Fasli, M.(2007) ͚On agent technology for e-commerce: trust, security and legal issues͛, ^
This journal article discusses how E-Commerce security issues can be addressed through the use of
cryptography. This article also discusses how the use of agent technology can bring both benefits and
problems to user privacy.
Sharma, K., Singh, A. and Sharma VP. (2009) ͚SMES and cyber security threats in e-commerce͛,
<http://web.ebscohost.com.librouter.hud.ac.uk/ehost/pdfviewer/pdfviewer?vid=3&hid=15&sid=b418c3
a6-bbd1-425e-97b9-487c9eac813a%40sessionmgr12>[Accessed: 20/10/2010]
This journal article clearly defines certain security problems for E-Commerce. It not only details ways to
avoid problems but it also proposes some solutions to problems for Small and Medium Enterprises
(SMES) in E-Commerce.
Source 3 ʹ Book
This book details specific threats to E-Commerce websites, in particular threats arising from poor
authentication techniques. The book also details ways to use cryptography to create solutions to these
problems.
Source 4 - Book
This book details the different dimensions of E-Commerce security such as authenticity, privacy and
integrity. Solutions such as, encryption and digital certificates are offered to different security problems
faced by E-Commerce.
Source 5 ʹ Website
IBM, (2003) ^ " [online]. Available at
<http://www.redbooks.ibm.com/abstracts/tips0266.html?Open>. [Accessed 21\10\2010]
This website discusses user authentication and authorisation issues such as the difference between the
two and why both are required to keep E-Commerce secure.
Source 6 ʹ Book
This book details security problems that exist within E-Commerce such as protecting information from
unauthorised use that need to considered and how these problems can be solved.
This journal article discusses fairly complex biometric methods of authenticating a user during an E-
Commerce transaction. This article also discusses using digital certificates and SSL for extra security in E-
Commerce environments.
This journal article discusses methods of securing E-Commerce such through authentication, digital
certificates and cryptography. Each method is discussed in detail and has recommendations for the
usage of security methods.