Abstract-Secure Electronic Transactions (SET) is a security protocol for an electronic payment system that utilises PKI to address e-commerce security and privacy concerns. Although PKI technologies used by the SET protocol were proven to be effective in addressing security issues in e-commerce, several implementation issues were found from SET applications de-signed to support security mechanisms ofPKI. SET failed to be implemented by e-commerce end-users. This paper studies how SET was predicted, designed, and rejected by e-commerce end-users. PKI issues associated with SET implementation in B2C e-commerce are also reviewed. Although e-commerce end-users are concerned about security issues, usability is a more dominant factor than security for a secure system project to be adopted by the users. although e-commerce provided many benefits to consumers (e.g., convenience, greater choice, lower prices and more information). In order to address e-commerce security requirements, well-established cryptography was believed to be a 'magic pill'. An apparently secure e-commerce website would, in theory, convince potential e-commerce customers to become regular e-commerce customers. According to Giff [5], "[a]n example of increasing security to increase trust comes from people being more willing to engage in e-commerce if they are assured that their credit card numbers and personal data are cryptographically protected". In this light, PKI (Public Key Infrastructure) [6] was pointed out as a solution to e-commerce security and privacy concerns. Index Terms-CertificationAccording to Farrell and Zolotarev [7], PKI is vital for e-commerce security, since many applications that use PKI are not Web services and PKI is the only choice available for connecting business relationships to keys and identities when more than one domain is involved. In addition, Piper [8, p.24] stated that "Security is obviously a major concern for all potential users of E-commerce and the use of (public key) cryptography is an important issue". PKI is the subject of standardization by a number of bodies, including the IETF, ITU-T and ISO/IEC. PKI is the infrastructure
Abstract:Security is clearly a very important factor governing the size of the ecommerce market. E-commerce security concerns include payment confidentiality, payment integrity, and payment authorisation for Internet transactions. Currently, many potential e-commerce participants are reluctant to participate in Internet e-commerce because of these concerns, not least because many users perceive Internet shopping as the riskiest shopping method by comparison with other methods of payment. In this paper we consider the influence of the mass media, including television and newspapers, on e-commerce consumer perceptions. Given that cases of security breaches are often sensationalised by these media, we observe that the mass media may actually be unduly increasing e-consumer concerns, and thereby adversely affecting the e-commerce marketplace.
Abstract-Cognitive Informatics (CI) is a transdisciplinary approach to the cognitive and information sciences, emphasising the informational aspects of cognitive processes, with applications in the engineering of complex systems. Human cognition is a transcultural phenomeon, however to date all contributions to CI have been based on Western philosophy and science. In this article, we indicate how some of the fundamental concepts in Buddhist epistemology may be modeled in the CI framework. In particular: we develop a logical specification, in the Z notation, of cognitive processes which occur at levels 1 through 4 of the Layered Reference Model of the Brain (LRMB). We call these processes the Dhammic Framework. As with any axiomatic system, the validity of the Dhammic Framework cannot be proved by experimentation; but it could be invalidated if any of its implications were either logically inconsistent or in disagreement with experimental observation. Our formal statement of the Dhammic Framework will allow its axioms to be tested, scientifically, for contradiction within the framework of cognitive informatics. To this end, we propose a testable hypothesis about a way to avoid failures in systems engineering.
Abstract:The threat of credit card fraud is arguably one of the most serious issues in e-commerce, since it makes consumers reluctant to engage in this alternative method of shopping. Secure Electronic Transaction (SET) was invented to address this issue, and it provides effective security for the entire Internet ecommerce transaction. However, SET has not really taken off; implementation issues appear to be the main factor restricting its adoption. Given the existing consumer concerns about e-commerce security, SET still appears to be very relevant to the Internet e-commerce transaction environment. The integration of SET with EMV is a possible route for facilitating the wider use of SET in Internet commerce transactions, since it could simplify user registration. The aim of this paper is to evaluate the effectiveness of SETIEMV integration for fraud reduction in e-commerce. In addition, this paper also considers the implementation feasibility of SETIEMV.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.