-Commerce Transaction Using Visual Cryptography." international journal of engineering technology and management sciences 7, no. 4 (2023): 634–38. http://dx.doi.org/10.46647/ijetms.2023.v07i04.088.

Full text
Abstract:
The abstract focuses on the concept of e-commerce transactions using visual cryptography. E-commerce has revolutionized the way businesses operate and has become an integral part of our daily lives. However, the security of online transactions remains a critical concern. Visual cryptography is a technique that allows the secure transmission of images or information through encryption and decryption processes. This abstract explores the potential of visual cryptography in enhancing the security of e-commerce transactions. It discusses the advantages and challenges of using visual cryptography a
APA, Harvard, Vancouver, ISO, and other styles
20

Miajee, Md Rezaul Karim. "SET for E-commerce Transactions." American International Journal of Sciences and Engineering Research 1, no. 1 (2018): 13–15. http://dx.doi.org/10.46545/aijser.v1i1.22.

Full text
Abstract:
The Secure Electronic Transaction (SET) is a convention intended for ensuring Visa exchanges over the Internet. It is an industry-supported standard that was shaped by Master Card and Visa (going about as the administering body) in February 1996. To advance the SET standard all through the installments network, exhortation and help for its improvement have been given by IBM, GTE, Microsoft, Netscape, RSA, SAIC, Terisa and VeriSign. SET depends on cryptography and X.509 v3 computerized certificates to guarantee message confidentiality and security. SET is the main Internet exchange convention to
APA, Harvard, Vancouver, ISO, and other styles
21

Patil, Prof Pradnya, Prof Minal Sonkar, Prof Pallavi Patil, Prof Priyanka Deshmukh, and Prof Trupti Patil. "A Comprehensive Strategy for Detecting Credit Card Fraud in E-Commerce Utilizing DNS Authentication." International Journal of Soft Computing and Engineering 14, no. 5 (2024): 30–35. http://dx.doi.org/10.35940/ijsce.f3656.14051124.

Full text
Abstract:
E commerce has transformed global trade, enabling businesses to reach audiences worldwide since the World Wide Webs inception in 1990. Companies like Amazon demonstrate this growth, evolving from a small online bookstore to a retail giant. E commerces appeal lies in its global reach, cost efficiency, and 24 slash 7 availability. However, security challenges, especially credit card fraud, remain significant, causing substantial losses to businesses, particularly small and medium sized enterprises. Addressing fraud in e-commerce through machine learning techniques is crucial. Techniques such as
APA, Harvard, Vancouver, ISO, and other styles
22

Nugraha, Muhammad Adi, Desi Arisandi, and Novario Jaya Perdana. "PENGAMANAN WEBSITE E-COMMERCE MENGGUNAKAN MULTI-FACTOR AUTHENTICATION." Jurnal Ilmu Komputer dan Sistem Informasi 9, no. 1 (2021): 158. http://dx.doi.org/10.24912/jiksi.v9i1.11588.

Full text
Abstract:
Data security is very important and privacy for every user because there is sensitive information so it must be safe from irresponsible parties. One method that can secure user account data is Multi-Factor Authentication. E-commerce applications using Multi-Factor Authentication can secure their user accounts. This discussion is about creating website-based e-commerce applications that users can use to buy smart phone products. This E-commerce website application can secure users through 3 login steps. The login mechanism presented in this e-commerce website application is login with password,
APA, Harvard, Vancouver, ISO, and other styles
23

Wakoli, Leonard W. "Secure Sockets Layer/Transport Layer Security for E-Commerce." International Journal of Scientific Research and Management (IJSRM) 12, no. 12 (2024): 8047–52. https://doi.org/10.18535/ijsrm/v12i12.em03.

Full text
Abstract:
Digital commerce has revolutionized the global economy, offering many opportunities for businesses and consumers. The increase in volume and number of online transactions comes the critical need for robust security measures to protect sensitive data from malicious actors. The research paper aims to provide stakeholders with the knowledge and insights necessary to build trust and confidence in online transactions. Specific objectives are: (i) to establish the fundamental principles underpinning Secure Sockets Layer/Transport Layer Security (SSL/TLS) encryption, (ii) to provide SSL/TLS mechanism
APA, Harvard, Vancouver, ISO, and other styles
24

Prof., Pradnya Patil. "A Comprehensive Strategy for Detecting Credit Card Fraud in E-Commerce Utilizing DNS Authentication." International Journal of Soft Computing and Engineering (IJSCE) 14, no. 5 (2024): 30–35. https://doi.org/10.35940/ijsce.F3656.14051124.

Full text
Abstract:
<strong>Abstract: </strong>E-commerce has transformed global trade, enabling businesses to reach audiences worldwide since the World Wide Web's inception in 1990. Companies like Amazon demonstrate this growth, evolving from a small online bookstore to a retail giant. E-commerce's appeal lies in its global reach, cost-efficiency, and 24/7 availability. However, security challenges, especially credit card fraud, remain significant, causing substantial losses to businesses, particularly small and medium-sized enterprises. Addressing fraud in e-commerce through machine learning techniques is cruci
APA, Harvard, Vancouver, ISO, and other styles
25

Tawfiq Abdul Hussien, Farah, Abdul Monem S. Rahma, and Hala Bahjat Abdul Wahab. "A Secure E-commerce Environment Using Multi-agent System." Intelligent Automation & Soft Computing 34, no. 1 (2022): 499–514. http://dx.doi.org/10.32604/iasc.2022.025091.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Singh, Charanjit, and Mark N. Frolick. "Ibuttons: Building the Infrastructure for More Secure E-commerce." Information Systems Security 8, no. 4 (2000): 1–8. http://dx.doi.org/10.1201/1086/43307.8.4.20000101/31079.6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Yang, Cungang. "Designing secure e-commerce with role-based access control." International Journal of Web Engineering and Technology 3, no. 1 (2007): 73. http://dx.doi.org/10.1504/ijwet.2007.011528.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Sugiantoro, Bambang, Muhammad Anshari, and Danang Sudrajat. "Developing Framework for Web Based e-Commerce: Secure-SDLC." Journal of Physics: Conference Series 1566 (June 2020): 012020. http://dx.doi.org/10.1088/1742-6596/1566/1/012020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Guan, Zhitao, Naiyu Wang, Xunfeng Fan, Xueyan Liu, Longfei Wu, and Shaohua Wan. "Achieving Secure Search over Encrypted Data for e-Commerce." ACM Transactions on Internet Technology 21, no. 1 (2021): 1–17. http://dx.doi.org/10.1145/3408309.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Kumar, Ashish, Kakali Chatterjee, and Ashish Singh. "Energy-Efficient Secure Architecture For Personalization E-Commerce WSN." IEEE Transactions on Consumer Electronics 70, no. 4 (2024): 6901–8. https://doi.org/10.1109/tce.2024.3424574.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Kumar, Dr Narendra, Rohit Yadav, Vishal Khandelwal, and Shubham Gupta. "E-Commerce Website Using Mern Stack." International Journal of All Research Education and Scientific Methods 13, no. 05 (2025): 1645–50. https://doi.org/10.56025/ijaresm.2025.1305251645.

Full text
Abstract:
E-commerce keeps evolvingthe retail industry, requiring secure, scalable,responsive web platforms. This paper introduces TrendHaven, an e-commerce application built using the MERN stackMongoDB, Express.js, React.js, and Node.js. Key features include secure user authentication, a dynamic product catalog, optimized shopping cart functionality, and comprehensive order-tracking mechanisms.TheMobile-first responsive design ensures smooth user experiences across devices, and payment security is guaranteed using Stripe and Razorpay payment gateways. Performance evaluations revealed that the API endpo
APA, Harvard, Vancouver, ISO, and other styles
32

Rajashekarappa, Dr, Gautam Hegde, Gowtam Anant Hegde, Tanishq Hegde K. S, and Vishal Kattimani. "Decentralized E-Commerce for Digital Assets." International Journal for Research in Applied Science and Engineering Technology 12, no. 3 (2024): 2098–102. http://dx.doi.org/10.22214/ijraset.2024.59283.

Full text
Abstract:
Abstract: In the digital age, the creation and exchange of digital assets have become integral to various domains, including art, music, education, and more. However, the existing centralized marketplaces for these digital assets pose significant challenges, such as high fees, cross-border transaction delays, and limited control for creators and artists. This project introduces a gamechanging solution – a Decentralized E-Commerce platform powered by ERC1155 tokens. The project scope encompasses a comprehensive range of functionalities, including digital asset listing, buying, selling, and secu
APA, Harvard, Vancouver, ISO, and other styles
33

Choon, Keat LOW, Chi PHOON Gar, and Phing NG Yen. "Developing a Secure E-commerce Web Application for Online Fashion Store." Research and Applications of Web Development and Design 7, no. 2 (2024): 1–5. https://doi.org/10.5281/zenodo.10745953.

Full text
Abstract:
<em>With the rapid growth of online shopping and digital transactions, the security of e-commerce websites has become a critical concern. The purpose of this project is to create and implement robust security measures in e-commerce websites, outlining the scope of security considerations to safeguard user data, financial transactions, and the overall integrity of the online shopping experience. The scope of security in e-commerce websites encompasses various dimensions, including secure communications, user authentication, secure payment gateways, data protection, and vulnerability management.
APA, Harvard, Vancouver, ISO, and other styles
34

Patankar, Rutwij. "TrenchX An Integrated Marketplace for Secure E-Commerce and NFT Transactions." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem34964.

Full text
Abstract:
TrenchX stands as a groundbreaking initiative at the intersection of e-commerce and blockchain technology, dedicated to empowering artists, entrepreneurs, and users in the digital marketplace. Leveraging the decentralized and transparent nature of blockchain, TrenchX offers a user-friendly platform for creating, managing, and trading Non-Fungible Tokens (NFTs). These NFTs, powered by smart contracts, serve as unique digital assets representing ownership of various forms of digital content, including artworks, collectibles, and more. By seamlessly bridging traditional e-commerce with blockchain
APA, Harvard, Vancouver, ISO, and other styles
35

Tubishat, Bassam Mustafa Abdul-Rahman. "Electronic Commerce and Consumer Protection in Jordan: The Emerging Trend." International Journal of Religion 5, no. 2 (2024): 328–45. http://dx.doi.org/10.61707/n26a5837.

Full text
Abstract:
Consumer protection and electronic commerce in Jordan are covered in this study. E-commerce is buying and selling things online. Jordan has seen a sharp increase in e-commerce, with more consumers and businesses doing business online. Consumer protection issues have been brought up by e-commerce. Jordanians who shop online run the danger of being taken advantage of. Consumers may also be misled by false advertising and refusals of returns and refunds. To protect online shoppers, this paper suggests that the Jordanian government and other interested parties address these issues. This can be acc
APA, Harvard, Vancouver, ISO, and other styles
36

د. ياسر تاج السر محمد سند та د. حنان حسين عيسى كرم. "دور نظام الرقابة الداخلية في تأمين عمليات التجارة الإلكترونية". Omdurman Islamic University Journal 33, № 1 (2021): 194–226. http://dx.doi.org/10.52981/oiuj.v33i1.788.

Full text
Abstract:
The study addressed the clarifying of the role of the internal control system in securing electronic commerce operations in Sudanese banks, where the problem of the study was how to secure the risks of e-commerce operations that take place in Sudanese banks through internal control over data inputs, operations and outputs, to achieve the study objectives the following hypotheses were tested; There is a statistically significant relationship between internal control of inputs and securing e-commerce operations, there is a statistically significant relationship between internal control over oper
APA, Harvard, Vancouver, ISO, and other styles
37

Badekar, Sakshi. "E-Commerce for Local Shop." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem50944.

Full text
Abstract:
The E-Commerce for Local Shop project is a comprehensive digital platform designed to enable local shops to expand their business into the online marketplace. Developed using Spring Boot for the backend and React for the frontend, this application provides a user-friendly and highly functional solution for both customers and shop owners. The platform allows users to explore a wide range of products, primarily mobile phones, by applying filters based on criteria such as company, price, and specific product features, making it easy for customers to find exactly what they are looking for. One of
APA, Harvard, Vancouver, ISO, and other styles
38

Savya, Savya, R. Mohanraj, K. Sharada, Savya Sachi, K. Neelima, and Punyala Ramadevi. "Securing the Digital Commerce Spectrum and Cyber Security Strategies for Web, E-commerce, M-commerce, and E-mail Security." Journal of Cybersecurity and Information Management 14, no. 1 (2024): 34–49. http://dx.doi.org/10.54216/jcim.140103.

Full text
Abstract:
Secure protection of sensitive data and financial transactions is of the utmost importance in the dynamic world of online trade. In this study, we present a full-stack security architecture that uses five separate algorithms: ECF, Transaction Anomaly Detection, Adaptive Threat Intelligence, Behavioral Biometric Authentication, and Dynamic Encryption Protocol. By creating encryption keys on the fly while the user logs in, the DEP method lays a solid groundwork for safe data transfer. Behavioral biometric authentication (BBA) uses DEP output to verify users based on their distinct behavior, whic
APA, Harvard, Vancouver, ISO, and other styles
39

Thilagavathi, J., and K. Lavanya. "E-Commerce on Emerging Markets." Shanlax International Journal of Arts, Science and Humanities 11, S3-July (2024): 61–64. http://dx.doi.org/10.34293/sijash.v11is3-july.7920.

Full text
Abstract:
In the foreseeable future, the impact of e-commerce on the economy is poised to be significant, reshaping the landscape of global business irreversibly due to the ubiquitous presence of the Internet. Particularly, the banking sector stands to undergo major transformations in the 21st century as a result of e-commerce’s influence. Across various economic sectors, e-commerce has wielded substantial effects, most notably driving worldwide productivity growth. Nations are now strategically assessing the workforce and investment needed to bolster their information economies and enhance business acc
APA, Harvard, Vancouver, ISO, and other styles
40

Oreoluwa Omoike. "Designing a secure and high-performing e-commerce platform for public cloud." International Journal of Science and Research Archive 9, no. 2 (2023): 1008–13. http://dx.doi.org/10.30574/ijsra.2023.9.2.0525.

Full text
Abstract:
This study explores the design and implementation of a secure and high-performing e-commerce platform using public cloud infrastructure. The rising popularity of e-commerce has emphasized the need for scalable, cost-efficient, and secure platforms that can meet the dynamic needs of users. Cloud computing provides the necessary resources for building such platforms, but security and performance remain critical concerns. This paper examines strategies for securing an e-commerce platform hosted on a public cloud while optimizing for performance. Data collection, instrumentations, and analysis wer
APA, Harvard, Vancouver, ISO, and other styles
41

Suradi, Agustinus. "Blockchain and AI Technology Convergence: Applications in E-Commerce." Journal of Information System, Technology and Engineering 2, no. 3 (2024): 269–79. http://dx.doi.org/10.61487/jiste.v2i3.71.

Full text
Abstract:
The discovery of blockchain technology is considered capable of increasing data and transaction security. Everything recorded cannot be altered or changed retrospectively, making blockchain secure. Blockchain technology and artificial intelligence can be applied to various aspects, but this research review focuses on blockchain technology and artificial intelligence for e-commerce. E-commerce is buying or selling goods or services via a computer network. Currently, e-commerce has developed so rapidly that it has diverse business models and a variety of goods and services offered. E-commerce ma
APA, Harvard, Vancouver, ISO, and other styles
42

Saeed, Saqib. "A Customer-Centric View of E-Commerce Security and Privacy." Applied Sciences 13, no. 2 (2023): 1020. http://dx.doi.org/10.3390/app13021020.

Full text
Abstract:
Business organizations have huge potential to increase their customer base by offering e-commerce services, especially in the post-pandemic era. Ensuring secure e-commerce applications plays an important role in increasing customer base. To develop appropriate policies and secure technological infrastructures, business organizations first need to establish an understanding of the reservations of their customers toward e-commerce, as well as their perception of security and privacy of e-commerce applications. In this paper, we present the results of an empirical study of e-commerce customers co
APA, Harvard, Vancouver, ISO, and other styles
43

Wang, Yi Ran. "Research of E-Business Security Based on SOAP Protocol." Advanced Materials Research 189-193 (February 2011): 4304–7. http://dx.doi.org/10.4028/www.scientific.net/amr.189-193.4304.

Full text
Abstract:
When applied in E-Business, the technology of Web Services based on SOAP protocol can promote integration of E-commerce and distributed application. But it has some potential problems of security. Through research of technology correlated SOAP, combined with E-business safety analysis, the paper designs a kind of secure E-Business application model based on SOAP protocol. It includes SOAP secure disposal and access controller, and is realized by J2EE. The model makes the SOAP messages transmit safely and solves the secure problems of E-Business. It has great significance for popularization and
APA, Harvard, Vancouver, ISO, and other styles
44

Piscevic, Milos, and Dejan Simic. "Reducing e-commerce risks using digital certificates." Yugoslav Journal of Operations Research 19, no. 1 (2009): 185–94. http://dx.doi.org/10.2298/yjor0901185p.

Full text
Abstract:
E-commerce means buying and selling goods and services across the Internet. Secured communication in e-commerce, across unsecured medium, such as the Internet, represents one of the major components in a domain of providing necessary security- critical demands, so the flow of information could go in a secure way. The Internet, as a global computer network must provide five major security services: confidentiality, data integrity, authentication, availability, and non-repudiation of information. Without guaranteeing aformentioned security goals, risks may be very high in e-commerce systems. A p
APA, Harvard, Vancouver, ISO, and other styles
45

Boerkamp, Martijn. "Quantum-secure online shopping moves a step closer." Physics World 37, no. 3 (2024): 6i. http://dx.doi.org/10.1088/2058-7058/37/03/06.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Peng, Xiang Jun, and Juan Juan Chen. "The Problems of Mobile E-Commerce Secure Payment and Solutions." Applied Mechanics and Materials 443 (October 2013): 561–65. http://dx.doi.org/10.4028/www.scientific.net/amm.443.561.

Full text
Abstract:
The payment system of wireless communication is a whole of the various types of software used by the wireless communication network, wireless payment terminals and payment terminals, which together constitute the user applications. Compared to traditional network, wireless communication network is an more open system. According to this, users personal is easier to be stolen in the transfer process and the type of attack has become more diverse and innovative. The article introduces two types attack and solutions. Fishing Wifi is a common means of attack in the wireless network nowadays. Mobile
APA, Harvard, Vancouver, ISO, and other styles
47

SÜZEN, Ahmet Ali, and Burhan DUMAN. "Blockchain-Based Secure Credit Card Storage System for E-Commerce." Sakarya University Journal of Computer and Information Sciences 4, no. 2 (2021): 204–15. http://dx.doi.org/10.35377/saucis.04.02.895764.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Backhouse, James. "Assessing Certification Authorities: Guarding the Guardians of Secure E‐commerce?" Journal of Financial Crime 9, no. 3 (2002): 217–26. http://dx.doi.org/10.1108/eb026020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Kodaganallur, Viswanathan. "Secure E-Commerce: Understanding the Public Key Cryptography Jigsaw Puzzle." Information Systems Security 14, no. 6 (2006): 44–52. http://dx.doi.org/10.1201/1086.1065898x/45782.14.6.20060101/91859.9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Guitart, Jordi, David Carrera, Vicenç Beltran, Jordi Torres, and Eduard Ayguadé. "Designing an overload control strategy for secure e-commerce applications." Computer Networks 51, no. 15 (2007): 4492–510. http://dx.doi.org/10.1016/j.comnet.2007.05.010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!