Skip to main content Accessibility help
×
Hostname: page-component-77c89778f8-5wvtr Total loading time: 0 Render date: 2024-07-22T15:41:33.495Z Has data issue: false hasContentIssue false

9 - E-commerce security

from III - E-security applications

Published online by Cambridge University Press:  11 September 2009

Mohammad Obaidat
Affiliation:
Monmouth University, New Jersey
Noureddine Boudriga
Affiliation:
Université du 7 Novembre à Carthage, Tunis
Get access

Summary

The Internet is dramatically changing the way that goods (tangible and intangible) and services are produced, delivered, sold, and purchased. Due to this development, trade on the Web becomes an essential requirement for enterprises. From e-commerce to m-commerce, which has become a major service nowadays, every enterprise works hard to find out a way to sell and buy that can satisfy its requirements. Several payment protocols have been developed. The security of servers, transactions, and payment operations has become a major issue for the success of business on the Internet.

Introduction

E-commerce security has become a serious concern for enterprises and citizens who rely on distributed digital processing in their daily operations. From a customer's perspective, the purpose of an e-commerce system is to enable the customer to locate and purchase a desired good (tangible or intangible) or service over the Internet when he/she is interested in getting it. Its function is to provide a virtual store. From a merchant's perspective, the key function of an e-commerce system is to generate higher revenues than the merchant would achieve without the system. To this end, the e-commerce system must recreate or utilize existing data and business processes and provide other processes to facilitate electronic purchase and provide product information, inventory systems, customer service, and transaction capabilities including credit authorization, tax computation, financial settlement, as well as delivery. Additional functions of an e-commerce system are to help redefine and enhance an enterprise's capability, customer-service capability, and delivery effectiveness.

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2007

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Davida, G., Frankel, Y., Tsiounis, Y., and Yung, M. (1997). Anonymity control in e-cash systems. In Financial Cryptography '97, Springer-Verlag, LNCS 1318, pp. 1–16.Google Scholar
Dierks, T. and Allen, C. (1999). The TLS protocol version 1.0 – RFC 2246. IETF, Jan. 1999.Google Scholar
Fisher, M. (2003). Towards a generalized payment model for Internet service. Master thesis, Technical University of Vienna.
Freier, A. O.,Karlton, P., and Kocher, P. C. (1996). The SSL protocol version 3.0, Netscape 1996.Google Scholar
Guttman, R. H., Moukas, A. G., and Maes, P. (1998). Agent-mediated electronic commerce: a survey. MIT Media Lab, June 1998.Google Scholar
Hassler, V. (2001). Security Fundamentals for E-commerce. Artech House Publishers.Google Scholar
Rescola, E.SSL and TLS – Building and Designing Secure Systems. Addison-Wesley.
Thomas, S. (2000). SSL and TLS Essentials – Securing the Web. Wiley.Google Scholar
Tygar, J. D. (1996). Atomicity in electronic commerce. In Proceedings of the 15th PODC Conference; 1996, ACM/IEEE, pp. 8–26.Google Scholar
Tsalgatidou, A., Verijaleinen, J., and Pitoura, E. (2000). Challenges in mobile electronic commerce. In Proceedings of 3rd International Conference on Innovation through Electronic Commerce (IeC2000), Manchester, UK, Nov. 14–16, 2000.Google Scholar
Varshney, U. and Vetter, R. (2001). A framework for the emerging mobile commerce applications. In Proceedings of the 34th Hawaii International Conference on System Sciences, 2001, IEEE Computer Society.CrossRefGoogle Scholar
Veijalainen, J. and Tsalgatidou, A. (2000). Electronic commerce transactions in a mobile computing environment, Proc. Int. Conf. on information society in the 21st century emerging technologies and new challenges, Nov 5–8, 2000, Japan.Google Scholar
Visa/Mastercard (1997). Secure Electronic Transactions Standard. Book 1: Business Description, 1997. Available at http://www.setco.org
Visa/Mastercard (1997). SET Secure Electronic Transaction Specification. Book 2: Programmer's Guide, May 1997.
Visa International Service Association (2002). 3-D Secure Protocol Specification: System overview version 1.0, July 2002.

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • E-commerce security
  • Mohammad Obaidat, Monmouth University, New Jersey, Noureddine Boudriga, Université du 7 Novembre à Carthage, Tunis
  • Book: Security of e-Systems and Computer Networks
  • Online publication: 11 September 2009
  • Chapter DOI: https://doi.org/10.1017/CBO9780511536700.013
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • E-commerce security
  • Mohammad Obaidat, Monmouth University, New Jersey, Noureddine Boudriga, Université du 7 Novembre à Carthage, Tunis
  • Book: Security of e-Systems and Computer Networks
  • Online publication: 11 September 2009
  • Chapter DOI: https://doi.org/10.1017/CBO9780511536700.013
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • E-commerce security
  • Mohammad Obaidat, Monmouth University, New Jersey, Noureddine Boudriga, Université du 7 Novembre à Carthage, Tunis
  • Book: Security of e-Systems and Computer Networks
  • Online publication: 11 September 2009
  • Chapter DOI: https://doi.org/10.1017/CBO9780511536700.013
Available formats
×