validation is not mandatory for all entities. There are various levels of attainment. The
standard is more focussed on the backend controls and there is a lack of stated controls
around the front end companies that collect the details such as websites, call centers and
interactive voice agents.
Government Initiatives:
Digital business
Stay Smart Online
Safe Buy
Digital Europe
Stop Think Connect
Stay Safe Online
APEC Electronic Commerce Steering Group
gov
International Consumer Protection and Enforcement Network ( ICPEN )
Organisations are also making use of Third Party Assurances to increase the consumer
confidence, but that does not happen in most cases. Also consumers, about 58 % of them
dont realise seeing a 3rd party seal in the purchase site. Companies are also using third party
payment gateways to mitigate their involvement and move the risk to another organisation.
Nowadays, Digital Certificates are also being issued as a means of electronic verifiacation of
the authencity of the site, but does not make any assessment about the credibility of the site as
such.
Dimensions:
Points of Vulnerability:
Client
Server
Communication Channel
Threats :
Malicious code
Hacking and Cyber Vandalism
A diagrammatic representation of the potential process is added as a much needed food for
thought. So what do you think of this proposition. Let us know at
editor.webposts@gmail.com
Reference readings
1. Ford, W., & Baum, M. S. (2000). Secure electronic commerce: building the
infrastructure for digital signatures and encryption. Prentice Hall PTR.
2. Pani, A. K., & Kar, A. K. (2011, January). A study to compare relative importance of
criteria for supplier evaluation in e-procurement. In System Sciences (HICSS), 2011
44th Hawaii International Conference on (pp. 1-8). IEEE.
3. Gollmann, D. (2000). E-commerce security. Computing & Control Engineering
Journal, 11(3), 115-118.
4. Kar, A. K., & Rakshit, A. (2014). Pricing of Cloud IaaS Based on Feature
Prioritization-A Value Based Approach. In Recent Advances in Intelligent Informatics
(pp. 321-330). Springer International Publishing.
5. Furnell, S. (2006). E-commerce security. Enterprise information systems assurance
and systems security, 131-147.
6. Kar, A. K. (2015). A hybrid group decision support system for supplier selection
using analytic hierarchy process, fuzzy set theory and neural network. Journal of
Computational Science, 6, 23-33.
7. Hassler, V. (2002). Security Fundamentals for E-commerce. info, 4(2), 49-50.
8. Udo, G. J. (2001). Privacy and security concerns as major barriers for e-commerce: a
survey study. Information Management & Computer Security, 9(4), 165-174.
9. Kumar Kar, A., & Kumar Pani, A. (2014). How can a group of procurement experts
select suppliers? An approach for group decision support. Journal of Enterprise
Information Management, 27(4), 337-357.
10. Maiwald, E. (2001). Network security: a beginner's guide. McGraw-Hill Professional.
11. Kar, A. K. (2014). A group decision support system for selecting an open source tool
for social media integration. In Emerging Trends in Computing and Communication
(pp. 407-413). Springer India.
12. Kar, A. K. (2014). A Decision Support System for Website Selection for Internet
Based Advertising and Promotions. In Emerging Trends in Computing and
Communication (pp. 453-457). Springer India.
13. Sengupta, A., Mazumdar, C., & Barik, M. S. (2005). e-Commerce securityA life
cycle approach. Sadhana, 30(2-3), 119-140.
14. Halaweh, M., & Fidler, C. (2008, October). Security perception in e-commerce:
Conflict between customer and organizational perspectives. In Computer Science and
Information Technology, 2008. IMCSIT 2008. International Multiconference on (pp.
443-449). IEEE.
15. Jebur, H., Gheysari, H., & Roghanian, P. (2012). E-Commerce Reality and
Controversial Issue. International Journal of Fundamental Psychology & Social
Sciences, 2(4), 74-79.