2022
DOI: 10.4236/jis.2022.134016
|View full text |Cite
|
Sign up to set email alerts
|

Knowledge Management Strategy for Handling Cyber Attacks in E-Commerce with Computer Security Incident Response Team (CSIRT)

Abstract: Electronic Commerce (E-Commerce) was created to help expand the market share network through the internet without the boundaries of space and time. However, behind all the benefits obtained, E-Commerce also raises the issue of consumer concerns about the responsibility for personal data that has been recorded and collected by E-Commerce companies. The personal data is in the form of consumer identity names, passwords, debit and credit card numbers, conversations in email, as well as information related to cons… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 25 publications
0
1
0
Order By: Relevance
“…In recent years, there has been substantial growth in electronic attacks over the Internet, and it is expected that there will be new strategies in the future. Cyber-attacks are a set of tactics carried out by individuals with the ability to exploit gaps in electronic systems and networks, often with the intent of damaging systems or accessing and viewing sensitive information [1][2][3][4][5][6]. These attacks can be carried out from a variety of different websites (unnatural links or fake) or malicious applications and are known to affect a wide range of different types of industries [7][8][9][10][11][12].…”
Section: Introductionmentioning
confidence: 99%
“…In recent years, there has been substantial growth in electronic attacks over the Internet, and it is expected that there will be new strategies in the future. Cyber-attacks are a set of tactics carried out by individuals with the ability to exploit gaps in electronic systems and networks, often with the intent of damaging systems or accessing and viewing sensitive information [1][2][3][4][5][6]. These attacks can be carried out from a variety of different websites (unnatural links or fake) or malicious applications and are known to affect a wide range of different types of industries [7][8][9][10][11][12].…”
Section: Introductionmentioning
confidence: 99%